Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

An Evaluation Of The Us High Production Volume (Hpv) Chemical-Testing Programme: A Study In (Ir)Relevance, Redundancy And Retro Thinking, Andrew Nicholson, Jessica Sandler, Troy Seidle Dec 2014

An Evaluation Of The Us High Production Volume (Hpv) Chemical-Testing Programme: A Study In (Ir)Relevance, Redundancy And Retro Thinking, Andrew Nicholson, Jessica Sandler, Troy Seidle

Troy Seidle, PhD

Under the US Environmental Protection Agency (EPA) High Production Volume (HPV) Challenge Programme, chemical companies have volunteered to conduct screening-level toxicity tests on approximately 2800 widely-used industrial chemicals. Participating companies are committed to providing available toxicity information to the EPA and presenting testing proposals for review by the EPA and posting on the EPA Web site as public information. People for the Ethical Treatment of Animals (PETA) and a coalition of animal protection organisations have reviewed all the test plans submitted by the participating chemical companies for compliance with the original HPV framework, as well as with animal welfare guidelines …


Health Professionals’ Roles In Animal Agriculture, Climate Change, And Human Health, Aysha Z. Akhtar, Michael Greger, Hope Ferdowsian, Erica Frank Dec 2014

Health Professionals’ Roles In Animal Agriculture, Climate Change, And Human Health, Aysha Z. Akhtar, Michael Greger, Hope Ferdowsian, Erica Frank

Michael Greger, MD, FACLM

What we eat is rapidly becoming an issue of global concern. With food shortages, the rise in chronic disease, and global warming, the impact of our dietary choices seems more relevant today than ever. Globally, a transition is taking place toward greater consumption of foods of animal origin, in lieu of plantbased diets. With this transition comes intensification of animal agriculture that in turn is associated with the emergence of zoonotic infectious diseases, environmental degradation, and the epidemics of chronic disease and obesity. Health professionals should be aware of these trends and consider them as they promote healthier and more …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


Sound And The Moving Image:Critical Characteristics For Spectator Response, Kara Rader, Rafeeq I. Roberts, Matt Egizii, Jeffery Allen Sep 2014

Sound And The Moving Image:Critical Characteristics For Spectator Response, Kara Rader, Rafeeq I. Roberts, Matt Egizii, Jeffery Allen

Rafeeq I Roberts

The prevailing wisdom in the film and video production industries is that audio information outweighs visual information when it comes to spectator responses, but there are few empirical studies to support this claim. In previous research, four critical characteristics of sound have been identified: (1) Music, (2) visual/sound contradictions (defined as sound that is inconsistent with audience expectations based on visual information), (3) multi-channel sound, and (4) sound quality. Building on our previous research into music and film, we have found that many researchers have looked into the question of how music affects emotions (Eschrich et al., 2008; Have, 2008; …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


Depicting Estimates Using The Intercept In Meta-Regression Models: The Moving Constant Technique, Blair T. Johnson Dr., Tania B. Huedo-Medina Dr. Aug 2014

Depicting Estimates Using The Intercept In Meta-Regression Models: The Moving Constant Technique, Blair T. Johnson Dr., Tania B. Huedo-Medina Dr.

Blair T. Johnson

In any scientific discipline, the ability to portray research patterns graphically often aids greatly in interpreting a phenomenon. In part to depict phenomena, the statistics and capabilities of meta-analytic models have grown increasingly sophisticated. Accordingly, this article details how to move the constant in weighted meta-analysis regression models (viz. “meta-regression”) to illuminate the patterns in such models across a range of complexities. Although it is commonly ignored in practice, the constant (or intercept) in such models can be indispensible when it is not relegated to its usual static role. The moving constant technique makes possible estimates and confidence intervals at …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2014

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper reviews key elements of a Science or Technology Park in the context of open innovation. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Science and Technology Parks are in the business of providing services to their tenants, a mix of large companies, Small and Medium Enterprises and startups. The service needs of each of these types of companies will be different. The quality of services can be improved by understanding the needs of the tenants both, prior to building the Science and Technology Parks as well as on an ongoing basis. This paper introduces the CUGAR model for Science and Technology Parks as well as Service Innovation Design framework. It then proceeds to discuss how the Service Innovation framework could be applied to …


A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu Jun 2014

A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There is a steady stream of business model innovations created to deliver value to customers using new approaches. Famous examples of business model innovations have been Amazon, Dell computers and Starbucks. Several other examples of business model innovations have been created across industries and reported in popular and academic forums. Osterwalder and Pigneur had defined a business model canvas as a framework for analysing business models. They had defined nine key subcomponents of a business model. Companies and individual entrepreneurs who wish to create business model innovations are still deploying trial and error approaches to discovering new business models. There …


Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu Jun 2014

Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There have been many approaches towards investing in innovation projects. There has been very little discussion about the need to align such investments with the mission, vision, goals, leadership style, value discipline and risk appetite of an organization. This paper reviews existing approaches to innovation related investments and suggests the setting up of a proper innovation portfolio management process along with three dashboards that will help make innovation related investment decisions in an informed manner. The resulting innovation portfolio will be optimal in its alignment with an organizations mission and vision. We expect this method to be used by all …


Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jun 2014

Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

In this paper we study a novel query type, called direct neighbor query. Two objects in a dataset are direct neighbors (DNs) if a window selection may exclusively retrieve these two objects. Given a source object, a DN search computes all of its direct neighbors in the dataset. The DNs define a new type of affinity that differs from existing formulations (e.g., nearest neighbors, nearest surrounders, reverse nearest neighbors, etc.) and finds application in domains where user interests are expressed in the form of windows, i.e., multi-attribute range selections. Drawing on key properties of the DN relationship, we develop an …


Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau Jun 2014

Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau

Shih-Fen CHENG

Congestion occurs when there is competition for resources by sel sh agents. In this paper, we are concerned with smoothing out congestion in a network of resources by using personalized well-timed in- centives that are subject to budget constraints. To that end, we provide: (i) a mathematical formulation that computes equilibrium for the re- source sharing congestion game with incentives and budget constraints; (ii) an integrated approach that scales to larger problems by exploiting the factored network structure and approximating the attained equilib- rium; (iii) an iterative best response algorithm for solving the uncon- strained version (no budget) of the …


A Multi-Objective Memetic Algorithm For Vehicle Resource Allocation In Sustainable Transportation Planning, Hoong Chuin Lau, Lucas Agussurja, Shih-Fen Cheng, Pang Jin Tan Jun 2014

A Multi-Objective Memetic Algorithm For Vehicle Resource Allocation In Sustainable Transportation Planning, Hoong Chuin Lau, Lucas Agussurja, Shih-Fen Cheng, Pang Jin Tan

Shih-Fen CHENG

Sustainable supply chain management has been an increasingly important topic of research in recent years. At the strategic level, there are computational models which study supply and distribution networks with environmental considerations. At the operational level, there are, for example, routing and scheduling models which are constrained by carbon emissions. Our paper explores work in tactical planning with regards to vehicle resource allocation from distribution centers to customer locations in a multi-echelon logistics network. We formulate the bi-objective optimization problem exactly and design a memetic algorithm to efficiently derive an approximate Pareto front. We illustrate the applicability of our approach …


An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham Jun 2014

An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham

Shih-Fen CHENG

In this paper, we illustrate how massive agent-based simulation can be used to investigate an exciting new application domain of experience management in theme parks, which covers topics like congestion control, incentive design, and revenue management. Since all visitors are heterogeneous and self-interested, we argue that a high-quality agent-based simulation is necessary for studying various problems related to experience management. As in most agent-base simulations, a sound understanding of micro-level behaviors is essential to construct high-quality models. To achieve this, we designed and conducted a first-of-its-kind real-world experiment that helps us understand how typical visitors behave in a theme-park environment. …


Interacting Knapsack Problem In Designing Resource Bundles, Truong Huy D. Nguyen, Pradeep Reddy Varakantham, Hoong Chuin Lau, Shih-Fen Cheng Jun 2014

Interacting Knapsack Problem In Designing Resource Bundles, Truong Huy D. Nguyen, Pradeep Reddy Varakantham, Hoong Chuin Lau, Shih-Fen Cheng

Shih-Fen CHENG

In many real-life businesses, the service provider/seller keeps a log of the visitors’ behavior as a way to assess the efficiency of the current business/operation model and find room for improvement. For example, by tracking when visitors entering attractions in a theme park, theme park owners can detect when and where congestion may occur, thus having contingency plans to reroute the visitors accordingly. Similarly, a Cable TV service provider can track channel switching events at each household to identify uninteresting channels. Subsequently, the repertoire of channels up for subscription can evolve over time to better serve the entertainment demand of …


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jun 2014

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Reza Vaezi

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


The Public Health Impacts Of Concentrated Animal Feeding Operations On Local Communities, Michael Greger, Gowri Koneswaran May 2014

The Public Health Impacts Of Concentrated Animal Feeding Operations On Local Communities, Michael Greger, Gowri Koneswaran

Michael Greger, MD, FACLM

Large-scale farm animal production facilities, also known as concentrated animal feeding operations (CAFOs), release a significant amount of contaminants into the air and water. Adverse health effects related to exposure to these contaminants among CAFO workers have been welldocumented; however, less is known about their impact on the health of residents in nearby communities. Epidemiological research in this area suggests that neighboring residents are at increased risk of developing neurobehavioral symptoms and respiratory illnesses, including asthma. Additional research is needed to better understand community-scale exposures and health outcomes related to the management practices and emissions of CAFOs.


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker Apr 2014

Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker

Janice Redmond Dr

Traditionally, environmental education has been aimed at the community or in primary schools and governmental pressure to reduce environmental damage has focussed on large businesses. More recently, the role and importance of small business and how to engage them in the environmental debate has come under scrutiny. Researchers have identified education as one method of increasing the understanding of small business owner-managers’ role and knowledge of practices that, when implemented, will reduce the negative impacts of their businesses. However, there is little attention given in the literature to the perspective of the small business owner-manager and environmental education. This research …