Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Blockchain (2)
- Algorithms (1)
- Artificial intelligence (1)
- Classification (1)
- Cleantech innovation (1)
-
- Climate risk (1)
- Cloud computing (1)
- Computer security (1)
- Cyber attacks (1)
- Cyber-physical systems (1)
- Decentralization (1)
- Device security (1)
- Digital avatar (1)
- Energy consumption (1)
- Enterprise information systems (1)
- Feed-in tariffs policy (1)
- Information recommender system (1)
- Information systems (1)
- Internet of Things (1)
- Internet of things (1)
- IoT security (1)
- Machine learning (1)
- Method for modifying carbon nanomaterials (1)
- Method for obtaining a polymeric nanocomposite material (1)
- Multivariate normality (1)
- Nanotechnologies in construction (1)
- Partial least squares (1)
- Regional development (1)
- Software (1)
- Structural equation modeling (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
A Design Concept For A Tourism Recommender System For Regional Development, Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev, Larisa Bulysheva
A Design Concept For A Tourism Recommender System For Regional Development, Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev, Larisa Bulysheva
Information Technology & Decision Sciences Faculty Publications
Despite of tourism infrastructure and software, the development of tourism is hampered due to the lack of information support, which encapsulates various aspects of travel implementation. This paper highlights a demand for integrating various approaches and methods to develop a universal tourism information recommender system when building individual tourist routes. The study objective is proposing a concept of a universal information recommender system for building a personalized tourist route. The developed design concept for such a system involves a procedure for data collection and preparation for tourism product synthesis; a methodology for tourism product formation according to user preferences; the …
Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang
Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang
Information Technology & Decision Sciences Faculty Publications
Partial least squares structural equation modeling (PLS-SEM) has gained popularity among researchers in part due to its relaxed requirement for multivariate normality. One important step in performing structural equation modeling (SEM) is to test the normality assumption. In this paper, we illustrate how to assess univariate and multivariate normality in PLS-SEM using WarpPLS.
How Do Sustainability Stakeholders Seize Climate Risk Premia In The Private Cleantech Sector, Lingyu Li, Xianrong Zheng
How Do Sustainability Stakeholders Seize Climate Risk Premia In The Private Cleantech Sector, Lingyu Li, Xianrong Zheng
Information Technology & Decision Sciences Faculty Publications
This paper explores the strategies and practices of capturing climate risk premia for venture capital (VC) fund managers and entrepreneurs in the private cleantech sector. It also examines the impact of the feed-in tariffs (FITs) policy on the management of cleantech investments. It is shown that a longer investment period, less investment capital in cleantech investment management strategies, and optimistic climate risk management practices will help investors to better capture climate risk premia. In fact, the FITs policy will give rise to VC fund managers and entrepreneurs having a positive view regarding the prospects of the cleantech sector, motivating them …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova
Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova
Information Technology & Decision Sciences Faculty Publications
Introduction. Advanced technologies inspire people by demonstrating the latest achievements (materials, methods, systems, technologies, devices etc.) that dramatically change the world. This, first of all, concerns nanotechnological inventions designed by scientists, engineers and specialists from different countries. Main part. The article provides an abstract overview of inventions of scientists, engineers and specialists from different countries: Germany, Russia, China, USA et al. The results of the creative activity of scientists, engineers and specialists, including inventions in the field of nanotechnology and nanomaterials allow, when introduced to industry, achieving a significant effect in construction, housing and communal services, and related sectors of …
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
Information Technology & Decision Sciences Faculty Publications
[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …