Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Financial mathematics (3)
- Partial differential equations (3)
- Regression analysis (2)
- Stochastic (2)
- 3-D printing (1)
-
- Aerospace industry (1)
- Asteroid Miners (1)
- Asteroid Mining (1)
- Asteroid Surveyors (1)
- Automobile insurance fraud (1)
- Banking (1)
- Clustering (1)
- Collaborative robot (1)
- Constant pattern (1)
- Control variables (1)
- Curriculum development (1)
- Cyber Security (1)
- Cybersecurity (1)
- DACUM (1)
- Data and Information Technology (1)
- Data mining (1)
- Decentralized production (1)
- Decision tree (1)
- Declining birthrates (1)
- Demographic shifts (1)
- Development (1)
- Economic impact (1)
- Economics (1)
- Exoskeleton (1)
- Firms (1)
Articles 1 - 13 of 13
Full-Text Articles in Business
Is The Declining Birthrate Really An Issue For The Economy?, Harsh Ramesh Pednekar, Theodore Lee, Darrion Chin
Is The Declining Birthrate Really An Issue For The Economy?, Harsh Ramesh Pednekar, Theodore Lee, Darrion Chin
Introduction to Research Methods RSCH 202
This study aims to explore the complex implications of declining birth rates on the economy, focusing on GDP per capita as a crucial metric, and aims to uncover both potential opportunities and challenges stemming from this demographic transformation using regression analysis. Using a quantitative methodology and secondary data from OECD.stat, World Population Review, and World Bank, the study explores the relationship between declining birth rates and economic impacts. GDP per capita serves as an essential dependent variable, and it accounts for control variables such as labour force participation, literacy, and education levels, child dependence ratio, and physical capital. Past studies …
Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael
Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael
Student Works
The prospect of asteroid mining provides a plethora of riches that include metals and water. As the number of discovered asteroids continues to grow, opportunities arise to commercialize these resources within Near-Earth Asteroids (NEAs). With urgent applications on Earth and in space, NEAs allow for a surge in sales. Planning forward, Astroider Aerospace Systems follows a mission split into four phases. Phase 1 develops a series of spacecraft using existing technologies, titled as Near-Earth Asteroid Miners and Near-Earth Asteroid Surveyors. Phase 2 first launches the surveyors to candidate NEAs, prospecting them for ores. To identify potential celestial bodies for this …
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Publications
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Publications
Automobile Insurance fraud costs the insurance industry billions of dollars annually. This case study addresses claim fraud based on data extracted from Alpha Insurance’s automobile claim database. Students are provided the business problem and data sets. Initially, the students are required to develop their hypotheses and analyze the data. This includes identification of any missing or inaccurate data values and outliers as well as evaluation of the 22 variables. Next students will develop and optimize their predictive models using five techniques: regression, decision tree, neural network, gradient boosting, and ensemble. Then students will determine which model is the best fit …
Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne
Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne
Publications
The incidence of musculoskeletal disorders in workplaces with difficult ergonomic conditions is increasing. Today, there is a growing market for technical support systems that avoid repetitive strain on the musculoskeletal system. We have been observing two (parallel) lines of development: on the one hand, the development of exoskeletons supporting shop floor operators and, on the other hand, the development of collaborative robots for the creation of hybrid teams. The focus of our research is the combined application of exoskeletons AND collaborative robots for shop floor operators in the aerospace industry. Our approach is to analyze various scenarios to understand which …
Analyzing Cyber Threats Affecting The Financial Industry, Anna Skelton
Analyzing Cyber Threats Affecting The Financial Industry, Anna Skelton
Student Works
As critical infrastructure, financial institutions must execute the highest level of cybersecurity as the threat of a crippling cyberattack continues to develop. Malicious actors, including disenfranchised employees, state sponsored actors, and traditional hackers, all have motivations to target the financial industry, and do so frequently. However, the threat changes slightly between resource rich large institutions and their smaller, community bank counterparts. The complex and multifaceted threat must be fully understood in order to properly address and analyze solution options to preserve the security of these institutions and the economy that they contribute to.
A Regression Model To Predict Stock Market Mega Movements And/Or Volatility Using Both Macroeconomic Indicators & Fed Bank Variables, Timothy A. Smith, Alcuin Rajan
A Regression Model To Predict Stock Market Mega Movements And/Or Volatility Using Both Macroeconomic Indicators & Fed Bank Variables, Timothy A. Smith, Alcuin Rajan
Publications
In finance, regression models or time series moving averages can be used to determine the value of an asset based on its underlying traits. In prior work we built a regression model to predict the value of the S&P 500 based on macroeconomic indicators such as gross domestic product, money supply, produce price and consumer price indices. In this present work this model is updated both with more data and an adjustment in the input variables to improve the coefficient of determination. A scheme is also laid out to alternately define volatility rather than using common tools such as the …
Macroconstants Of Development: A New Benchmark For The Strategic Development Of Advanced Countries And Firms, Andrey V. Bystrov, Vyacheslav N. Yusim, Tamilla Curtis
Macroconstants Of Development: A New Benchmark For The Strategic Development Of Advanced Countries And Firms, Andrey V. Bystrov, Vyacheslav N. Yusim, Tamilla Curtis
Publications
This research proposed a new indicator of countries’ development called “macroconstants of development”. The literature review indicates that the concept of "macroconstants of development" is not used at the moment in neither the theory nor the practice of industrial policy. Research of longitudinal data of total GDP, GDP per capita and their derivatives for most countries of the world was conducted. An analysis of statistical information has been done by employing econometric analyses.
Based on the analysis of the statistical data, which characterizes the development of large, technologically advanced countries in ordinary conditions, it was identified that the average acceleration …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
An Economic Regression Model To Predict Market Movements, Timothy A. Smith, Andrew Hawkins
An Economic Regression Model To Predict Market Movements, Timothy A. Smith, Andrew Hawkins
Publications
In finance, multiple linear regression models are frequently used to determine the value of an asset based on its underlying traits. We built a regression model to predict the value of the S&P 500 based on economic indicators of gross domestic product, money supply, produce price and consumer price indices. Correlation between the error in this regression model and the S&P’s volatility index (VIX) provides an efficient way to predict when large changes in the price of the S&P 500 may occur. As the true value of the S&P 500 deviates from the predicted value, obtained by the regression model, …
The 6th Mode Of Transportation, Robert O. Walton
The 6th Mode Of Transportation, Robert O. Walton
Publications
The five modes of freight transportation are normally characterized as motor carriers, railroads, airlines, water carriers, and pipelines. This paper will attempt to position the Internet as the sixth mode of transportation. This paper compares the strengths and weaknesses of the traditional five modes of transportation against the proposed 6th mode of the Internet. Without including the Internet as a mode of transportation, and tracking the economic value that it adds to the economy, the economic impact of the Internet as a mode is not considered. The recommendation of this study is that the Internet should be added to the …
A Regression Model To Investigate The Performance Of Black-Scholes Using Macroeconomic Predictors, Timothy A. Smith, Ersoy Subasi, Aliraza M. Rattansi
A Regression Model To Investigate The Performance Of Black-Scholes Using Macroeconomic Predictors, Timothy A. Smith, Ersoy Subasi, Aliraza M. Rattansi
Publications
As it is well known an option is defined as the right to buy sell a certain asset, thus, one can look at the purchase of an option as a bet on the financial instrument under consideration. Now while the evaluation of options is a completely different mathematical topic than the prediction of future stock prices, there is some relationship between the two. It is worthy to note that henceforth we will only consider options that have a given fixed expiration time T, i.e., we restrict the discussion to the so called European options. Now, for a simple illustration of …
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Publications
In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.