Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

3,409 Full-Text Articles 3,785 Authors 1,645,885 Downloads 191 Institutions

All Articles in Technology and Innovation

Faceted Search

3,409 full-text articles. Page 1 of 118.

Beyond Intermediation: A New (Fintech) Model For Securities Holding Infrastructures, Charles W. Mooney Jr. 2019 University of Pennsylvania Law School

Beyond Intermediation: A New (Fintech) Model For Securities Holding Infrastructures, Charles W. Mooney Jr.

Faculty Scholarship at Penn Law

Publicly traded securities generally are held by investors in securities accounts with intermediaries such as stockbrokers and central securities depositories—intermediated securities. For many investors this is the only practical means of holding and dealing with securities. These intermediated holding systems (IHSs) impose a variety of risks and costs. Investors are exposed to intermediary risk (default or insolvency of an intermediary holding securities) as well as impediments to the exercise of rights such as voting and asserting claims against securities issuers. The nontransparency of IHSs imposes other social costs, such as obstacles to anti-money laundering enforcement. The emergence of FinTech ...


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li 2019 Kennesaw State University

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app ...


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan VanSickle, Tamirat Abegaz, Bryson Payne 2019 University of North Georgia

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification ...


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne 2019 University of North Georgia

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by ...


A World Of Cyber Attacks (A Survey), mubarak Banisakher, Marwan Omar 2019 Saintleo University

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can ...


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam 2019 Kennesaw State University

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these ...


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward 2019 The University of Auckland

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It ...


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez 2019 National University

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz 2019 Georgia Southern University

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to ...


Internet Core Functions: Security Today And Future State, Jeffrey Jones 2019 Kennesaw State University

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley 2019 InterContinental Hotels Group PLC

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


Courtroom Technology From The Judge's Perspective, Fredric I. Lederer 2019 William & Mary Law School

Courtroom Technology From The Judge's Perspective, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Summary: Regulating Robo Advice Across The Financial Services Industry, Tom Baker 2019 University of Pennsylvania Law School

Summary: Regulating Robo Advice Across The Financial Services Industry, Tom Baker

Wharton PPI B-School for Public Policy Seminar Summaries

In general, a robo advisor can be defined as an automated service that ranks, or matches, consumers to financial products on a personalized basis, sometimes in addition to providing related services such as educating consumers and selling products to them. Often associated with web-based financial investment services, a robo advisor can also include consumer financial product intermediaries such as automated mortgage brokers and insurance exchanges, as well as lead generation services such as Zillow, NerdWallet, and Mint.com. Although investment-focused robo advisors have received the most scrutiny from regulators, the same promises and regulatory concerns raised by investment robo advisors ...


Summary: Business Innovation Creates Policy Disruption, Sarah E. Light 2019 University of Pennsylvania

Summary: Business Innovation Creates Policy Disruption, Sarah E. Light

Wharton PPI B-School for Public Policy Seminar Summaries

New forms of business in the sharing economy, and new technologies like autonomous vehicles, have the potential to “disrupt” existing regulatory structures. This seminar examined the challenges facing regulators and legislators, who must respond so as to both (a) promote innovation and (b) protect the public interest.


Digitalization And The American Workforce, Mary Blankenship, Caitlin Saladino, William E. Brown 2019 The Lincy Institute & Brookings Mountain West

Digitalization And The American Workforce, Mary Blankenship, Caitlin Saladino, William E. Brown

Economic Development & Workforce

This Fact Sheet examines the rate of digitalization within the Metropolitan Statistical Areas (MSAs) of the Mountain West division using the findings and data from Digitalization and the American Workforce, a report from the Brookings Institution.


Your Community Gets A B- : Analysis Of The Specific And Curious Realm Of Airport Bond Ratings, Richard R. Hawkins, Stephen A. LeMay, Peter M. Ralston 2019 University of West Florida

Your Community Gets A B- : Analysis Of The Specific And Curious Realm Of Airport Bond Ratings, Richard R. Hawkins, Stephen A. Lemay, Peter M. Ralston

Peter Ralston

Commercial airports are publicly-owned transportation infrastructure, usually funded with bonds. The bond rating decision for these entities thus has important ramifications for bond investors, issuers, airport managers, and even the communities the airports serve, but the rating decision process is not well understood. This paper discusses a simulation of the rating process in two decision environments, including a downgrade. The effect of information framing in an environment of incomplete data is examined using amateur evaluators. Amateur evaluators were utilized to understand how people with limited financial analysis skills would respond when presented with incomplete information and a primed scenario. The ...


A Structure–Conduct–Performance Perspective Of How Strategic Supply Chain Integration Affects Firm Performance, Peter M. Ralston, Jennifer Blackhurst, David E. Cantor, Michael C. Crum 2019 University of West Florida

A Structure–Conduct–Performance Perspective Of How Strategic Supply Chain Integration Affects Firm Performance, Peter M. Ralston, Jennifer Blackhurst, David E. Cantor, Michael C. Crum

Michael R. Crum

There are several factors that affect a firm's ability to successfully integrate internally and externally for organizational improvement. This study seeks to understand the relationship between a firm's strategy, its supply chain integration efforts, and firm performance. Leveraging the theoretical lens of structure–conduct–performance from the industrial organization economics literature, and utilizing both archival and survey data, we describe how firms may align their internal and external supply chain integration strategies with customers and suppliers. In doing so, these internal and external integration strategies affect the firm's ability to respond to customer demand, which then impacts ...


Enhancing Dyadic Performance Through Boundary Spanners And Innovation: An Assessment Of Service Provider–Customer Relationships, Scott J. Grawe, Patricia J. Daughterty, Peter M. Ralston 2019 Iowa State University

Enhancing Dyadic Performance Through Boundary Spanners And Innovation: An Assessment Of Service Provider–Customer Relationships, Scott J. Grawe, Patricia J. Daughterty, Peter M. Ralston

Scott Grawe

Firms recognize that working together through collaborative relationships offers potential benefits such as improving cooperation, information sharing, and overall performance. An additional and extremely valuable benefit of working together is the potential for creating innovative business approaches and solutions. Thus, developing external linkages has become a higher priority within many organizations. Boundary spanning employees offer one means of achieving closer cross‐firm relationships. We investigate the roles of boundary spanners by examining service providers and their relationships with customers. More specifically, we examine boundary spanning employees that are physically on‐site at customer facilities. Results provide strong support that boundary ...


Logistics Salience Impact On Logistics Capabilities And Performance, Peter M. Ralston, Scott J. Grawe, Patricia J. Daugherty 2019 Iowa State University

Logistics Salience Impact On Logistics Capabilities And Performance, Peter M. Ralston, Scott J. Grawe, Patricia J. Daugherty

Scott Grawe

Purpose – The purpose of this manuscript is to assess the impact of logistics salience on logistics capabilities and performance. Specifically, the impact of logistics salience on logistics innovativeness and logistics service differentiation is measured along with logistics innovativeness and logistics service differentiation effect on logistics performance. Design/methodology/approach – Conclusions were drawn from survey data gathered from logistics and supply chain managers at US firms. Structural equation modelling was utilized to measure the statistical significance of the hypothesized model paths with all findings meeting the basic requirements of interpretation. Findings – The results suggest that logistics salience positively impacts both logistics ...


Enhancing Dyadic Performance Through Boundary Spanners And Innovation: An Assessment Of Service Provider–Customer Relationships, Scott J. Grawe, Patricia J. Daughterty, Peter M. Ralston 2019 Iowa State University

Enhancing Dyadic Performance Through Boundary Spanners And Innovation: An Assessment Of Service Provider–Customer Relationships, Scott J. Grawe, Patricia J. Daughterty, Peter M. Ralston

Peter Ralston

Firms recognize that working together through collaborative relationships offers potential benefits such as improving cooperation, information sharing, and overall performance. An additional and extremely valuable benefit of working together is the potential for creating innovative business approaches and solutions. Thus, developing external linkages has become a higher priority within many organizations. Boundary spanning employees offer one means of achieving closer cross‐firm relationships. We investigate the roles of boundary spanners by examining service providers and their relationships with customers. More specifically, we examine boundary spanning employees that are physically on‐site at customer facilities. Results provide strong support that boundary ...


Digital Commons powered by bepress