Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

2023

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 307

Full-Text Articles in Business

Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang Dec 2023

Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang

Fordham Journal of Corporate & Financial Law

Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …


An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper Dec 2023

An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper

International Journal for Business Education

This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …


The Impact Of Adopting Digital Twins In Urban Development, Mohammed Ali Berawi, Perdana Miraj, Mustika Sari Dec 2023

The Impact Of Adopting Digital Twins In Urban Development, Mohammed Ali Berawi, Perdana Miraj, Mustika Sari

CSID Journal of Infrastructure Development

The construction industry, which plays a pivotal role in urban development, has undergone a significant transformation in recent years. This transformation is largely marked by the rise of digitalization, a phenomenon fundamentally altering how we design, construct, and operate our urban environments. At the forefront of this paradigm shift is the notion of Digital Twins (DT), which entails a dynamic and virtual representation of tangible assets. Urban development has witnessed a growing adoption of this innovative approach to improve cities' infrastructure planning, construction, and management. Digital Twin enables real-time simulation and monitoring, enhancing performance and more informed decision-making. Therefore, implementing …


Interacting Action Of Alkali-Silica Reaction And Chloride-Induced Steel Corrosion On The Reinforced Concrete Structures – A Critical Review, Williams Dunu Dec 2023

Interacting Action Of Alkali-Silica Reaction And Chloride-Induced Steel Corrosion On The Reinforced Concrete Structures – A Critical Review, Williams Dunu

CSID Journal of Infrastructure Development

The degradation of reinforced concrete (RC) structures amidst the progression of corrosion within alkali-silica reaction (ASR)-affected structures is a complex phenomenon marked by diverse causal factors and repercussions. While the initiation phase of chloride-induced steel corrosion and ASR in RC structures has received extensive scrutiny, insufficient attention has been dedicated to comprehending the propagation phase (tp). Therefore, this study addresses this gap by centering its focus on the propagation phase, driven by the imperative need to formulate efficient and sustainable maintenance, repair, and management strategies for RC structures grappling with the concurrent impacts of degradation mechanisms such as ASR and …


Assessment Of Infrastructure Development Approach In Newly Created Districts In Zambia: Case Study, Chimanga Kabwe, Musonda Innocent, Franco Muleya Dec 2023

Assessment Of Infrastructure Development Approach In Newly Created Districts In Zambia: Case Study, Chimanga Kabwe, Musonda Innocent, Franco Muleya

CSID Journal of Infrastructure Development

This article evaluates the infrastructure development plans in Zambia's newly established districts, primarily focusing on assessing their effectiveness. Infrastructure development encompasses various strategies, and this study investigates the factors influencing the selection of these strategies for implementing infrastructure projects in Zambia. Through structured interviews and questionnaires distributed to 500 respondents, the research highlights the critical role of community involvement. Communities play a pivotal role in identifying essential amenities, setting priorities for infrastructure construction, incorporating their ideas, and participating in the planning process for executing infrastructure projects. The analysis reveals that community members held varying perspectives on the significance of infrastructure …


Integrating Technology And Traditional Systems In Regional Revitalisation; Insights From Japanese Practices, Fathelalem Ali Hija, Yasuki Shima, Yuji Arakaki Dec 2023

Integrating Technology And Traditional Systems In Regional Revitalisation; Insights From Japanese Practices, Fathelalem Ali Hija, Yasuki Shima, Yuji Arakaki

BAU Journal - Science and Technology

This study examines the integration of Information and Communication Technology (ICT) solutions and advanced technology practices and their coexistence with conventional systems and initiatives that have been operating in different regions of Japan to address some of the socio-economic challenges. The methodological approach of the study includes three facets, namely government initiatives, technology involvement and local society actors. The study examines government visions and initiatives that emphasize the use of advanced technology as a key factor and tool to enable solutions and realize the target vision. The ageing population and economic stagnation are common challenges in different regions of Japan. …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Whither India’S Development: Toward Being A Super Power Or A Super Civilization?, Pradip Khandwalla Dec 2023

Whither India’S Development: Toward Being A Super Power Or A Super Civilization?, Pradip Khandwalla

Markets, Globalization & Development Review

This commentary was triggered by my reading a lecture delivered by Saurabh Kumar, a former student of mine at Indian Institute of Management, who later served as India’s ambassador in various countries and international bodies. He bemoaned that China had much greater status in global affairs than India. Many others in India hanker for a super power status for India. I find this concern to be somewhat misguided. India should be aiming to be a great civilization, rather than a domineering superpower. The record of all the superpowers till now has been quite spotty in humane terms. My vision for …


Social Engineering Cyber Threats, Young B. Choi, Josh Rubin Dec 2023

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Apple: Global Ethics And Transformational Leadership, Bisma Ahmed Dec 2023

Apple: Global Ethics And Transformational Leadership, Bisma Ahmed

Journal of Global Awareness

Apple Inc. is an American technological company that designs, manufactures, and sells various products such as laptops, phones, accessories, streaming services, licensing services, and so much more. The paper explores the corporate responsibility and unethical business practices that arise from the global sourcing of Apple’s products. The company established many relationships with suppliers in East Asia to meet the rigorous demands of consumers, promising high-quality products at the expense of factory workers. However, global sourcing comes with unethical business practices. There have been various cases against Apple’s suppliers. This research highlights unfair working conditions, overworking employees, and environmental pollution that …


The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz Dec 2023

The Coming Transformative Impact Of Large Language Models And Artificial Intelligence On Global Business And Education, Eva K. Jermakowicz

Journal of Global Awareness

Rapid advances in the capabilities of Large Language Models (LLM) as a basis for Artificial Intelligence (AI) applications, and their sudden wide accessibility, have garnered significant attention recently. These technologies (e.g., ChatGPT, BARD), which have the ability to predict and generate human language, have led to excitement and concerns regarding their use in various industries. This paper explores the history of LLM, examines their applications in business and education, and delves into the critical ethical concerns and challenges of these emerging technologies to ensure that their uses are not only effective, but also responsible and equitable.


Educator Preparedness To Leverage Assistive Technologies In The Classroom, Sean Masterman Dec 2023

Educator Preparedness To Leverage Assistive Technologies In The Classroom, Sean Masterman

Doctorate in Education

The fourth industrial revolution (4IR) is driving a compelling need for pedagogical change, yet there is disjuncture between the capacity of emerging technologies to address this need and their actual use in the American classroom. These technologies can enable personalization to meet each student’s individualized learning needs. Educator preparedness is the first step toward embracing and integrating the broad capabilities of emerging technologies to help build the future workforce. This qualitative, phenomenological case study assessed the preparedness of middle school general educators in two Minnesota school districts to leverage assistive technologies (ATs) to improve student learning from the perspective of …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Smes “Growing Smart”: The Complementarity Of Intangible And Digital Investment In Small Firms And Their Contribution To Firm Performance, Eva Erjavec, Tjaša Redek, Črt Kostevc Dec 2023

Smes “Growing Smart”: The Complementarity Of Intangible And Digital Investment In Small Firms And Their Contribution To Firm Performance, Eva Erjavec, Tjaša Redek, Črt Kostevc

Economic and Business Review

Like large companies, small and medium-sized companies (SMEs) are turning to new digital technologies and knowledge-based capital to bolster their productivity and growth. However, data show that smaller companies lag significantly in implementing new Industry 4.0 technologies and in the intensity of their use. Lack of skills and human capital is often cited as one of the biggest barriers. This paper examines the benefits of digital technologies, intangible capital, and in particular the role of complementary investments in new technologies and intangible capital to maximize the impact on productivity growth. The analysis draws on extensive firm-level datasets combining business and …


The Economics Of Financial Scams: Evidence From Initial Coin Offerings, Kenny Phua, Bo Sang, Chi Shen Wei, Yang Yu Dec 2023

The Economics Of Financial Scams: Evidence From Initial Coin Offerings, Kenny Phua, Bo Sang, Chi Shen Wei, Yang Yu

Research Collection Lee Kong Chian School Of Business

We examine the economics of financial scams by analyzing the market for initial coin offerings (ICOs). Using data snapshots of 5,873 ICOs, we find that irregularities in ICO characteristics across listing websites predict higher scam risk and are likely intentional. These patterns are consistent with a model where malicious issuers maximize profits by using irregularities to screen for naïve investors. Almost half of the ICOs in our sample may be scams, amounting to more than U.S. $6 billion in losses. Our results draw attention to the frequent use of screening mechanisms in financial scams.


Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh Dec 2023

Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect machine failure. The research questions are: Q1) How does the quality of input data, including issues such as outliers, and noise, impact the accuracy and reliability of machine failure prediction models in industrial settings? Q2) How does the integration of SMOTE with feature engineering techniques influence the overall performance of machine learning models in detecting and preventing machine failures? Q3) What is the performance of different machine learning algorithms in predicting machine failures, and which algorithm is the most effective? The research findings are: Q1) Effective outlier …


Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta Dec 2023

Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …


The Digital Engine Model: Lead Generation Through Applied Dcm Strategies, Kyle A. Huggins, John D. Hansen Dec 2023

The Digital Engine Model: Lead Generation Through Applied Dcm Strategies, Kyle A. Huggins, John D. Hansen

Journal of Applied Marketing Theory

Digital Content Marketing (DCM) has become a primary tool for marketers in driving lead generation in today’s digital marketing world. Leading brands are creating and curating content trying to build brand equity and trust, connecting content to consumer action through brand story. And while strong theoretical models of content marketing have been discussed in the marketing literature, like Hollebeek and Macky (2019), there is a dearth of understanding about the application and direct impact of organic digital content strategies on marketing directives. This paper investigates an applied model, called The Digital Engine, which provides instruction on proper inbound marketing techniques …


Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh Dec 2023

Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

Class participation can be considered as contribution to discussion, attendance, presentations, unsolicited responses, questions, comments, etc. What counts may vary across individual teachers. The more students participate, the less memorization they do, and the more they engage in higher levels of thinking, including interpretation, analysis, and synthesis. However, only a handful of students in many classrooms participate regularly, a phenomenon dubbed as "consolidation of responsibility". This study provides a literature review of inclass participation, as well as pedagogies and technologies that enhance participation. Pedagogies such as active learning, group learning, project-based learning and flipped classroom. Technologies to automate attendance taking, …


Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink Dec 2023

Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink

Research Collection School Of Computing and Information Systems

Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


An Exploratory Content And Sentiment Analysis Of The Guardian Metaverse Articles Using Leximancer And Natural Language Processing, Sezai Tunca, Bulent Sezen, Violetta Wilk Dec 2023

An Exploratory Content And Sentiment Analysis Of The Guardian Metaverse Articles Using Leximancer And Natural Language Processing, Sezai Tunca, Bulent Sezen, Violetta Wilk

Research outputs 2022 to 2026

The metaverse has become one of the most popular concepts of recent times. Companies and entrepreneurs are fiercely competing to invest and take part in this virtual world. Millions of people globally are anticipated to spend much of their time in the metaverse, regardless of their age, gender, ethnicity, or culture. There are few comprehensive studies on the positive/negative sentiment and effect of the newly identified, but not well defined, metaverse concept that is already fast evolving the digital landscape. Thereby, this study aimed to better understand the metaverse concept, by, firstly, identifying the positive and negative sentiment characteristics and, …


Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz Dec 2023

Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz

Electronic Theses, Projects, and Dissertations

Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang Nov 2023

Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang

Journal of Cybersecurity Education, Research and Practice

Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …


Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua Nov 2023

Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua

Beyond: Undergraduate Research Journal

Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …


Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid Nov 2023

Technological Adoption And Changing World Of Work: Case Study Of Services Sector Workforce In Pakistan, Umer Khalid

CBER Conference

This study seeks to investigate the impact of technological adoption and the changing world of work on employment dynamics, job quality and wage structure in the context of a developing economy – Pakistan.


The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone Nov 2023

The Relationship Between Labor Market Institutions And Innovation In 177 European Regions Over The Period 2000-2015, Gaetano Perone

CBER Conference

The main goal of this paper was to investigate the relationship between a set of labor market institutions (LMIs) and innovation (proxied by patent density) in 174 NUT-1 and NUT-2 European regions, over the period 2000-2015. Fixed effects with Driscoll and Kraay's (1998) standard errors (FE-DK), ordinary least squares (OLS), the generalized method of moments estimation of the fixed effects (FE-GMM), and a multilevel model (MLM) were employed.


Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen Nov 2023

Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen

Journal of Cybersecurity Education, Research and Practice

Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …


Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill, Samuel Kessler Nov 2023

Congressional Briefing: Support America’S Circular Economy By Upcycling Bourbon & Brewing Wastes In Reauthorizing The Farm Bill, Samuel Kessler

Commonwealth Policy Papers

Following state level development of a new spent grain incentive system, leading to KY House Bill 627 in 2022, CPC’s Congressional Summit dialogue considered initial components and possibilities for designing an incentive to upcycle “keystone” organic wastes in regional economies across the US. For member offices, a set of general recommendations are provided for a national spent-grain upcycling incentive pilot program. It is suggested that staff of the Bourbon caucus consult with the references in this briefing and USDA Rural Development to consider further development of an incentive program in the reauthorization of the Farm Bill.

It is further urged …