Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Business

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 536

Full-Text Articles in Physical Sciences and Mathematics

Early Detection Of Fake News On Social Media, Yang Liu Dec 2019

Early Detection Of Fake News On Social Media, Yang Liu

Dissertations

The ever-increasing popularity and convenience of social media enable the rapid widespread of fake news, which can cause a series of negative impacts both on individuals and society. Early detection of fake news is essential to minimize its social harm. Existing machine learning approaches are incapable of detecting a fake news story soon after it starts to spread, because they require certain amounts of data to reach decent effectiveness which take time to accumulate. To solve this problem, this research first analyzes and finds that, on social media, the user characteristics of fake news spreaders distribute significantly differently from those …


Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford Dec 2019

Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford

Minnesota Journal of Law, Science & Technology

No abstract provided.


A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer Dec 2019

A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer

College of Computing and Digital Media Dissertations

Empirical research on what makes digital games enjoyable is critical for practitioners who want to design for enjoyment, including for Game Design, Gamification, and Serious Games. But existing theories of what leads to digital game enjoyment have been incomplete or lacking in empirical support showing their impact on enjoyment.

Desire Fulfillment Theory is proposed as a new theory of what leads to digital game enjoyment and tested through research with people who have recently played a digital game. This theory builds on three established theories: Expectancy Disconfirmation Theory, Theory of Basic Human Desires, and Flow Theory. These three theories are …


The Economics Of Residential Solar Panels: Comparing Tiered And Time Of Use Plans, Prashanth Nyer, Candace Ybarra, Jack B. Broughton Dec 2019

The Economics Of Residential Solar Panels: Comparing Tiered And Time Of Use Plans, Prashanth Nyer, Candace Ybarra, Jack B. Broughton

Business Faculty Articles and Research

This case study uses data from a Southern California Edison residential customer on a grandfathered tiered rate plan to investigate 1) whether it is economically beneficial for the customer to switch from a tiered-rate plan to a Time-of-Use (TOU) plan, 2) whether going solar now makes financial sense for new solar customers, 3) what level of usage offset (the percentage of the customer’s annual electricity consumption that is provided by the solar panels) would result in the maximum financial benefit for the customer under each of the many TOU plans, and 4) whether solar customers on TOU plans can save …


An Ai Approach To Measuring Financial Risk, Lining Yu, Wolfgang Karl Hardle, Lukas Borke, Thijs Benschop Dec 2019

An Ai Approach To Measuring Financial Risk, Lining Yu, Wolfgang Karl Hardle, Lukas Borke, Thijs Benschop

Sim Kee Boon Institute for Financial Economics

AI artificial intelligence brings about new quantitative techniques to assess the state of an economy. Here, we describe a new measure for systemic risk: the Financial Risk Meter (FRM). This measure is based on the penalization parameter (λ" role="presentation" style="box-sizing: border-box; display: inline; font-style: normal; font-weight: normal; line-height: normal; font-size: 18px; text-indent: 0px; text-align: left; text-transform: none; letter-spacing: normal; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; position: relative;">λλ) of a linear quantile lasso regression. The FRM is calculated by taking the average …


Deep Reinforcement Learning Pairs Trading, Andrew Brim Dec 2019

Deep Reinforcement Learning Pairs Trading, Andrew Brim

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

This research applies a deep reinforcement learning technique, Deep Q-network, to a stock market pairs trading strategy for profit. Artificial intelligent methods have long since been applied to optimize trading strategies. This work trains and tests a DQN to trade co-integrated stock market prices, in a pairs trading strategy. The results demonstrate the DQN is able to consistently produce positive returns when executing a pairs trading strategy.


Optimal Control For Transboundary Pollution Under Ecological Compensation: A Stochastic Differential Game Approach, Ke Jiang, Ryan Knowles Merrill, Daming You, Pan Pan Dec 2019

Optimal Control For Transboundary Pollution Under Ecological Compensation: A Stochastic Differential Game Approach, Ke Jiang, Ryan Knowles Merrill, Daming You, Pan Pan

Research Collection Lee Kong Chian School Of Business

To account for previously ignored, yet widely observed uncertainty in nature's capability to replenish the natural environment in ways that should inform ideal design of ecological compensation (EC) regimes, this study constructs a stochastic differential game (SDG) model to analyze transboundary pollution control options between a compensating and compensated region. Equilibrium strategies in the stochastic, two player game inform optimal control theory and reveal a welfare distribution mechanism to form the basis of an improved cooperative game contract. A case-based numerical example serves to verify the theoretical results and supports three key insights. First, accounting for various random disturbance factors, …


Online Content Consumption: Social Endorsements, Observational Learning And Word-Of-Mouth, Qian Tang, Tingting Song, Liangfei Qiu, Ashish Agarwal Dec 2019

Online Content Consumption: Social Endorsements, Observational Learning And Word-Of-Mouth, Qian Tang, Tingting Song, Liangfei Qiu, Ashish Agarwal

Research Collection School Of Computing and Information Systems

The consumption of online content can occur through observational learning (OL) whereby consumers follow previous consumers’ choices or social endorsement (SE) wherein consumers receive content sharing from their social ties. As users consume content, they also generate post-consumption word-of-mouth (WOM) signals. OL, SE and WOM together shape the diffusion of the content. This study examines the drivers of SE and the effect of SE on content consumption and post-consumption WOM. In particular, we compare SE with OL. Using a random sample of 8,945 new videos posted on YouTube, we collected a multi-platform dataset consisting of data on video consumption and …


Optimal Design And Ownership Structures Of Innovative Retail Payment Systems, Zhiling Guo, Dan Ma Dec 2019

Optimal Design And Ownership Structures Of Innovative Retail Payment Systems, Zhiling Guo, Dan Ma

Research Collection School Of Computing and Information Systems

In response to the Fintech trend, an ongoing debate in the banking industry is how to design the new-generation interbank retail payment and settlement system. We propose a two-stage analytical model that takes into account the value-risk tradeoff in the new payment system design, as well as banks’ participation incentives and adoption timing decisions. We find that, as the system base value increases, banks tend to synchronize their investment and adoption decisions. When the system base value is low and banks are heterogeneous, bank association ownership maximizes social welfare. When both the system base value and bank heterogeneity are moderate, …


Quantum Consensus, Jorden Seet, Paul Griffin Dec 2019

Quantum Consensus, Jorden Seet, Paul Griffin

Research Collection School Of Computing and Information Systems

In this paper, we propose a novel consensus mechanism utilizing the quantum properties of qubits. This move from classical computing to quantum computing is shown to theoretically enhance the scalability and speed of distributed consensus as well as improve security and be a potential solution for the problem of blockchain interoperability. Using this method may circumvent the common problem known as the Blockchain Trilemma, enhancing scalability and speed without sacrificing de-centralization or byzantine fault tolerance. Consensus speed and scalability is shown by removing the need for multicast responses and exploiting quantum properties to ensure that only a single multicast is …


“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak Nov 2019

“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak

Personnel Assessment and Decisions

Artificial intelligence (AI) and machine learning (ML) have seen widespread adoption by organizations seeking to identify and hire high-quality job applicants. Yet the volume, variety, and velocity of professional involvement among I-O psychologists remains relatively limited when it comes to developing and evaluating AI/ML applications for talent assessment and selection. Furthermore, there is a paucity of empirical research that investigates the reliability, validity, and fairness of AI/ML tools in organizational contexts. To stimulate future involvement and research, we share our review and perspective on the current state of AI/ML in talent assessment as well as its benefits and potential pitfalls; …


These 5 Simple Keto Zone Tricks Will Pump Up Your Sales Almost Instantly, Keto Healthys Nov 2019

These 5 Simple Keto Zone Tricks Will Pump Up Your Sales Almost Instantly, Keto Healthys

keto healthys

Keto Zone Diet is a health improvement plan where you pursue a low-carb and high-fat Keto diet as referenced previously. Alongside that, you likewise include an extra enhancement of Keto Zone to enable your body to achieve the territory of Ketosis quicker. This enhancement helps individuals colossally in their health improvement plan because of its few properties. In any case, you have to guarantee that the high-fat and low-carb diet is pursued with full life and no "cheat dinners" so you experience the total adequacy of this extraordinary enhancement.

How to Use Keto Zone?

Utilizing Keto Zone is very simple, …


Introducing A Mobile Health Care Platform In An Underserved Rural Population: Reducing Assimilations Gaps On Adoption And Use Via Nudges, Joseph Hodges Nov 2019

Introducing A Mobile Health Care Platform In An Underserved Rural Population: Reducing Assimilations Gaps On Adoption And Use Via Nudges, Joseph Hodges

USF Tampa Graduate Theses and Dissertations

Rural communities are often overlooked when it comes to offering cutting edge consumer healthcare technologies. Mobile applications usually exclude populations in rural demographics due to the infrastructure requirements and available technology in the region. The population studied is a low income rural health plan in southwest Georgia. They are uniquely considered as they have the highest healthcare costs in the U.S. and are compared to healthcare costs among higher income populations like Vail, Colorado. Innovations, such as mobile healthcare applications, have the capacity to offset some of these costs, but even if adoption occurs, this does not guarantee use will …


Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart Nov 2019

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart

Black Issues Conference

Research has determined that Impostor Phenomenon (IP) most likely occurs in members of minority groups, students, first generation professionals and persons for whom success came quickly. Other studies have shown that many professional women are One of the ways to combat IP is through the development of competencies needed in your career. Attend this workshop to learn how to develop strategies to approach career competency while on campus and throughout your career to keep you on top of your game!


Numerical, Secondary Big Data Quality Issues, Quality Threshold Establishment, & Guidelines For Journal Policy Development, Anita Lee-Post, Ram Pakath Nov 2019

Numerical, Secondary Big Data Quality Issues, Quality Threshold Establishment, & Guidelines For Journal Policy Development, Anita Lee-Post, Ram Pakath

Marketing & Supply Chain Faculty Publications

An IS researcher may obtain Big Data from primary or secondary data sources. Sometimes, acquiring primary Big Data is infeasible due to availability, accessibility, cost, time, and/or complexity considerations. In this paper, we focus on Big Data-based IS research and discuss ways in which one may, post hoc, establish quality thresholds for numerical Big Data obtained from secondary sources. We also present guidelines for developing journal policies aimed at ensuring the veracity and verifiability of such data when used for research purposes.


Twitter And The Magic Pony, Singapore Management University Nov 2019

Twitter And The Magic Pony, Singapore Management University

Perspectives@SMU

London-based Magic Pony went from A.I. startup to a multimillion dollar cash-out in 18 months. Was selling to Twitter the right exit strategy?


Gender And Racial Diversity In Commercial Brands’ Advertising Images On Social Media, Jisun An, Haewoon Kwak Nov 2019

Gender And Racial Diversity In Commercial Brands’ Advertising Images On Social Media, Jisun An, Haewoon Kwak

Research Collection School Of Computing and Information Systems

Gender and racial diversity in the mediated images from the media shape our perception of different demographic groups. In this work, we investigate gender and racial diversity of 85,957 advertising images shared by the 73 top international brands on Instagram and Facebook. We hope that our analyses give guidelines on how to build a fully automated watchdog for gender and racial diversity in online advertisements.


Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee Nov 2019

Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee

Research Collection School Of Computing and Information Systems

We present SmrtFridge, a consumer-grade smart fridge prototype that demonstrates two key capabilities: (a) identify the individual food items that users place in or remove from a fridge, and (b) estimate the residual quantity of food items inside a refrigerated container (opaque or transparent). Notably, both of these inferences are performed unobtrusively, without requiring any explicit user action or tagging of food objects. To achieve these capabilities, SmrtFridge uses a novel interaction-driven, multi-modal sensing pipeline, where Infrared (IR) and RGB video sensing, triggered whenever a user interacts naturally with the fridge, is used to extract a foreground visual image of …


Automated Theme Search In Ico Whitepapers, Chuanjie Fu, Andrew Koh, Paul Griffin Nov 2019

Automated Theme Search In Ico Whitepapers, Chuanjie Fu, Andrew Koh, Paul Griffin

Research Collection School Of Computing and Information Systems

The authors explore how topic modeling can be used to automate the categorization of initial coin offerings (ICOs) into different topics (e.g., finance, media, information, professional services, health and social, natural resources) based solely on the content within the whitepapers. This tool has been developed by fitting a latent Dirichlet allocation (LDA) model to the text extracted from the ICO whitepapers. After evaluating the automated categorization of whitepapers using statistical and human judgment methods, it is determined that there is enough evidence to conclude that the LDA model appropriately categorizes the ICO whitepapers. The results from a two-population proportion test …


Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu Oct 2019

Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu

USF Tampa Graduate Theses and Dissertations

We use Rossler’s FaceForensics dataset of 1004 online videos and their corresponding forged counterparts [1] to investigate the ability to distinguish digitally forged facial images from original images automatically with deep learning. The proposed convolutional neural network is much smaller than the current state-of-the-art solutions. Nevertheless, the network maintains a high level of accuracy (99.6%), all while using the entire FaceForensics dataset and not including any temporal information. We implement majority voting and show the impact on accuracy (99.67%), where only 1 video of 300 is misclassified. We examine why the model misclassified this one video. In terms of tuning …


2019 Celebration Of Scholarship, Creativity, And Engagement, Beth Heldebrandt, Todd Bruns, Seth Yeakel, Matthew Eifrid Oct 2019

2019 Celebration Of Scholarship, Creativity, And Engagement, Beth Heldebrandt, Todd Bruns, Seth Yeakel, Matthew Eifrid

Programs

Scholarship, creativity, innovation, and the many forms of collaborative engagement that shape faculty life and student learning are central to the mission of Eastern Illinois University. For that reason, our faculty, department chairs, college deans, the Provost, and the entire campus community celebrate the achievements and outstanding contributions of our colleagues and students to their disciplines and professions every year. And, as the following pages illustrate, faculty engaged in continuing scholarly and creative activities that have provided outstanding mentoring experiences for our undergraduate and graduate students.

In addition to recognizing faculty performances, shows, publications, grants and other professional efforts, the …


The Wood Pellet Industry In The United States South: An Exploratory Study Of Resident Environmental, Social, And Economic Perceptions, Mason Thomas Leblanc Oct 2019

The Wood Pellet Industry In The United States South: An Exploratory Study Of Resident Environmental, Social, And Economic Perceptions, Mason Thomas Leblanc

LSU Master's Theses

This thesis research provides insight into the wood pellet manufacturing industry from the perspectives of residents in the US South, focusing on environmental, social, and economic constructs. The region is the largest producer and exporter of wood pellets in the world. The focus of previous research on wood pellets has focused on environmental, energy, and economic attributes. This study is the first of its kind to expand the research to investigate in-depth socio-economic dynamics and fill a general gap in knowledge of the relationship between the wood pellet industry and public supply-side issues in the region. Two rounds of a …


Investing In The New Blue Economy: The Changing Role Of International Development Organizations In Catalyzing Private Sector Investment In Support Of Regional Strategic Action Programmes For The Sustainable Development Of Coasts And Oceans, Ryan Whisnant, Veerle Vandeweerd Oct 2019

Investing In The New Blue Economy: The Changing Role Of International Development Organizations In Catalyzing Private Sector Investment In Support Of Regional Strategic Action Programmes For The Sustainable Development Of Coasts And Oceans, Ryan Whisnant, Veerle Vandeweerd

Journal of Ocean and Coastal Economics

Over the last 20 years, governments sharing common coastal and ocean ecosystems have developed and agreed on concrete regional action programs to stop and, in some cases, reverse a trend of deteriorating coastal and ocean resources. Implementation of these action programs requires significant investments by the public and private sectors alike, with the potential for substantial economic growth and enhanced social well-being. For this to happen, new institutional arrangements, technologies, and financial vehicles and asset classes are needed to mainstream innovative “blue economy” projects that have the potential to transition economies and communities to more sustainable development paths.

This paper …


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.