Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

4,244 Full-Text Articles 5,152 Authors 3,323,548 Downloads 228 Institutions

All Articles in Technology and Innovation

Faceted Search

4,244 full-text articles. Page 1 of 164.

Industry 4.0 Applications Towards Sustainability In Hospitality: First Waves In The Guest Room, Sanjay Nadkarni, Florian Kriechbaumer, Natasa Christodoulidou, Marcus A. Rothenberger 2023 Emirates Academy of Hospitality ManagementEmirates Academy

Industry 4.0 Applications Towards Sustainability In Hospitality: First Waves In The Guest Room, Sanjay Nadkarni, Florian Kriechbaumer, Natasa Christodoulidou, Marcus A. Rothenberger

Journal of Global Business Insights

Digitalization is positioned as an important element for the future of hospitality related services, especially since the onset of the COVID-19 pandemic (Gursoy & Chi, 2020; Shin & Kang, 2020). Historically, digitalization focused on amplifying returns by increasing revenue and operational efficiency. The hospitality industry utilizes resources intensely to function well; and when used properly, technological improvements can optimize the development of a sustainable business model. This manuscript explores the role of recent innovations in digitalization, such as Big Data, the Internet of Things (IoT), and artificial intelligence (AI) in enabling environmental sustainability in hotels. These innovations become transparent …


Reflective Journals, Tony Shannon AM 2023 CESA Dean

Reflective Journals, Tony Shannon Am

International Journal for Business Education

A reflective journal helps to think honestly about one’s actual thinking. This can be uncomfortable at first!


What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott 2023 Illinois State University

What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott

International Journal for Business Education

Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges.


The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott 2023 National University of Ireland, Galway

The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott

International Journal for Business Education

Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges. Literature on this topic offers compelling arguments for transforming pedagogy to better support acquisition of twenty-first century skills.


Uk Universities Face Their Toughest Test, Andrew Jack 2023 Global Education Editor, The Financial Times

Uk Universities Face Their Toughest Test, Andrew Jack

International Journal for Business Education

The School of Oriental and African Studies seemed a symbol of stability when it celebrated its centenary in 2016 by taking over and renovating the University of London’s imposing Senate House building in central London. It was a bold move to lure the best students. But just three years later its future has become much shakier, with its undergraduate intake down 40 percent and a £7m operating deficit. “The competition is brutal,” says Professor Stephen Hopgood, Soas’s international pro-director. “We are small and specialist, and if undergraduate fees are cut, it’s going to be very hard for an institution of …


Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford 2023 Arcadia University

Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges have largely focused on cybersecurity as a general topic. Further, most in-school CTF challenges are designed with technical institutes in mind, prepping only experienced or upper-level students in cybersecurity studies for real-world challenges. Our paper aims to focus on the setting of a liberal arts institute, emphasizing secure coding as …


Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur 2023 California State University, Bakersfield

Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur

Journal of Cybersecurity Education, Research and Practice

Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation operations for interactive authentication between the server and the IoT devices. Predominantly, the authentication is carried out by the server. It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. It is also observed that the …


Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman 2023 University of Southern Maine

Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as cybersecurity workers prepared to do research, lead multidisciplinary, technical teams, and educate stakeholders and community members. CAP also reinforces leadership skills so that the next generation of cybersecurity professionals becomes a sustainable source of management talent for the program and profession. The remote curriculum innovatively builds non-technical professional skills (communications, teamwork, leadership) for cybersecurity research …


Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid 2023 University of West Florida

Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid

Journal of Cybersecurity Education, Research and Practice

The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …


A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, 2023 University of Minnesota Law School

A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”

Minnesota Journal of Law, Science & Technology

No abstract provided.


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham 2023 University of Washington School of Law

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf 2023 University of Applied Sciences Burgenland

“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf

International Journal for Business Education

The dedicated stream of learning from others’ failure has gained increasing attention in entrepreneurship education research and—because of the COVID-19 crisis—among practitioners. The emerging literature on entrepreneurship education addresses this important phenomenon but lacks specific theoretical underpinnings; its new approaches to and empirical inquiry are one-sided. Therefore, a systematic literature review is warranted to provide a more comprehensive view of learning from others’ entrepreneurial failures and to develop a research model. Unprecedentedly, the author explores the type of research streams and gaps that can be included in a research model for entrepreneurship education research in the area of learning from …


Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry 2023 University of Nebraska–Lincoln

Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry

Markets, Globalization & Development Review

No abstract provided.


Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi 2023 Center for Educational and Instructional Technology Research Center (CEITR) / School of Advanced Studies / University of Phoenix

Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi

International Journal for Business Education

The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …


Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, shimaa mohamed ouf, Amira M. Idrees AMI 2023 Faculty of Commerce and Business Administration, Future University in Egypt

Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding …


Social Movements And Institutional Entrepreneurship As Facilitators Of Technology Transition: The Case Of Free/Open-Source Software, Sanjay Jain, Habib A. Islam, Martin C. Goossen, Anil Nair 2023 Old Dominion University

Social Movements And Institutional Entrepreneurship As Facilitators Of Technology Transition: The Case Of Free/Open-Source Software, Sanjay Jain, Habib A. Islam, Martin C. Goossen, Anil Nair

Management Faculty Publications

We integrate insights from the literature on social movements and institutional entrepreneurship into the strategic niche management (SNM) and multilevel perspective (MLP) frameworks to understand the emergence of Linux, a free/open-source operating system, in a regime dominated by proprietary operating systems such as Unix and Windows NT. Employing a “microhistories” methodology, we document how actors in the free/open-source movement took steps that enabled an alternate technological niche to form, gain momentum and eventually infiltrate the extant regime. Our account delineates the key role that actors play in shaping the identity of a niche, amplifying its presence, and finally mainstreaming it. …


R&D Subsidies In Permissive And Restrictive Environment: Evidence From Korea, Yumi KOH, Gea M. LEE 2023 Singapore Management University

R&D Subsidies In Permissive And Restrictive Environment: Evidence From Korea, Yumi Koh, Gea M. Lee

Research Collection School Of Economics

This paper investigates the extent to which a regulatory environment for R&D subsidies shapes the magnitude and direction of R&D subsidies set by a government and consequent innovation paths. When the WTO adopted a permissive regulatory environment, we find that the Korean government increased R&D subsidies significantly (89.21%) and selectively so for firms and industries with higher returns. Recipient firms conducted less basic research and more development research. Improvements in innovations were mostly incremental and minor. However, such changes did not persist once the WTO switched to a restrictive regulatory environment. Our findings show that the regulatory environment imposed by …


My Physical-Digital Self: Exploring The Detrimental Effects Of The Metaverse On Relationship & Identity Development, Sophia de Castro 2023 Claremont Colleges

My Physical-Digital Self: Exploring The Detrimental Effects Of The Metaverse On Relationship & Identity Development, Sophia De Castro

CMC Senior Theses

The metaverse, which is the next iteration of the internet--an immersive, virtual world--poses a threat to the essential human need for healthy relationship and identity development. Coming out of the COVID-19 pandemic, the effects of isolation and virtual socialization led many to prefer physical experiences, despite society’s overall dependency on and connectedness to the internet and technological devices. Framed by Maslow’s hierarchy of human psychological needs, Turkle’s analysis of the human relationship to earlier forms of virtual reality, and Foucault’s principles of caring for and knowing the self, this paper argues that the metaverse will be detrimental towards developing participant’s …


Mechanisms In Open Innovation: A Review And Synthesis Of The Literature, Ruben H.A.J. Ogink, Martin C. Goossen, A. Georges L. Romme, Henk Akkermans 2023 Old Dominion University

Mechanisms In Open Innovation: A Review And Synthesis Of The Literature, Ruben H.A.J. Ogink, Martin C. Goossen, A. Georges L. Romme, Henk Akkermans

Management Faculty Publications

A large body of literature explores the role of context, structure, actors, and outcomes of open innovation (OI), yet pays little attention to the mechanisms underlying these relationships. In this review paper, we synthesize the OI literature using a context-mechanism-outcome approach to identify and classify the various mechanisms observed in empirical OI studies. Our findings demonstrate that the OI literature draws on a wide variety of mechanisms originating from the fields of management, sociology, economics, and psychology. The fifteen mechanisms most frequently observed in the literature fall into four categories: governance and policies; environmental dynamics and interactions; knowledge, skills, and …


A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger 2022 Kennesaw State University

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger

Symposium of Student Scholars

Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …


Digital Commons powered by bepress