Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 144

Full-Text Articles in Business

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Dec 2012

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

MIS/OM/DS Faculty Publications

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


Knowledge-Driven Autonomous Commodity Trading Advisor, Yee Pin Lim, Shih-Fen Cheng Dec 2012

Knowledge-Driven Autonomous Commodity Trading Advisor, Yee Pin Lim, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

The myth that financial trading is an art has been mostly destroyed in the recent decade due to the proliferation of algorithmic trading. In equity markets, algorithmic trading has already bypass human traders in terms of traded volume. This trend seems to be irreversible, and other asset classes are also quickly becoming dominated by the machine traders. However, for asset that requires deeper understanding of physicality, like the trading of commodities, human traders still have significant edge over machines. The primary advantage of human traders in such market is the qualitative expert knowledge that requires traders to consider not just …


Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf Dec 2012

Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf

School of Computer Science & Engineering Faculty Publications

“The Rules” are found in a collaborative document (started in March 2010) that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system. At this writing, over 50 people from nine countries have signed onto The Rules (Ad Hoc Committee, 2010). Unlike codes of ethics, The Rules are not tied to any organization, and computer users as well as computing professionals are invited to sign onto The Rules. The emphasis in The Rules is that both users and professionals have responsibilities in the production and use of computing artifacts. In this paper, we …


An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu Dec 2012

An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …


Reputation As Public Policy For Internet Security: A Field Study, Qian Tang, Leigh L. Linden, John S. Quarterman, Andrew Whinston Dec 2012

Reputation As Public Policy For Internet Security: A Field Study, Qian Tang, Leigh L. Linden, John S. Quarterman, Andrew Whinston

Research Collection School Of Computing and Information Systems

Cybersecurity is a national priority in this big data era. Because of the lack of incentives and the existence of negative externality, companies often underinvest in addressing security risks and accidents, despite government and industry recommendations. In the present article, we propose a method that utilizes reputation through information disclosure to motivate companies to behave pro-socially, improving their Internet security. Using outbound spam as a proxy for Internet security, we conducted a quasiexperimental field study for eight countries through SpamRankings.net. This outgoingspam-based study shows that information disclosure on outgoing spam can help reduce outgoing spam, approximately by 16 percent. This …


Use Of Rss Feeds To Push The Online Content To Users, Dan Ma Dec 2012

Use Of Rss Feeds To Push The Online Content To Users, Dan Ma

Research Collection School Of Computing and Information Systems

Many websites use Really Simple Syndication (RSS) feeds to actively push their online content to users rather than waiting for users to pull the content passively. In this paper, I construct a theoretical game model to study the profitability of an RSS-PUSH delivery mechanism. The model assumes a general profit structure for websites and heterogeneous users. To access valuable online content, users incur a variety of costs. They choose either to visit the website in the conventional way (the PULL model) or, if it is supported by the website, to use RSS (the PUSH model). Interestingly, I show that although …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Financial Trading Systems Using Artificial Neural Networks, Bruce Vanstone, Gavin Finnie Nov 2012

Financial Trading Systems Using Artificial Neural Networks, Bruce Vanstone, Gavin Finnie

Bruce Vanstone

Soft computing represents that area of computing adapted from the physical sciences. Artificial intelligence techniques within this realm attempt to solve problems by applying physical laws and processes. This style of computing is particularly tolerant of imprecision and uncertainty, making the approach attractive to those researching within “noisy” realms, where the signal-to-noise ratio is quite low. Soft computing is normally accepted to include the three key areas of fuzzy logic, artificial neural networks, and probabilistic reasoning (which include genetic algorithms, chaos theory, etc.). The arena of investment trading is one such field where there is an abundance of noisy data. …


Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie Nov 2012

Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Bruce Vanstone

The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.


Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie Nov 2012

Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Tobias Hahn

No abstract provided.


Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie Nov 2012

Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Tobias Hahn

The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.


Information And Competitive Strategy In A Networked Economy, Robert J. Kauffman, Thomas A. Weber, D. J. Wu Nov 2012

Information And Competitive Strategy In A Networked Economy, Robert J. Kauffman, Thomas A. Weber, D. J. Wu

Research Collection School Of Computing and Information Systems

>One of the transformative changes over the past decade has been the way networks have enabled the distributed generation of value and how businesses and organizations have managed to capture a portion of this value. This has resulted in a plethora of innovative business ideas and new strategies. The present special section deals with the incentives for distributed content generation; counterintuitive network effects in the security software market, which features an intrinsic negative externality; and the possibility for collaboration between different platforms in a two-sided market. The included papers offer an interesting mix of theoretical and practical insights. All of …


Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu Nov 2012

Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper sets out by reviewing the key elements of a Science or Technology Park in the context of open innovation. This is followed by a broad scan of Science and Technology Park activity in South and South East Asia. The paper proceeds to discuss Singapore’s continuous efforts to create new Science and Technology park models and presents a new approach the Singapore Management University has pursued for catalyzing valorization. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Oct 2012

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Content Contribution For Revenue Sharing And Reputation: A Dynamic Structural Model, Qian Tang, Bin Gu, Andrew B. Whinston Oct 2012

Content Contribution For Revenue Sharing And Reputation: A Dynamic Structural Model, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This study examines the incentives for content contribution in social media. We propose that exposure and reputation are the major incentives for contributors. Besides, as more and more social media Web sites offer advertising-revenue sharing with some of their contributors, shared revenue provides an extra incentive for contributors who have joined revenue-sharing programs. We develop a dynamic structural model to identify a contributor's underlying utility function from observed contribution behavior. We recognize the dynamic nature of the content-contribution decision-that contributors are forward-looking, anticipating how their decisions affect future rewards. Using data collected from YouTube, we show that content contribution is …


3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan Oct 2012

3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan

Computer Science Faculty Publications

Considering the continuously increasing availability and accessibility of 3D media and the depth camera such as Kinect, we demonstrate an innovative 3D media system called 3DME. The objective of this demo is three-fold.

First, the demo exhibits the creation of 3D images from RGB-D images. Second, 3DME allows a user to insert impressive effects to the produced 3D content. Last but not least, our demo is one of the first attempts toward advertising with 3D content.


Wikis: The Perfect Platform For Library Policies And Procedures, Melanie J. Dunn Oct 2012

Wikis: The Perfect Platform For Library Policies And Procedures, Melanie J. Dunn

The Southeastern Librarian

The term wiki, derived from the Hawaiian adjective “wiki wiki” meaning quick or fast, was coined by Ward Cunningham who created the original WikiWikiWeb for the Portland Pattern Repository (Leuf, 2001, 15). Touted by Cunningham as “the simplest online database that could possibly work” (Cunningham, 2002, June 27) “ wiki” is alternately used to refer to both a wiki website and the software used to create and maintain it and was designed to allow multiple users to collaborate in its development (Klobas 2006, 3). Wikipedia is perhaps one of the best examples, as well as the most recognized, of wikis. …


Search Engine Optimization: Best Practices For Google, Tucker Johnson Oct 2012

Search Engine Optimization: Best Practices For Google, Tucker Johnson

UNLV Theses, Dissertations, Professional Papers, and Capstones

The internet is a major delivery system of hotel reservations. Approximately 25% of all reservations made at a hotel come directly through the hotel’s website (Douglas, 2012). Another 11% of total reservations are booked online through online travel agent websites, or OTAs, such as Priceline.com or Expedia.com (Douglas, 2012). These additional reservations booked through the OTAs come at a cost to the hotel, however. Typical commissions for OTAs are approximately 25 % of a total booking (Sanders, 2012). In 2010, it was estimated that the commissions associated with these OTA bookings cost hoteliers 2.5 billion dollars (Douglas, 2012). Because of …


The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali Oct 2012

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali

Engineering Management & Systems Engineering Theses & Dissertations

This research explores the role that budget for Information System (IS) and technical expertise of healthcare service provider staff play on the successful leap from a partial to exhaustive implementation of Electronic Health Records (EHR) Systems. Technical expertise in Information Systems might not be easily measurable directly, but there are a number of indicators that could be used as a proxy, such as: Information System (IS) Department Budget, number of IS staff and the extent of technical trainings provided by the IS department to the clinical staff. This research study hypothesizes that quality technical trainings conducted by an IS department …


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …