Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Open course material (8)
- Blockchain (7)
- Project management (7)
- Machine learning (6)
- Information technology (5)
-
- Algorithms (4)
- Artificial intelligence (4)
- Cybersecurity (4)
- Climate change (3)
- Computer simulation (3)
- Decision making (3)
- Deep learning (3)
- Economics of cybersecurity (3)
- IoT (3)
- Neural networks (3)
- Software (3)
- Structural equation modeling (3)
- Supply chain (3)
- Support vector machines (3)
- Sustainability (3)
- Agile software development (2)
- Bitcoin (2)
- COVID-19 (2)
- Collaboration (2)
- Cyber attacks (2)
- Data breach (2)
- Data processing (2)
- Datasets (2)
- Digital triad (2)
- Digital twins (2)
- Publication Year
- Publication
-
- Information Technology & Decision Sciences Faculty Publications (24)
- Engineering Management & Systems Engineering Theses & Dissertations (16)
- Engineering Management & Systems Engineering Faculty Publications (10)
- Cybersecurity Undergraduate Research Showcase (8)
- Developing Technology Foresight: Case Study of AI in InsurTech (8)
-
- Computer Science Faculty Publications (6)
- VMASC Publications (6)
- News Items (4)
- Computational Modeling & Simulation Engineering Faculty Publications (3)
- STEMPS Faculty Publications (3)
- Theses and Dissertations in Business Administration (3)
- Engineering Technology Faculty Publications (2)
- Information Technology & Decision Sciences Theses & Dissertations (2)
- Biological Sciences Faculty Publications (1)
- CCSLRI Reports (1)
- College of Business (Strome) Posters (1)
- Commonwealth Center for Recurrent Flooding Resiliency (CCRFR): Reports (1)
- Community & Environmental Health Faculty Publications (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics (1)
- Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Finance Faculty Publications (1)
- Graduate Program in International Studies Theses & Dissertations (1)
- Human Movement Sciences Faculty Publications (1)
- Mathematics & Statistics Faculty Publications (1)
- Mathematics & Statistics Theses & Dissertations (1)
- May 11, 2018: Adaptation Policy (1)
- May 18, 2016: The Economic Impacts of Sea-Level Rise in Hampton Roads (1)
- Physics Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 118
Full-Text Articles in Business
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Global Energy Consumption: An Analysis Of Variables That Shape Per Capita Usage, Or How Pump Price, Urbanization, And Fossil Fuels Imports Impact Fossil Fuels Consumption Per Capita Across Oecd Countries, Mila Demchyk Savage
Graduate Program in International Studies Theses & Dissertations
Among reasons explaining the importance of studying fossil fuel consumption are: crude oil is a subject of the international commodities market, thus, any fluctuation related to its' availability or price would impact the rest of the World; natural resources like oil, gas, and coal are limited; the extensive use of fossil fuels harms our surroundings, creating many environmental concerns; every human (on average) has been using more energy since 1971 and the trend is expected to continue. The upward trend is not consistent among individual countries. Therefore, the core question of my research is, `Why do some countries consume less …
The Effect Of Sustainability Information Disclosure On The Cost Of Equity Capital: An Empirical Analysis Based On Gartner Top 50 Supply Chain Rankings, Lingyu Li, Xianrong Zheng, Shuxi Wang
The Effect Of Sustainability Information Disclosure On The Cost Of Equity Capital: An Empirical Analysis Based On Gartner Top 50 Supply Chain Rankings, Lingyu Li, Xianrong Zheng, Shuxi Wang
Information Technology & Decision Sciences Faculty Publications
While disclosing financial information has been widely proved to reduce the financing cost of a company, the impact of non-financial information, such as sustainability information, disclosing on the financing cost of the company is still in debate. The goal of this paper is to explore the impact of disclosing sustainability-related information on the cost of equity for firms. The paper first introduces the concept of sustainability information disclosure, and then exhibits its benefit through exploring its impact on reducing a firm’s financing cost. It uses the Gartner supply chain top 50 rankings to construct the experiment environment to test for …
Digital Transformation, Applications, And Vulnerabilities In Maritime And Shipbuilding Ecosystems, Rafael Diaz, Katherine Smith
Digital Transformation, Applications, And Vulnerabilities In Maritime And Shipbuilding Ecosystems, Rafael Diaz, Katherine Smith
VMASC Publications
The evolution of maritime and shipbuilding supply chains toward digital ecosystems increases operational complexity and needs reliable communication and coordination. As labor and suppliers shift to digital platforms, interconnection, information transparency, and decentralized choices become ubiquitous. In this sense, Industry 4.0 enables "smart digitalization" in these environments. Many applications exist in two distinct but interrelated areas related to shipbuilding design and shipyard operational performance. New digital tools, such as virtual prototypes and augmented reality, begin to be used in the design phases, during the commissioning/quality control activities, and for training workers and crews. An application relates to using Virtual Prototypes …
Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić
Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić
Teaching & Learning Faculty Publications
While ChatGPT has recently become very popular, AI has a long history and philosophy. This paper intends to explore the promises and pitfalls of the Generative Pre-trained Transformer (GPT) AI and potentially future technologies by adopting a speculative methodology. Speculative future narratives with a specific focus on educational contexts are provided in an attempt to identify emerging themes and discuss their implications for education in the 21st century. Affordances of (using) AI in Education (AIEd) and possible adverse effects are identified and discussed which emerge from the narratives. It is argued that now is the best of times to define …
Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova
Inventions In The Area Of Nanotechnologies And Nanomaterials. Part I, Leonid A. Ivanov, Li Da Xu, Zhanna V. Pisarenko, Svetlana R. Muminova, Nadezda G. Miloradova
Information Technology & Decision Sciences Faculty Publications
Introduction. Advanced technologies inspire people by demonstrating the latest achievements (materials, methods, systems, technologies, devices etc.) that dramatically change the world. This, first of all, concerns nanotechnological inventions designed by scientists, engineers and specialists from different countries. Main part. The article provides an abstract overview of inventions of scientists, engineers and specialists from different countries: Germany, Russia, China, USA et al. The results of the creative activity of scientists, engineers and specialists, including inventions in the field of nanotechnology and nanomaterials allow, when introduced to industry, achieving a significant effect in construction, housing and communal services, and related sectors of …
Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang
Assessing Univariate And Multivariate Normality In Pls-Sem, Kathy Qing Ma, Weiyong Zhang
Information Technology & Decision Sciences Faculty Publications
Partial least squares structural equation modeling (PLS-SEM) has gained popularity among researchers in part due to its relaxed requirement for multivariate normality. One important step in performing structural equation modeling (SEM) is to test the normality assumption. In this paper, we illustrate how to assess univariate and multivariate normality in PLS-SEM using WarpPLS.
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
A Hybrid Deep Learning Approach For Crude Oil Price Prediction, Hind Aldabagh, Xianrong Zheng, Ravi Mukkamala
A Hybrid Deep Learning Approach For Crude Oil Price Prediction, Hind Aldabagh, Xianrong Zheng, Ravi Mukkamala
Computer Science Faculty Publications
Crude oil is one of the world’s most important commodities. Its price can affect the global economy, as well as the economies of importing and exporting countries. As a result, forecasting the price of crude oil is essential for investors. However, crude oil price tends to fluctuate considerably during significant world events, such as the COVID-19 pandemic and geopolitical conflicts. In this paper, we propose a deep learning model for forecasting the crude oil price of one-step and multi-step ahead. The model extracts important features that impact crude oil prices and uses them to predict future prices. The prediction model …
How Do Sustainability Stakeholders Seize Climate Risk Premia In The Private Cleantech Sector, Lingyu Li, Xianrong Zheng
How Do Sustainability Stakeholders Seize Climate Risk Premia In The Private Cleantech Sector, Lingyu Li, Xianrong Zheng
Information Technology & Decision Sciences Faculty Publications
This paper explores the strategies and practices of capturing climate risk premia for venture capital (VC) fund managers and entrepreneurs in the private cleantech sector. It also examines the impact of the feed-in tariffs (FITs) policy on the management of cleantech investments. It is shown that a longer investment period, less investment capital in cleantech investment management strategies, and optimistic climate risk management practices will help investors to better capture climate risk premia. In fact, the FITs policy will give rise to VC fund managers and entrepreneurs having a positive view regarding the prospects of the cleantech sector, motivating them …
Development Of Sensing And Programming Activities For Engineering Technology Pathways Using A Virtual Arduino Simulation Platform, Murat Kuzlu, Vukica Jovanovic, Otilia Popescu, Salih Sarp
Development Of Sensing And Programming Activities For Engineering Technology Pathways Using A Virtual Arduino Simulation Platform, Murat Kuzlu, Vukica Jovanovic, Otilia Popescu, Salih Sarp
Engineering Technology Faculty Publications
The Arduino platform has long been an efficient tool in teaching electrical engineering technology, electrical engineering, and computer science concepts in schools and universities and introducing new learners to programming and microcontrollers. Numerous Arduino projects are widely available through the open-source community, and they can help students to have hands-on experience in building circuits and programming electronics with a wide variety of topics that can make learning electrical prototyping fun. The educational fields of electrical engineering and electrical engineering technology need continuous updating to keep up with the continuous evolution of the computer system. Although the traditional Arduino platform has …
Detecting Deceptive Dark-Pattern Web Advertisements For Blind Screen-Reader Users, Satwick Ram Kodandaram, Mohan Sunkara, Sampath Jayarathna, Vikas Ashok
Detecting Deceptive Dark-Pattern Web Advertisements For Blind Screen-Reader Users, Satwick Ram Kodandaram, Mohan Sunkara, Sampath Jayarathna, Vikas Ashok
Computer Science Faculty Publications
Advertisements have become commonplace on modern websites. While ads are typically designed for visual consumption, it is unclear how they affect blind users who interact with the ads using a screen reader. Existing research studies on non-visual web interaction predominantly focus on general web browsing; the specific impact of extraneous ad content on blind users' experience remains largely unexplored. To fill this gap, we conducted an interview study with 18 blind participants; we found that blind users are often deceived by ads that contextually blend in with the surrounding web page content. While ad blockers can address this problem via …
Digital Energy Platforms Considering Digital Privacy And Security By Design Principles, Umit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu, Aleksandra Mileva (Ed.), Steffen Wendzel (Ed.), Virginia Franqueira (Ed.)
Digital Energy Platforms Considering Digital Privacy And Security By Design Principles, Umit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu, Aleksandra Mileva (Ed.), Steffen Wendzel (Ed.), Virginia Franqueira (Ed.)
Engineering Technology Faculty Publications
The power system and markets have become increasingly complex, along with efforts to digitalize the energy sector. Accessing flexibility services, in particular, through digital energy platforms, has enabled communication between multiple entities within the energy system and streamlined flexibility market operations. However, digitalizing these vast and complex systems introduces new cybersecurity and privacy concerns, which must be properly addressed during the design of the digital energy platform ecosystems. More specifically, both privacy and cybersecurity measures should be embedded into all phases of the platform design and operation, based on the privacy and security by design principles. In this study, these …
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
Cybersecurity Undergraduate Research Showcase
While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …
The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey
The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey
Cybersecurity Undergraduate Research Showcase
The Internet has brought about a new way for businesses to reach their customers. With the help of social media, websites, and email marketing, small businesses have gained a lot of new customers. However, these new online customers have also opened up their businesses to a whole new world of cyber crime. Cyber crime is the illegal use of computers and networks to cause damage or steal information. This type of crime affects small businesses as well as large corporations. Small businesses often find themselves at a disadvantage because they don't have the resources to hire an ethical hacker or …
Looking Through Their Lenses: An Analysis Of Virginia Environmental Nonprofits' Roles And Challenges In Shoreline Management For Coastal Resilience, Taiwo C. Olanrewaju Lasisi
Looking Through Their Lenses: An Analysis Of Virginia Environmental Nonprofits' Roles And Challenges In Shoreline Management For Coastal Resilience, Taiwo C. Olanrewaju Lasisi
School of Public Service Theses & Dissertations
Environmental nonprofit organizations have emerged to attend to the environmental needs of individuals and communities. Some of these needs are usually those that have been neglected, given insufficient attention, or cannot be singularly handled by the government. In advocating for coastal resilience, environmental nonprofits have been identified as actors who address coastal issues like sea-level rise, flooding, and shoreline management.
Shoreline management involves building setbacks and formulating short and long-term defense strategies such as building living shorelines, ripraps, bulkheads, and tree plantings. These strategies formed the basis of coastal defense in coastal zones. Shoreline management is a significant area of …
Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang
Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang
Information Technology & Decision Sciences Faculty Publications
(First paragraph) Smart manufacturing (SM) distinguishes itself from other system paradigms by introducing ‘smartness’ as a measure to a manufacturing system; however, researchers in different domains have different expectations of system smartness from their own perspectives. In this Special Issue (SI), SM refers to a system paradigm where digital technologies are deployed to enhance system smartness by (1) empowering physical resources in production, (2) utilizing virtual and dynamic assets over the internet to expand system capabilities, (3) supporting data-driven decision making at all domains and levels of businesses, or (4) reconfiguring systems to adapt changes and uncertainties in dynamic environments. …
Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin
Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin
Engineering Management & Systems Engineering Theses & Dissertations
Organizations and government leaders are concerned about cyber incidents. For some time, researchers have studied what motivates people to act in ways that put the confidentiality, integrity, and availability of information in organizations at risk. Still, several areas remained unexplored, including the role of employees’ evaluation of the organizational systems and the role of value orientation at work as precursors of secure and insecure actions in relation to information technologies (information security [IS] action). The objective of this research project was to examine how the evaluations of formal and informal security norms are associated with the intention to follow them …
All-Inclusive Coral Reef Restoration: How The Tourism Sector Can Boost Restoration Efforts In The Caribbean, Macarena Blanco-Pimentel, Nicolas R. Evensen, Camilo Cortés-Useche, Johanna Calle-Triviño, Daniel J. Barshis, Victor Galván, Erika Harms, Megan K. Morikawa
All-Inclusive Coral Reef Restoration: How The Tourism Sector Can Boost Restoration Efforts In The Caribbean, Macarena Blanco-Pimentel, Nicolas R. Evensen, Camilo Cortés-Useche, Johanna Calle-Triviño, Daniel J. Barshis, Victor Galván, Erika Harms, Megan K. Morikawa
Biological Sciences Faculty Publications
Following a strong decline in the health of Caribbean coral reefs in the 1970s, disease outbreaks, overfishing, and warming events have continued to push these reefs towards a point of no return. As such, researchers and stakeholders have turned their attention to restoration practices to overcome coral recovery bottlenecks on Caribbean reefs. However, successful restoration faces many challenges, including economical and logistical feasibility, long-term stability, and biological and ecological factors yet to fully understand. The tourism sector has the potential to enhance and scale restoration efforts in the Caribbean, beyond simple financial contributions. Its strengths include long-term presence in several …
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 3 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Questions regarding InsurTech and distribution.
Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins
Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins
Cybersecurity Undergraduate Research Showcase
In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.
What threats do commercial ships face today?
What actions are necessary to mitigate these threats?
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Electrical & Computer Engineering Faculty Publications
Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …
Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade
Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade
Information Technology & Decision Sciences Faculty Publications
The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 °C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot be underestimated, there exists a technical perspective where digital and IS technology has a role to play in the monitoring of potential solutions, but also an integral element of climate change solutions. We explore these aspects in this editorial article, offering a comprehensive opinion based insight to a …
Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao
Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao
Information Technology & Decision Sciences Faculty Publications
Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
Information Technology & Decision Sciences Faculty Publications
This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …
Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh
Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh
Information Technology & Decision Sciences Faculty Publications
Artificial intelligence (AI) enables continuous monitoring of patients’ health, thus improving the quality of their health care. However, prior studies suggest that individuals resist such innovative technology. In contrast to prior studies that investigate individuals’ decisions for themselves, we focus on family members’ rejection of AI monitoring, as family members play a significant role in health care decisions. Our research investigates competing effects of emotions toward the rejection of AI monitoring for health care. Based on two scenario-based experiments, our study reveals that emotions play a decisive role in family members’ decision making on behalf of their parents. We find …
The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu
The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Computer Science Faculty Publications
Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …