Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (22)
- Singapore Management University (16)
- University of Nebraska - Lincoln (15)
- Old Dominion University (9)
- Technological University Dublin (8)
-
- Pace University (6)
- City University of New York (CUNY) (4)
- The University of San Francisco (4)
- Embry-Riddle Aeronautical University (3)
- Portland State University (3)
- Department of Primary Industries and Regional Development, Western Australia (2)
- Edith Cowan University (2)
- Liberty University (2)
- West Virginia University (2)
- Western Kentucky University (2)
- Air Force Institute of Technology (1)
- Bentley University (1)
- Butler University (1)
- Claremont Colleges (1)
- Florida International University (1)
- Marshall University (1)
- Montclair State University (1)
- Munster Technological University (1)
- Purdue University (1)
- Rochester Institute of Technology (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Sheridan College (1)
- South Dakota State University (1)
- The British University in Egypt (1)
- The University of Maine (1)
- Keyword
-
- Technology (10)
- Audit (5)
- Blockchain (5)
- Innovation (5)
- Internet (5)
-
- Information (4)
- Artificial intelligence (3)
- Competition (3)
- Cybersecurity (3)
- Digital marketing (3)
- Education (3)
- Engineering (3)
- Ethics (3)
- Marketing (3)
- Telecommunications law and policy (3)
- Two-sided markets (3)
- And University (2)
- Arts (2)
- Bibliometric (2)
- Big data (2)
- Bluetooth (2)
- Business (2)
- Cloud computing (2)
- Collaboration (2)
- Computers (2)
- Congestion (2)
- Consumer privacy (2)
- Consumer protection (2)
- Content delivery networks (2)
- Copyright (2)
- Publication Year
- Publication
-
- All Faculty Scholarship (22)
- Research Collection School Of Computing and Information Systems (9)
- Library Philosophy and Practice (e-journal) (8)
- Articles (5)
- Cornerstone 3 Reports : Interdisciplinary Informatics (5)
-
- Business Analytics and Information Systems (3)
- School of Computing: Faculty Publications (3)
- Social Space (3)
- VMASC Publications (3)
- Conference papers (2)
- Dissertations (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Faculty & Staff Scholarship (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- Masters Theses & Specialist Projects (2)
- Open Educational Resources (2)
- Publications (2)
- Publications and Research (2)
- Research Collection School Of Accountancy (2)
- Senior Honors Theses (2)
- Student Works (2)
- All other publications (1)
- Biology Faculty Publications (1)
- CGU Faculty Publications and Research (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Consumer Sciences Faculty Publications (1)
- Crop Updates (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
Articles 1 - 30 of 121
Full-Text Articles in Computer Engineering
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …
Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien
Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien
Research outputs 2022 to 2026
Introduction. The aim of the project was to conduct a systemic design study to evaluate Australia'sopportunities and barriers for achieving a technological advantage in light of regional military technological advancement. It focussed on the three domains of (1) cybersecurity technology, (2) information technology, and (3) space technology.
Research process. Employing a systemic design approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding of the interdisciplinary nature of defence technologies, identifying key areas for further exploration. The subsequent survey study, engaging 828 …
Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Student Works
Machine learning regression techniques have shown success at feedback control to perform near-optimal pinpoint landings for low fidelity formulations (e.g. 3 degree-of-freedom). Trajectories from these low-fidelity landing formulations have been used in imitation learning techniques to train deep neural network policies to replicate these optimal landings in closed loop. This study details the development of a near-optimal, neural network feedback controller for a 6 degree-of-freedom pinpoint landing system. To model disturbances, the problem is cast as either a multi-phase optimal control problem or a triple single-phase optimal control problem to generate examples of optimal control through the presence of disturbances. …
Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Student Works
The ability to certify systems driven by neural networks is crucial for future rollouts of machine learning technologies in aerospace applications. In this study, the neural networks are used to represent a fuel-optimal feedback controller for two different 3-degree-of-freedom pinpoint landing problems. It is shown that the standard sum-ofsquares Lyapunov candidate is too restrictive to assess the stability of systems with fuel-optimal control profiles. Instead, a parametric Lyapunov candidate (i.e. a neural network) can be trained to sufficiently evaluate the closed-loop stability of fuel-optimal control profiles. Then, a stability-constrained imitation learning method is applied, which simultaneously trains a neural network …
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
Senior Honors Theses
Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …
The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil
The Fashion Visual Search Using Deep Learning Approach, Smita V. Bhoir, Sunita R. Patil
Library Philosophy and Practice (e-journal)
In recent years, the World Wide Web (WWW) has established itself as a popular source of information. Using an effective approach to investigate the vast amount of information available on the internet is essential if we are to make the most of the resources available. Visual data cannot be indexed using text-based indexing algorithms because it is significantly larger and more complex than text. Content-Based Image Retrieval, as a result, has gained widespread attention among the scientific community (CBIR). Input into a CBIR system that is dependent on visible features of the user's input image at a low level is …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Antitrust Interoperability Remedies, Herbert J. Hovenkamp
Antitrust Interoperability Remedies, Herbert J. Hovenkamp
All Faculty Scholarship
Compelled interoperability can be a useful remedy for dominant firms, including large digital platforms, who violate the antitrust laws. They can address competition concerns without interfering unnecessarily with the structures that make digital platforms attractive and that have contributed so much to economic growth.
Given the wide variety of structures and business models for big tech, “interoperability” must be defined broadly. It can realistically include everything from “dynamic” interoperability that requires real time sharing of data and operations, to “static” interoperability which requires portability but not necessarily real time interactions. Also included are the compelled sharing of intellectual property or …
Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper
Automation, Ai, And Future Skills Needs: An Irish Perspective, Raimunda Bukartaite, Daire Hooper
Articles
This study explores insights from key stakeholders into the skills they believe will be necessary for the future of work as we become more reliant on artificial intelligence (AI) and technology. The study also seeks to understand what human resource policies and educational interventions are needed to support and take advantage of these changes.
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …
Columnas: The Honors Program Newsletter At Bentley University, Debayan Sen, Hailey Jennato, Gabe Holmes, Daniel Furze
Columnas: The Honors Program Newsletter At Bentley University, Debayan Sen, Hailey Jennato, Gabe Holmes, Daniel Furze
Honors Program
Page 1: SOCIAL MEDIA—A VEHICLE FOR SOCIAL CHANGE OR VIRTUE SIGNALING? ~ By Debayan Sen ’23
Page 2: WILL ARTIFICIAL INTELLIGENCE AND ROBOTICS REPLACE THE HUMAN WORKER? ~ By Hailey Jennato ’24
Page 3: HOW TO HEALTHILY COMMUNICATE IN A RELATIONSHIP: NO, NOT JUST A ROMANTIC ONE ~ By Gabe Holmes ’26
Page 4: THE W SLANT ~ By Daniel Furze ’26
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
School of Computing: Faculty Publications
Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …
The Music Bluetooth Controller: An Intersection Between Technology And Music, Lydia Wu
The Music Bluetooth Controller: An Intersection Between Technology And Music, Lydia Wu
Senior Honors Theses
The modern musician faces a new challenge: how can technology be used to enhance a performance? This thesis documents the development of a Bluetooth remote controller that will aid today’s performing musicians by interacting with a digital display (e.g., an iPad) to flip musical score pages remotely. At its core, while mimicking a Bluetooth pedal (the current industry standard), this device attaches to the musician’s hand. In its pilot stages, the device has been referred to “MBC” (Music Bluetooth Controller).
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Library Philosophy and Practice (e-journal)
This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee
Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee
Articles
Real-time bidding is nowadays one of the most promising systems in the online advertising ecosystem. In this study, the performance of RTB campaigns is improved by optimising the parameters of the users' profiles and the publishers' websites. Most studies concerning optimising RTB campaigns are focused on the bidding strategy, i.e., estimating the best value for each bid. However, this research focuses on optimising RTB campaigns by finding out configurations that maximise both the number of impressions and the average profitability of the visits. An online campaign configuration generally consists of a set of parameters along with their values such as …
Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim
Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim
Research Collection School Of Accountancy
Our objective is to understand how digitally mature organisations are managing the GRC aspects of their digital transformation programmes, and identify any traits or behaviours that could inform the development of best practices.
Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith
Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith
Faculty Publications
The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of …
Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao
Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao
altREU Projects
This project aims to understand how the COVID-19 pandemic has affected people's food shopping tendencies, specifically focusing on the use of online grocers. It uses data collected by a team of researchers led out of Portland State University. This data consists of roughly 8000 surveys distributed starting in September of 2020. The survey asks respondents to discuss their demographics, household resources, and shopping tendencies.
In particular, this project wants to understand how inclined a respondent is to use online grocers based on their personal experience with COVID-19. To do this, the project uses a Latent Class Model (LCM) to classify …
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Publications
In recent years, online platforms have been utilized for promoting harmful content and behavior such as extremism, harassment, mis/disinformation, human trafficking, genderbased violence among others affecting our society, often leading to real-world events. Such content and behaviors are inherently complex, making the recognition of these narratives challenging for researchers as well as social media companies. The Cyber Social Threats (CySoc) Workshop 2021 aimed to facilitate a rich forum for researchers and practitioners from both academia and industry in the areas of computing and social science, to discuss novel avenues for research on interdisciplinary aspects of harmful communications on social media, …
3d Printing Of Human Microbiome Constituents To Understand Spatial Relationships And Shape Parameters In Bacteriology, Jacques Izard, Teklu Kuru Gerbaba, Shara R. P. Yumul
3d Printing Of Human Microbiome Constituents To Understand Spatial Relationships And Shape Parameters In Bacteriology, Jacques Izard, Teklu Kuru Gerbaba, Shara R. P. Yumul
Department of Food Science and Technology: Faculty Publications
Effective laboratory and classroom demonstration of microbiome size and shape, diversity, and ecological relationships is hampered by a lack of high-resolution, easy-to-use, readily accessible physical or digital models for use in teaching. Three-dimensional (3D) representations are, overall, more effective in communicating visuospatial information, allowing for a better understanding of concepts not directly observable with the unaided eye. Published morphology descriptions and microscopy images were used as the basis for designing 3D digital models, scaled at 20,000×, using computer-aided design software (CAD) and generating printed models of bacteria on mass-market 3D printers. Sixteen models are presented, including rod-shaped, spiral, flask-like, vibroid, …
Effect Of Information Technology Capital: Technology Infrastructure, Database, Software, And Brainware Toward Optimize The Use Of Information Technology (Case Study : Uin Sunan Ampel Of Surabaya), Rismawati Br Sitepu, Ilham M.Said, Tanti Handriana, Praptini Yulianti
Effect Of Information Technology Capital: Technology Infrastructure, Database, Software, And Brainware Toward Optimize The Use Of Information Technology (Case Study : Uin Sunan Ampel Of Surabaya), Rismawati Br Sitepu, Ilham M.Said, Tanti Handriana, Praptini Yulianti
Library Philosophy and Practice (e-journal)
This research was conducted to determine the extent of the influence of technology infrastructure costs, software costs, database costs and brainware costs to increase the information technology budget of the Sunan Ampel State Islamic University in Surabaya and efficient use of the budget. The purpose of this study is to prove that there is a positive and significant influence of technology infrastructure costs, software costs, database costs and brainware costs to increase information technology budgets by using validity and reliability tests and classic tests such as the Normality test, Multicollinearity test, autocorrelation test, Heteroskedasticity test , and Linearity test. This …
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Scholarship and Professional Work - Business
There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.
Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Computational Modeling & Simulation Engineering Faculty Publications
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
Vind: A Blockchain-Enabled Supply Chain Provenance Framework For Energy Delivery Systems, Eranga Bandara, Sachin Shetty, Deepak Tosh, Xueping Liang
VMASC Publications
Enterprise-level energy delivery systems (EDSs) depend on different software or hardware vendors to achieve operational efficiency. Critical components of these systems are typically manufactured and integrated by overseas suppliers, which expands the attack surface to adversaries with additional opportunities to infiltrate into EDSs. Due to this reason, the risk management of the EDS supply chain is crucial to ensure that we are knowledgeable about the vulnerabilities in software and hardware components that comprise any critical part, quantifiable risk metrics to assess the severity and exploitability of the attack, and provide remediation solutions that can influence a prioritized mitigation plan. There …
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
VMASC Publications
The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …
Are Entrepreneurial Capabilities And Prior Knowledge The Silver Bullet For The Generation Of New Digital Venture Ideas In A Digital Context?, Meifang Yao, Dan Ye, Gao Yang, Hui Shi, Xianrong Zheng
Are Entrepreneurial Capabilities And Prior Knowledge The Silver Bullet For The Generation Of New Digital Venture Ideas In A Digital Context?, Meifang Yao, Dan Ye, Gao Yang, Hui Shi, Xianrong Zheng
Information Technology & Decision Sciences Faculty Publications
Digital technology has had an important impact on entrepreneurship. It has changed the uncertain nature of the process of new venture idea generation, and it has also brought unprecedented opportunities for the generation of new digital venture ideas. In order to explore how startups can deal with major challenges brought by digital technology and create new digital venture ideas, this paper focuses on micro level entrepreneurial actions and constructs a theoretical model of the relationship among networking capabilities, IT capabilities, prior knowledge, and new digital venture ideas. Furthermore, through the hierarchical linear regression analysis of 278 sample data, the paper …
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Engineering Management & Systems Engineering Faculty Publications
In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …
A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil
A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil
Engineering Management & Systems Engineering Faculty Publications
The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …