Industry 4.0 Applications Towards Sustainability In Hospitality: First Waves In The Guest Room,
2023
Emirates Academy of Hospitality ManagementEmirates Academy
Industry 4.0 Applications Towards Sustainability In Hospitality: First Waves In The Guest Room, Sanjay Nadkarni, Florian Kriechbaumer, Natasa Christodoulidou, Marcus A. Rothenberger
Journal of Global Business Insights
Digitalization is positioned as an important element for the future of hospitality related services, especially since the onset of the COVID-19 pandemic (Gursoy & Chi, 2020; Shin & Kang, 2020). Historically, digitalization focused on amplifying returns by increasing revenue and operational efficiency. The hospitality industry utilizes resources intensely to function well; and when used properly, technological improvements can optimize the development of a sustainable business model. This manuscript explores the role of recent innovations in digitalization, such as Big Data, the Internet of Things (IoT), and artificial intelligence (AI) in enabling environmental sustainability in hotels. These innovations become transparent …
Reflective Journals,
2023
CESA Dean
Reflective Journals, Tony Shannon Am
International Journal for Business Education
A reflective journal helps to think honestly about one’s actual thinking. This can be uncomfortable at first!
What Kind Of Pedagogies For The 21st Century?,
2023
Illinois State University
What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott
International Journal for Business Education
Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges.
The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?,
2023
National University of Ireland, Galway
The Futures Of Learning 3: What Kind Of Pedagogies For The 21st Century?, Cynthia Luna Scott
International Journal for Business Education
Since the emergence of a global movement that calls for a new model of learning for the twenty first century, it has been argued that formal education must be transformed to enable new forms of learning that are needed to tackle complex global challenges. Literature on this topic offers compelling arguments for transforming pedagogy to better support acquisition of twenty-first century skills.
Uk Universities Face Their Toughest Test,
2023
Global Education Editor, The Financial Times
Uk Universities Face Their Toughest Test, Andrew Jack
International Journal for Business Education
The School of Oriental and African Studies seemed a symbol of stability when it celebrated its centenary in 2016 by taking over and renovating the University of London’s imposing Senate House building in central London. It was a bold move to lure the best students. But just three years later its future has become much shakier, with its undergraduate intake down 40 percent and a £7m operating deficit. “The competition is brutal,” says Professor Stephen Hopgood, Soas’s international pro-director. “We are small and specialist, and if undergraduate fees are cut, it’s going to be very hard for an institution of …
Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs,
2023
Arcadia University
Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford
Journal of Cybersecurity Education, Research and Practice
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges have largely focused on cybersecurity as a general topic. Further, most in-school CTF challenges are designed with technical institutes in mind, prepping only experienced or upper-level students in cybersecurity studies for real-world challenges. Our paper aims to focus on the setting of a liberal arts institute, emphasizing secure coding as …
Lightweight Pairwise Key Distribution Scheme For Iots,
2023
California State University, Bakersfield
Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur
Journal of Cybersecurity Education, Research and Practice
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation operations for interactive authentication between the server and the IoT devices. Predominantly, the authentication is carried out by the server. It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. It is also observed that the …
Reinventing Cybersecurity Internships During The Covid-19 Pandemic,
2023
University of Southern Maine
Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as cybersecurity workers prepared to do research, lead multidisciplinary, technical teams, and educate stakeholders and community members. CAP also reinforces leadership skills so that the next generation of cybersecurity professionals becomes a sustainable source of management talent for the program and profession. The remote curriculum innovatively builds non-technical professional skills (communications, teamwork, leadership) for cybersecurity research …
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic,
2023
University of West Florida
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid
Journal of Cybersecurity Education, Research and Practice
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …
A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”,
2023
University of Minnesota Law School
A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”
Minnesota Journal of Law, Science & Technology
No abstract provided.
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation,
2023
University of Washington School of Law
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Washington Journal of Law, Technology & Arts
Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …
“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations,
2023
University of Applied Sciences Burgenland
“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf
International Journal for Business Education
The dedicated stream of learning from others’ failure has gained increasing attention in entrepreneurship education research and—because of the COVID-19 crisis—among practitioners. The emerging literature on entrepreneurship education addresses this important phenomenon but lacks specific theoretical underpinnings; its new approaches to and empirical inquiry are one-sided. Therefore, a systematic literature review is warranted to provide a more comprehensive view of learning from others’ entrepreneurial failures and to develop a research model. Unprecedentedly, the author explores the type of research streams and gaps that can be included in a research model for entrepreneurship education research in the area of learning from …
Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022),
2023
University of Nebraska–Lincoln
Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry
Markets, Globalization & Development Review
No abstract provided.
Revisiting Cybersecurity Awareness In The Midst Of Disruptions,
2023
Center for Educational and Instructional Technology Research Center (CEITR) / School of Advanced Studies / University of Phoenix
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
International Journal for Business Education
The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …
Key Performance Indicators Detection Based Data Mining,
2023
Faculty of Commerce and Business Administration, Future University in Egypt
Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding …
Social Movements And Institutional Entrepreneurship As Facilitators Of Technology Transition: The Case Of Free/Open-Source Software,
2023
Old Dominion University
Social Movements And Institutional Entrepreneurship As Facilitators Of Technology Transition: The Case Of Free/Open-Source Software, Sanjay Jain, Habib A. Islam, Martin C. Goossen, Anil Nair
Management Faculty Publications
We integrate insights from the literature on social movements and institutional entrepreneurship into the strategic niche management (SNM) and multilevel perspective (MLP) frameworks to understand the emergence of Linux, a free/open-source operating system, in a regime dominated by proprietary operating systems such as Unix and Windows NT. Employing a “microhistories” methodology, we document how actors in the free/open-source movement took steps that enabled an alternate technological niche to form, gain momentum and eventually infiltrate the extant regime. Our account delineates the key role that actors play in shaping the identity of a niche, amplifying its presence, and finally mainstreaming it. …
R&D Subsidies In Permissive And Restrictive Environment: Evidence From Korea,
2023
Singapore Management University
R&D Subsidies In Permissive And Restrictive Environment: Evidence From Korea, Yumi Koh, Gea M. Lee
Research Collection School Of Economics
This paper investigates the extent to which a regulatory environment for R&D subsidies shapes the magnitude and direction of R&D subsidies set by a government and consequent innovation paths. When the WTO adopted a permissive regulatory environment, we find that the Korean government increased R&D subsidies significantly (89.21%) and selectively so for firms and industries with higher returns. Recipient firms conducted less basic research and more development research. Improvements in innovations were mostly incremental and minor. However, such changes did not persist once the WTO switched to a restrictive regulatory environment. Our findings show that the regulatory environment imposed by …
My Physical-Digital Self: Exploring The Detrimental Effects Of The Metaverse On Relationship & Identity Development,
2023
Claremont Colleges
My Physical-Digital Self: Exploring The Detrimental Effects Of The Metaverse On Relationship & Identity Development, Sophia De Castro
CMC Senior Theses
The metaverse, which is the next iteration of the internet--an immersive, virtual world--poses a threat to the essential human need for healthy relationship and identity development. Coming out of the COVID-19 pandemic, the effects of isolation and virtual socialization led many to prefer physical experiences, despite society’s overall dependency on and connectedness to the internet and technological devices. Framed by Maslow’s hierarchy of human psychological needs, Turkle’s analysis of the human relationship to earlier forms of virtual reality, and Foucault’s principles of caring for and knowing the self, this paper argues that the metaverse will be detrimental towards developing participant’s …
Mechanisms In Open Innovation: A Review And Synthesis Of The Literature,
2023
Old Dominion University
Mechanisms In Open Innovation: A Review And Synthesis Of The Literature, Ruben H.A.J. Ogink, Martin C. Goossen, A. Georges L. Romme, Henk Akkermans
Management Faculty Publications
A large body of literature explores the role of context, structure, actors, and outcomes of open innovation (OI), yet pays little attention to the mechanisms underlying these relationships. In this review paper, we synthesize the OI literature using a context-mechanism-outcome approach to identify and classify the various mechanisms observed in empirical OI studies. Our findings demonstrate that the OI literature draws on a wide variety of mechanisms originating from the fields of management, sociology, economics, and psychology. The fifteen mechanisms most frequently observed in the literature fall into four categories: governance and policies; environmental dynamics and interactions; knowledge, skills, and …
A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring,
2022
Kennesaw State University
A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger
Symposium of Student Scholars
Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …