Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Physical Sciences and Mathematics

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook Nov 2018

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook

Dr. David M Cook

Despite the variety of global research on the identification and proliferation of ransomware and other online scams, there is still a relative vacuum of research with respect to the problem of digitally and socially engineered deception in the form of ransomware on an individual. This is particularly problematic for older cohorts, where life experience in many endeavours sits alongside novice understanding and experience in the use of online technology. This paper examines the indicators that characterize authenticity and deception within ransomware and phishing. A survey of older Australian people over the age of 65 reveals markers and patterns that assist …


Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook Sep 2017

Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook

Dr. David M Cook

Virtual Reality (VR) usability is an emerging area that has made rapid progress among early adopters, but has so far failed to address the concerns of late adopters. In particular, elderly cohorts stand to benefit greatly from VR technologies as they enter areas of assistive technology, gerontechnology, and authentic modes of training. This study examined technology rejection criteria from a sample of 19 retired persons by comparing normative and VR practices for the fundamental learning of navigation using Google Earth mapping. This research discovered that three dimensional fear was a major factor in determining the acceptance and rejection of VR …


Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman Apr 2017

Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman

Tony Wasserman

This paper describes the OSSpal project, which is aimed at helping companies, government agencies, and other organizations find high quality free and open source software (FOSS) that meets their needs. OSSpal is a successor to the Business Readiness Rating (BRR), combining quantitative and qualitative evaluation measures for software in various categories. Instead of a purely numeric calculated score OSSpal adds curation of high-quality FOSS projects and individual user reviews of these criteria. Unlike the BRR project, for which there was no automated support, OSSpal has an operational, publicly available website where users may search by project name or category, and …


Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba Oct 2016

Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba

Leila A. Halawi

In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.


Mapping The Patent Landscape Of Synthetic Biology For Fine Chemical Production Pathways, Pablo Carbonell, Abdullah Gok, Philip Shapira, Jean-Loup Faulon Dec 2015

Mapping The Patent Landscape Of Synthetic Biology For Fine Chemical Production Pathways, Pablo Carbonell, Abdullah Gok, Philip Shapira, Jean-Loup Faulon

Philip Shapira

A goal of synthetic biology bio-foundries is to innovate through an iterative design/build/test/learn pipeline. In assessing the value of new chemical production routes, the intellectual property (IP) novelty of the pathway is important. Exploratory studies can be carried using knowledge of the patent/IP landscape for synthetic biology and metabolic engineering. In this paper, we perform an assessment of pathways as potential targets for chemical production across the full catalogue of reachable chemicals in the extended metabolic space of chassis organisms, as computed by the retrosynthesis-based algorithm RetroPath. Our database for reactions processed by sequences in heterologous pathways was screened against …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper reviews key elements of a Science or Technology Park in the context of open innovation. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Science and Technology Parks are in the business of providing services to their tenants, a mix of large companies, Small and Medium Enterprises and startups. The service needs of each of these types of companies will be different. The quality of services can be improved by understanding the needs of the tenants both, prior to building the Science and Technology Parks as well as on an ongoing basis. This paper introduces the CUGAR model for Science and Technology Parks as well as Service Innovation Design framework. It then proceeds to discuss how the Service Innovation framework could be applied to …


Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu Jun 2014

Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There have been many approaches towards investing in innovation projects. There has been very little discussion about the need to align such investments with the mission, vision, goals, leadership style, value discipline and risk appetite of an organization. This paper reviews existing approaches to innovation related investments and suggests the setting up of a proper innovation portfolio management process along with three dashboards that will help make innovation related investment decisions in an informed manner. The resulting innovation portfolio will be optimal in its alignment with an organizations mission and vision. We expect this method to be used by all …


Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier Jun 2013

Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier

Craig Napier

The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …


Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman May 2013

Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman

Shih-Fen CHENG

We introduce a weakening of standard gametheoretic δ-dominance conditions, called dominance, which enables more aggressive pruning of candidate strategies at the cost of solution accuracy. Equilibria of a game obtained by eliminating a δ-dominated strategy are guaranteed to be approximate equilibria of the original game, with degree of approximation bounded by the dominance parameter. We can apply elimination of δ-dominated strategies iteratively, but the for which a strategy may be eliminated depends on prior eliminations. We discuss implications of this order independence, and propose greedy heuristics for determining a sequence of eliminations to reduce the game as far as possible …


Innovation Rules: A Method For Identifying Disruptive Innovation Opportunities?, Arcot Desai Narasimhalu Apr 2013

Innovation Rules: A Method For Identifying Disruptive Innovation Opportunities?, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Innovation Rules or innovation evolution paths are described in this paper as a mechanism for identifying disruptive innovation opportunities. A generic structure of an Innovation Rule is first introduced followed by a discussion using specific instance of an Innovation Rule. The application of Innovation Rules for the discovery of disruptive innovation opportunities is presented next. Two methods that use Innovation Rules as the basis for identifying disruptive innovation opportunities are described next, one for market pull and the other one for technology push. A framework for dealing with Innovation Rules that represent both big and small disruptions is discussed next. …


Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu Apr 2013

Science And Technology Parks As An Open Innovation Catalyst For Valorization, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper sets out by reviewing the key elements of a Science or Technology Park in the context of open innovation. This is followed by a broad scan of Science and Technology Park activity in South and South East Asia. The paper proceeds to discuss Singapore’s continuous efforts to create new Science and Technology park models and presents a new approach the Singapore Management University has pursued for catalyzing valorization. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu Apr 2013

An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …


Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter Feb 2013

Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter

Dr Samuel Fosso Wamba

Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Community And Commercial Strategies In Open Source Software, Anthony Wasserman Dec 2012

Community And Commercial Strategies In Open Source Software, Anthony Wasserman

Tony Wasserman

This paper describes the recent evolution of business strategies used by companies offering products and services based on free and open source software (FOSS). The primary focus is on companies that develop and release products under an open source license. The paper compares their practices with traditional proprietary software companies and with community-based open source projects, and identifies growing overlaps between the different kinds of software companies. Finally, the paper describes the likely impact of recent technology developments in mobile and cloud computing on open source software and related business.


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Dec 2012

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Dr Akemi Chatfield

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu Jul 2012

A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Sustainability has become a major concern for nations and firms especially since the Kyoto Protocol was defined in 1997. While there have been several studies on benchmarks for national innovation systems and effectiveness of innovation management within firms there is as yet no reasonable metric for determining the quality of an innovation much less its quality relating to sustainability? Similarly, there have been several studies on sustainability but that such research groups have also not focused on developing a metric for denoting the quality of sustainable innovations. This paper offers a metric that defines the quality of an innovation, especially …


Agile Innovation Management, Arcot Desai Narasimhalu Jul 2012

Agile Innovation Management, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …


Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu Jul 2012

Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

The workbook provides a step by step approach to identifying innovation opportunities and the key aspects of Innovation development


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West Apr 2012

Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West

C. Jason Woodard

Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …