Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr Nov 2008

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This chapter introduces the role of the knowledge gatekeeper as a mechanism by which knowledge is created and transferred in a networked environment. Knowledge creation and transfer are essential for building a knowledge based economy. The chapter considers obstacles that inhibit this process and argues that leading firms create a shared socio-cultural context that enables the condivision of tacit meanings and codification of knowledge. Leading firms act as gatekeepers of knowledge through the creation of shared virtual platforms. There will be a leading firm that connects several networks of clients and suppliers may not interact directly with one another, but …


Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle Jul 2008

Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle

George H Baker

Because the operation and control of most critical infrastructures are highly dependent on electronics, it is important to understand the vulnerability of those electronics to intentional electromagnetic interference (EMI). The possibility of interference using readily available consumer devices is a particular concern. We investigated the feasibility and effectiveness of using compact stun guns to intentionally interfere with electronic systems. Test articles included individual computers and computers networked through a central hub. 60KV and 600KV devices were used in the experiments. Results indicate that stun guns are effective in disabling digital electronic systems.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs). However, entrants into the cellular industry have been confounded primarily by inexistent or weak Business Models (BMs). Designing a BM for a CNTO is complex and requires multiple actors to balance different and often conflicting design requirements. Nevertheless, most research about CNTOs has been technically oriented and has mainly addressed the technological and engineering issues related to their infrastructure. Less attention has been given to the …


Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Recent rapid advances in ICTs, specifically in Internet and mobile technologies, have highlighted the rising importance of the Business Model (BM) in Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is no consensus regarding its definition. Furthermore, understanding the BM domain by identifying its meaning, fundamental pillars, and its relevance to other business concepts is by no means complete. In this paper we aim to provide further clarification by first presenting a classification of definitions found in the IS literature; second, proposing guidelines on which to develop …