Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 49

Full-Text Articles in Business

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp Dec 2011

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp

Eileen O'Donnell

User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr Oct 2011

A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.


Computational Thinking In A Game Design Course, Amber Settle Oct 2011

Computational Thinking In A Game Design Course, Amber Settle

Amber Settle

As a part of an NSF-funded project to enhance computational thinking in undergraduate general education courses, activities and assessments were developed for a game design course taught at DePaul University. The focus of the course is on game analysis and design, but the course textbook uses an approach that is heavily grounded in computational thinking principles. We describe the course activities and assignments and discuss an initial assessment of those materials. Our results show that there is a gap in difficulty between several of the activities and indicate that the materials developed help students to better learn the computational thinking …


A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr Oct 2011

A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade Sep 2011

The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade

Eileen O'Donnell

The human computer interaction issues associated with the creation of personalized role playing simulations are discussed in this paper. This paper is aimed at those who are interested in building authoring applications which enable educators to build role playing simulated e-learning resources to use with their students. One of the main issues which have come to our attention is that many learning designers and educators do not understand what exactly it is we are trying to achieve by creating personalized role playing simulations. Also, how to gauge the pedagogic merits which can be achieved by using these e-learning resources. Potential …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

Professor Katina Michael

No abstract provided.


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


President Atypon Systems Inc., Gordon C. Tibbitts Iii Mar 2011

President Atypon Systems Inc., Gordon C. Tibbitts Iii

Gordon C. Tibbitts III

Open Access funding models for Open Access


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Inference And Retrieval Of Facial Images, Jian Kang Wu, Arcot Desai Narasimhalu, Yew Hock Ang, Chiam Prong Lam, Hean Ho Loh Jan 2011

Inference And Retrieval Of Facial Images, Jian Kang Wu, Arcot Desai Narasimhalu, Yew Hock Ang, Chiam Prong Lam, Hean Ho Loh

Arcot Desai NARASIMHALU

Attempts have been made to extend SQL to work with multimedia databases. We are reserved on the representation ability of extended SQL to cope with the richness in content of multimedia data. In this paper we present an example of a multimedia database system, Computer Aided Facial Image Inference and Retrieval system (CAFIIR). The system stores and manages facial images and criminal records, providing necessary functions for crime identification. We would like to demonstrate some core techniques for multimedia database with CAFIIR system. Firstly, CAFIIR is a integrated system. Besides database management, there are image analysis, image composition, image aging, …


Content-Based Retrieval For Trademark Registration, Jian Kang Wu, Chiam Prong Lam, Babu M. Mehtre, Yunjun Gao, Arcot Desai Narasimhalu Jan 2011

Content-Based Retrieval For Trademark Registration, Jian Kang Wu, Chiam Prong Lam, Babu M. Mehtre, Yunjun Gao, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

With ever increasing number of registered trademarks, the task of trademark office is becoming increasingly difficult to ensure the uniqueness of all trademarks registered. Trademarks are complex patterns consisting of various image and text patterns, called device-mark and word-in-mark respectively. Due to the diversity and complexity of image patterns occurring in trademarks, due to multi-lingual word-in-mark, there is no very successful computerized operating trademark registration system. We have tackled key technical issues: multiple feature extraction methods to capture the shape, similarity of multi-lingual word-in-mark, matching device mark interpretation using fuzzy thesaurus, and fusion of multiple feature measures for conflict trademark …


A Framework For The Integration Of Expert Systems With Multimedia Technologies, Arcot Desai Narasimhalu Jan 2011

A Framework For The Integration Of Expert Systems With Multimedia Technologies, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Expert system (ES) technology allows the capture and replication of expertise in an application domain. So far, the type of data that is used by an expert system for its reasoning process remains primarily alphanumeric. Image, graphics, and other dynamic data such as voice and video are part of an emerging technology generally termed multimedia technology. This article highlights the critical issues in building a successful application combining the two technologies. Based on these critical issues, it also provides a framework for the integration of multimedia technology with expert systems technology.


Management Of Technology Deployed In Service Innovations, Arcot Desai Narasimhalu Jan 2011

Management Of Technology Deployed In Service Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Services form a major portion of the GDP of several nations, especially that of the first world nations. These nations also experience high cost of providing services of different kinds. This has resulted in the displacement of non-customer facing services to countries that can offer them at lower prices. Nations have to be concerned about sustaining their economies even as such off-shoring of services continue to grow. It is therefore important to understand how countries can create those service innovations that will help them retain the growth trajectory of their economies. We believe that the different types of service innovations …


Service Innovation Opportunity Identification, Arcot Desai Narasimhalu Jan 2011

Service Innovation Opportunity Identification, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

No abstract provided.


The Future Of Innovation Is Bright And Shiny As Never Before, Arcot Desai Narasimhalu Jan 2011

The Future Of Innovation Is Bright And Shiny As Never Before, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This bright shiny future is due to several reasons including better understanding of opportunity identification and innovation management, significant advances in technologies, new economic realities and the shi ing focus to service innovation. Innovation was perceived as an art practised by an exclusive few sitting in an ivory tower of a corporate headquarters of a company. The availability of methods such as Disruptive Innovation, Blue Ocean Strategy and Innovation Rules has empowered ordinary individuals to identify innovation opportunities as never before. This is a sea change in the sheer number of minds searching for the innovation needles in other otherwise …


Innovation Engine, Arcot Desai Narasimhalu Jan 2011

Innovation Engine, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.


Multimedia Databases, Arcot Desai Narasimhalu Jan 2011

Multimedia Databases, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

The rapidly growing interest in building multimedia tools and applications has created a need for the development of multimedia database management systems (MMDBMSs) as a tool for efficient organization, storage and retrieval of multimedia objects. We begin with a word about traditional database management systems (DBMSs). Then we present an overview of the MMDBMS research issues, challenges, methods, models, and architectures. We review the state of the art and research contributions from related disciplines. Finally, we consider possibilities and probabilities for MMDBMS research in the future.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Jan 2011

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Core: A Content-Based Retrieval Engine For Multimedia Databases, Jian Kang Wu, Arcot Desai Narasimhalu, Babu M. Mehtre, Chiam Prong Lam, Yunjun Gao Jan 2011

Core: A Content-Based Retrieval Engine For Multimedia Databases, Jian Kang Wu, Arcot Desai Narasimhalu, Babu M. Mehtre, Chiam Prong Lam, Yunjun Gao

Arcot Desai NARASIMHALU

Rapid advances in multimedia technology necessitate the development of a generic multimedia information system with a powerful retrieval engine for prototyping multimedia applications. We develop a content-based retrieval engine (CORE) that makes use of novel indexing techniques for multimedia object retrieval. We formalize the concepts related to multimedia information systems such as multimedia objects and content-based retrieval. We bring out the requirements and challenges of a multimedia information system. The architecture of CORE is described in detail along with the associated retrieval mechanisms and indexing techniques. Various modules developed for efficient retrieval are presented with some APIs. The efficacy of …


A Method For Monetizing Technology Innovations, Arcot Desai Narasimhalu Jan 2011

A Method For Monetizing Technology Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Technology innovations from most universities and research institutes are generally created with no clear path to commercialization in mind. This is largely due to the culture in academic institutions and research institutes whose mission it is to explore the creation of innovations that promise long term benefits. This culture of academic freedom leads to a stockpile of technology innovations at their technology transfer offices (TTOs). These offices are often in a dilemma on how best to monetize the technology innovations that are in their custody. While there have been many social science research methodology based studies on this subject under …


A Maturity Model For Innovation Management, Arcot Desai Narasimhalu Jan 2011

A Maturity Model For Innovation Management, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

No abstract provided.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Jan 2011

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani Jan 2011

Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani

Arcot Desai NARASIMHALU

XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.