Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- RFID (8)
- Emerging Technologies (5)
- ERP (4)
- Innovation (4)
- National Security (4)
-
- Social Implications of ICT (4)
- Ethics (3)
- GPS (3)
- Innovation Management (3)
- Lab (3)
- Location-Based Services (3)
- Privacy (3)
- Risk (3)
- Surveillance (3)
- Trust (3)
- Uberveillance (3)
- Acceptance (2)
- Africa (2)
- Agility (2)
- Business intelligence (2)
- Business process (2)
- Case Study (2)
- Community (2)
- Design Theory (2)
- Disaster Evacuation Response (2)
- Elderly (2)
- FLOSS (2)
- FOSS (2)
- GIS (2)
- General Innovation Methodologies (2)
- Publication Year
- Publication
-
- Arcot Desai NARASIMHALU (13)
- Professor Katina Michael (13)
- Dr Samuel Fosso Wamba (8)
- Dr Deogratias Harorimana (2)
- Dr. David M Cook (2)
-
- Tony Wasserman (2)
- C. Jason Woodard (1)
- Confluence Journal of Environmental Studies (CJES), Kogi State University, Nigeria (1)
- Craig Napier (1)
- Dr Akemi Chatfield (1)
- Eileen O'Donnell (1)
- Jeffrey Barker (1)
- Leila A. Halawi (1)
- M. G. Michael (1)
- Mark Perry (1)
- Odai Khasawneh (1)
- Philip Shapira (1)
- Shih-Fen CHENG (1)
Articles 1 - 30 of 52
Full-Text Articles in Physical Sciences and Mathematics
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Dr. David M Cook
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Dr. David M Cook
Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman
Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman
Tony Wasserman
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba
Leila A. Halawi
In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.
Mapping The Patent Landscape Of Synthetic Biology For Fine Chemical Production Pathways, Pablo Carbonell, Abdullah Gok, Philip Shapira, Jean-Loup Faulon
Mapping The Patent Landscape Of Synthetic Biology For Fine Chemical Production Pathways, Pablo Carbonell, Abdullah Gok, Philip Shapira, Jean-Loup Faulon
Philip Shapira
In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh
In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh
Odai Khasawneh
Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu
Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper reviews key elements of a Science or Technology Park in the context of open innovation. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.
Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu
Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Science and Technology Parks are in the business of providing services to their tenants, a mix of large companies, Small and Medium Enterprises and startups. The service needs of each of these types of companies will be different. The quality of services can be improved by understanding the needs of the tenants both, prior to building the Science and Technology Parks as well as on an ongoing basis. This paper introduces the CUGAR model for Science and Technology Parks as well as Service Innovation Design framework. It then proceeds to discuss how the Service Innovation framework could be applied to …
Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu
Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
There have been many approaches towards investing in innovation projects. There has been very little discussion about the need to align such investments with the mission, vision, goals, leadership style, value discipline and risk appetite of an organization. This paper reviews existing approaches to innovation related investments and suggests the setting up of a proper innovation portfolio management process along with three dashboards that will help make innovation related investment decisions in an informed manner. The resulting innovation portfolio will be optimal in its alignment with an organizations mission and vision. We expect this method to be used by all …
Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier
Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier
Craig Napier
The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …
Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman
Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman
Shih-Fen CHENG
We introduce a weakening of standard gametheoretic δ-dominance conditions, called dominance, which enables more aggressive pruning of candidate strategies at the cost of solution accuracy. Equilibria of a game obtained by eliminating a δ-dominated strategy are guaranteed to be approximate equilibria of the original game, with degree of approximation bounded by the dominance parameter. We can apply elimination of δ-dominated strategies iteratively, but the for which a strategy may be eliminated depends on prior eliminations. We discuss implications of this order independence, and propose greedy heuristics for determining a sequence of eliminations to reduce the game as far as possible …
Innovation Rules: A Method For Identifying Disruptive Innovation Opportunities?, Arcot Desai Narasimhalu
Innovation Rules: A Method For Identifying Disruptive Innovation Opportunities?, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Innovation Rules or innovation evolution paths are described in this paper as a mechanism for identifying disruptive innovation opportunities. A generic structure of an Innovation Rule is first introduced followed by a discussion using specific instance of an Innovation Rule. The application of Innovation Rules for the discovery of disruptive innovation opportunities is presented next. Two methods that use Innovation Rules as the basis for identifying disruptive innovation opportunities are described next, one for market pull and the other one for technology push. A framework for dealing with Innovation Rules that represent both big and small disruptions is discussed next. …
Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu
Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper sets out by reviewing the key elements of a Science or Technology Park in the context of open innovation. This is followed by a broad scan of Science and Technology Park activity in South and South East Asia. The paper proceeds to discuss Singapore’s continuous efforts to create new Science and Technology park models and presents a new approach the Singapore Management University has pursued for catalyzing valorization. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.
An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu
An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …
Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter
Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter
Dr Samuel Fosso Wamba
Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
Community And Commercial Strategies In Open Source Software, Anthony Wasserman
Community And Commercial Strategies In Open Source Software, Anthony Wasserman
Tony Wasserman
This paper describes the recent evolution of business strategies used by companies offering products and services based on free and open source software (FOSS). The primary focus is on companies that develop and release products under an open source license. The paper compares their practices with traditional proprietary software companies and with community-based open source projects, and identifies growing overlaps between the different kinds of software companies. Finally, the paper describes the likely impact of recent technology developments in mobile and cloud computing on open source software and related business.
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
Dr Akemi Chatfield
While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu
A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Sustainability has become a major concern for nations and firms especially since the Kyoto Protocol was defined in 1997. While there have been several studies on benchmarks for national innovation systems and effectiveness of innovation management within firms there is as yet no reasonable metric for determining the quality of an innovation much less its quality relating to sustainability? Similarly, there have been several studies on sustainability but that such research groups have also not focused on developing a metric for denoting the quality of sustainable innovations. This paper offers a metric that defines the quality of an innovation, especially …
Agile Innovation Management, Arcot Desai Narasimhalu
Agile Innovation Management, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …
Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu
Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
The workbook provides a step by step approach to identifying innovation opportunities and the key aspects of Innovation development
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
C. Jason Woodard
Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …