Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Old Dominion University

Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 92

Full-Text Articles in Business

Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Instructional Module 2 for course, Developing Technology Foresight: Case Study of AI in InsurTech.


Introduction To The Course, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Introduction To The Course, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

This PDF document describes the course, Developing Technology Foresight: Case Study of AI in InsurTech, and includes learning outcomes and a course outline.


Insurtech And Underwriting, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Underwriting, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions regarding InsurTech and underwriting work.


Insurtech And Actuarial, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Actuarial, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions regarding InsurTech and actuarial work.


Insurtech And Claims, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

Insurtech And Claims, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar

Developing Technology Foresight: Case Study of AI in InsurTech

Questions related to InsurTech and claims.


Can I Touch The Clothes On The Screen? The Touch Effect In Online Shopping, Ha Kyung Lee, Dooyoung Choi Jan 2022

Can I Touch The Clothes On The Screen? The Touch Effect In Online Shopping, Ha Kyung Lee, Dooyoung Choi

STEMPS Faculty Publications

We examined the interplay effects of device types (touch vs. non-touch) and the tactile sensitivity (fur vs. woven) on the product attitudes mediated by the mental simulation for touch. The participants from MTurk were randomly assigned to one of two tactile conditions. Responses from those who used tablets (n=83, touch device) and laptops (n=96, non-touch device) were included in the analysis. The main effects of device types and tactile-sensitivity on the mental simulation for touch were significant. The interaction effect of device types and tactile sensitivity was also significant. Those participants seeing the less tactile-sensitive product showed greater mental simulation …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh Jan 2022

Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh

Information Technology & Decision Sciences Faculty Publications

Artificial intelligence (AI) enables continuous monitoring of patients’ health, thus improving the quality of their health care. However, prior studies suggest that individuals resist such innovative technology. In contrast to prior studies that investigate individuals’ decisions for themselves, we focus on family members’ rejection of AI monitoring, as family members play a significant role in health care decisions. Our research investigates competing effects of emotions toward the rejection of AI monitoring for health care. Based on two scenario-based experiments, our study reveals that emotions play a decisive role in family members’ decision making on behalf of their parents. We find …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah Jan 2022

Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah

Cybersecurity Undergraduate Research Showcase

Credit risk analysis and making accurate investment and lending decisions has been a challenge for the financial industry for many years, as can be seen with the 2008 financial crisis. However, with the rise of machine learning models and predictive analytics, there has been a shift to increased reliance on technology for determining credit risk. This transition to machine learning comes with both advantages, such as potentially eliminating human error and assumptions from lending decisions, and disadvantages, such as time constraints, data usage inabilities, and lack of understanding nuances in machine learning models. In this paper, I look at four …


The Effect Of Touch Simulation In Virtual Reality Shopping, Ha Kyung Lee, Namhee Yoon, Dooyoung Choi Jan 2022

The Effect Of Touch Simulation In Virtual Reality Shopping, Ha Kyung Lee, Namhee Yoon, Dooyoung Choi

STEMPS Faculty Publications

This study aims to explore the effect of touch simulation on virtual reality (VR) store satisfaction mediated by VR shopping self-efficacy and VR shopping pleasure. The moderation effects of the autotelic and instrumental need for touch between touch simulation and VR store satisfaction are also explored. Participants wear a head-mounted display VR device (Oculus Go) in a controlled laboratory environment, and their VR store experience is recorded as data. All participants’ responses (n = 58) are analyzed using SPSS 20.0 for descriptive statistics, reliability analysis, exploratory factor analysis, and the Process macro model analysis. The results show that touch simulation …


Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu Jan 2022

Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu

Electrical & Computer Engineering Faculty Publications

Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez Nov 2021

The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez

Political Science & Geography Faculty Publications

This paper contends that Maritime Domain Awareness Center (MDAC) design should be a holistic approach integrating established knowledge about human factors, decision making, cognitive tasks, complexity science, and human information interaction. The design effort should not be primarily a technology effort that focuses on computer screens, information feeds, display technologies, or user interfaces. The existence of a room with access to vast amounts of information and wall-to-wall video screens of ships, aircraft, weather data, and other regional information does not necessarily correlate to possessing situation awareness. Fundamental principles of human-centered information design should guide MDAC design and technology selection, and …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …


Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano Jan 2021

Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano

VMASC Publications

The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …


Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee Jan 2021

Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee

Computational Modeling & Simulation Engineering Faculty Publications

Modelling and simulation (M&S) techniques are frequently used in Operations Research (OR) to aid decision-making. With growing complexity of systems to be modelled, an increasing number of studies now apply multiple M&S techniques or hybrid simulation (HS) to represent the underlying system of interest. A parallel but related theme of research is extending the HS approach to include the development of hybrid models (HM). HM extends the M&S discipline by combining theories, methods and tools from across disciplines and applying multidisciplinary, interdisciplinary and transdisciplinary solutions to practice. In the broader OR literature, there are numerous examples of cross-disciplinary approaches in …


Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu Jan 2021

Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …


Detecting Incentivized Review Groups With Co-Review Graph, Yubao Zhang, Shuai Hao, Haining Wang Jan 2021

Detecting Incentivized Review Groups With Co-Review Graph, Yubao Zhang, Shuai Hao, Haining Wang

Computer Science Faculty Publications

Online reviews play a crucial role in the ecosystem of nowadays business (especially e-commerce platforms), and have become the primary source of consumer opinions. To manipulate consumers’ opinions, some sellers of e-commerce platforms outsource opinion spamming with incentives (e.g., free products) in exchange for incentivized reviews. As incentives, by nature, are likely to drive more biased reviews or even fake reviews. Despite e-commerce platforms such as Amazon have taken initiatives to squash the incentivized review practice, sellers turn to various social networking platforms (e.g., Facebook) to outsource the incentivized reviews. The aggregation of sellers who …


Measurement Study Of Energy Impact On Blockchain Technologies: Cryptocurrency Mining, Qaylin Holliman Jan 2021

Measurement Study Of Energy Impact On Blockchain Technologies: Cryptocurrency Mining, Qaylin Holliman

Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

Blockchain technology facilitates the flow of information and the speed of information through a faster and more decentralized network. It has its advantages as compared to more centralized networks and legacy networks. With the evolution of mainstream technology, blockchains is predicted to be more effective and sufficient to consumers and commercial companies. In this paper, blockchains will be scaled to cryptocurrency mining, where cryptocurrencies utilize blockchain technology to record transactions and orders. Mining will also be examined through energy consumption, the algorithms behind some cryptocurrencies, their sustainability issue, and resolutions to combat high energy consumption. While the pace of energy …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …


Improving Stock Trading Decisions Based On Pattern Recognition Using Machine Learning Technology, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu, Bingbing Jiang Jan 2021

Improving Stock Trading Decisions Based On Pattern Recognition Using Machine Learning Technology, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu, Bingbing Jiang

Information Technology & Decision Sciences Faculty Publications

PRML, a novel candlestick pattern recognition model using machine learning methods, is proposed to improve stock trading decisions. Four popular machine learning methods and 11 different features types are applied to all possible combinations of daily patterns to start the pattern recognition schedule. Different time windows from one to ten days are used to detect the prediction effect at different periods. An investment strategy is constructed according to the identified candlestick patterns and suitable time window. We deploy PRML for the forecast of all Chinese market stocks from Jan 1, 2000 until Oct 30, 2020. Among them, the data from …


Stock Trend Prediction Using Candlestick Charting And Ensemble Machine Learning Techniques With A Novelty Feature Engineering Scheme, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu Jan 2021

Stock Trend Prediction Using Candlestick Charting And Ensemble Machine Learning Techniques With A Novelty Feature Engineering Scheme, Yaohu Lin, Shancun Liu, Haijun Yang, Harris Wu

Information Technology & Decision Sciences Faculty Publications

Stock market forecasting is a knotty challenging task due to the highly noisy, nonparametric, complex and chaotic nature of the stock price time series. With a simple eight-trigram feature engineering scheme of the inter-day candlestick patterns, we construct a novel ensemble machine learning framework for daily stock pattern prediction, combining traditional candlestick charting with the latest artificial intelligence methods. Several machine learning techniques, including deep learning methods, are applied to stock data to predict the direction of the closing price. This framework can give a suitable machine learning prediction method for each pattern based on the trained results. The investment …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen Jan 2021

Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen

Computational Modeling & Simulation Engineering Faculty Publications

While the minimum cost flow (MCF) problems have been well documented in many publications, due to its broad applications, little or no effort have been devoted to explaining the algorithms for identifying loop formation and computing the value needed to solve MCF network problems. This paper proposes efficient algorithms, and MATLAB computer implementation, for solving MCF problems. Several academic and real-life network problems have been solved to validate the proposed algorithms; the numerical results obtained by the developed MCF code have been compared and matched with the built-in MATLAB function Linprog() (Simplex algorithm) for further validation.


A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil Jan 2021

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil

Engineering Management & Systems Engineering Faculty Publications

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …


Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin Jan 2021

Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin

Engineering Management & Systems Engineering Faculty Publications

In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …


Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz Aug 2020

Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz

Engineering Management & Systems Engineering Theses & Dissertations

Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …