{"title":"Cluster Business Processes Management with 3D Immersive Environments","authors":"M. Glykas","doi":"10.4018/IJEEI.2015070101","DOIUrl":"https://doi.org/10.4018/IJEEI.2015070101","url":null,"abstract":"The purpose of the article is to present an innovative managerial approach for SME Cluster Management. Clusters contribute extensively in global economy and their role becomes increasingly more important for growth and prosperity in both developed and underdeveloped economies. At first the author presents the state of the art and contemporary approaches in cluster management and highlight the need for new managerial approaches and frameworks both methodology and technology based. The author then proposes a novel cluster management framework that takes into consideration issues concepts from disciplines as diverse as intellectual capital, cluster process management, cluster organizational management, the role of catalyst SMEs, 3D immersive environment technologies, social networking etc. The resulting proposed framework for SME Clustering is a 3D avatar based environment and framework for managing Geographically dispersed SME clusters.","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121214712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"R&D Spillovers and the Increasing of a Supplier's Research Activities","authors":"Manoj Kumar","doi":"10.4018/IJEEI.2015070103","DOIUrl":"https://doi.org/10.4018/IJEEI.2015070103","url":null,"abstract":"A conceptual framework is proposed for analyzing how differences in supplier's R&D reserve can impact on a supplier's decision to increase its R&D activities. A central finding is that the integration of product markets can generate an added incentive to undertake R&D activities to buyer's location. A three-stage analysis of a non-cooperative game is proposed, which entails cost-reducing process innovation in a supply chain model of duopoly. Each supplier's technological efficiency depends not only on its investment in applied R&D, but also on its absorption of supplier and buyer fundamental R&D, as well as the extent to which the latter are substitutes or complements. In a first stage, a supplier's absorption of buyer fundamental R&D can be impacted by a decision to focus R&D activities to buyer's location. The interrelation between this decision and initial production costs is also explored.","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erastus Ndinguri, Krisanna Machtmes, Ryan J. Machtmes, Jessica Hill
{"title":"Exploring How Women Entrepreneurs Use Technology for Idea Generation","authors":"Erastus Ndinguri, Krisanna Machtmes, Ryan J. Machtmes, Jessica Hill","doi":"10.4018/IJEEI.2015070102","DOIUrl":"https://doi.org/10.4018/IJEEI.2015070102","url":null,"abstract":"The study explores the relationship between the extent of use and access to emerging technology in business by women entrepreneurs and the different characteristics that may trigger generation of business ideas. The study was conducted through use of an interpretive scale of how women entrepreneurs use emerging technology. Several research questions were answered, including: \"Do demographic characteristics play a role in knowing and using emerging technology?\"; \"Are there differences between the extent of use of emerging technologies and different entrepreneur women characteristics?\" and \"Is there a possible predictive model of idea generation and business formation, as measured by use of technology overall item mean score?\"","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering and Ranked Search for Enterprise Content Management","authors":"Juris Rats, Gints Ernestsons","doi":"10.4018/ijeei.2013100102","DOIUrl":"https://doi.org/10.4018/ijeei.2013100102","url":null,"abstract":"The aim of this work is to understand more closely where the border lies between relational and Not Only Structured Query Language (NoSQL) platform as concerns Enterprise Content Management (ECM) area. Another objective (closely related to the first one) is to specify the conceptual architecture of the distributed ECM system. The authors specify the model of the prototype ECM system and compare two platforms for this model – MS SQL based for the relational platform and Clusterpoint for the NoSQL platform. The results of performance measurements of SQL and NoSQL technologies for Enterprise Content Management specific tasks are presented and analyzed. The viability of NoSQL Document-oriented database solution based on clustering and ranked search is demonstrated. The ways to leverage the improved performance and scalability of the software to better serve the business needs of the Enterprise are discussed. The conceptual architecture of the prototype system is outlined.","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach","authors":"Gunnar Wahlgren, S. Kowalski","doi":"10.4018/ijeei.2013100101","DOIUrl":"https://doi.org/10.4018/ijeei.2013100101","url":null,"abstract":"We combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework and we claim that IT Security Risk Management framework exist at each organizational levels. In this pa ...","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yahya M. Tashtoush, D. Darwish, Motasim Albdarneh, I. Alsmadi, Khalid Alkhatib
{"title":"A Business Classifier to Detect Readability Metrics on Software Games and Their Types","authors":"Yahya M. Tashtoush, D. Darwish, Motasim Albdarneh, I. Alsmadi, Khalid Alkhatib","doi":"10.4018/ijeei.2013100104","DOIUrl":"https://doi.org/10.4018/ijeei.2013100104","url":null,"abstract":"Readability metric is considered to be one of the most important factors that may affect games business in terms of evaluating games’ quality in general and usability in particular. As games may go through many evolutions and developed by many developers, code readability can significantly impact the time and resources required to build, update or maintain such games. This paper introduces a new approach to detect readability for games built in Java or C++ for desktop and mobile environments. Based on data mining techniques, an approach for predicting the type of the game is proposed based on readability and some other software metrics or attributes. Another classifier is built to predict software readability in games applications based on several collected features. These classifiers are built using machine learning algorithms (J48 decision tree, support vector machine, SVM and Naive Bayes, NB) that are available in WEKA data mining tool. A Business Classifier to Detect Readability Metrics on Software Games and Their Types","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender Systems: The Importance of Personalization in E-Business Environments","authors":"Nikolaos Polatidis, C. Georgiadis","doi":"10.4018/ijeei.2013100103","DOIUrl":"https://doi.org/10.4018/ijeei.2013100103","url":null,"abstract":"Due to the rapid growth of the internet in conjunction with the information overload problem the use of recommender systems has started to become necessary for both e-businesses and customers. However there are other factors such as privacy and trust that make customers suspicious. This paper gives an overview of recommendation systems, the benefits that both the business and the customers have and an explanation of the challenges, which if faced can make the personalization process better for both parties. Moreover an outline of current studies is given along with an overview of Amazon’s recommendations in order to clarify that the use of recommender systems is beneficial for an e-business in many ways and also for a valuable customer of such business. Recommender Systems: The Importance of Personalization in E-Business Environments","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116306925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ouazzane, Markson Aigbodi, Daniel Mitchell, Vassil T. Vassilev, Jun Li
{"title":"An Innovative Custom Cyber Security Solution for Protecting Enterprises and Corporates' Assets","authors":"K. Ouazzane, Markson Aigbodi, Daniel Mitchell, Vassil T. Vassilev, Jun Li","doi":"10.4018/ijeei.2013070104","DOIUrl":"https://doi.org/10.4018/ijeei.2013070104","url":null,"abstract":"Anti-virus software has been the main defense against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus signature and the heuristic engine to detect future and unknown virus. The time gap between an exploit appearing on the internet and the user receiving an update for their anti-virus signature database on their machine is very crucial. Having a diverse multi-Engine anti-virus scanner in the infrastructure with the capability for custom signature definition as part of a defence in-depth strategy will help to close that gap. This paper presents a technique of deploying more than one anti-virus solution at different layers and using custom anti-virus signature which is deployed in a custom proxy solution as part of a defence in-depth strategy.","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sai Manoj Marepalli, R. Sultana, Andreas H. Christ
{"title":"Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud","authors":"Sai Manoj Marepalli, R. Sultana, Andreas H. Christ","doi":"10.4018/ijeei.2013070103","DOIUrl":"https://doi.org/10.4018/ijeei.2013070103","url":null,"abstract":"Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP). Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Innovation in Entrepreneurships: Taxonomies of Innovation in Knowledge-Based Economy","authors":"H. Rahman","doi":"10.4018/ijeei.2013070101","DOIUrl":"https://doi.org/10.4018/ijeei.2013070101","url":null,"abstract":"Efforts have been given to gain knowledge from a meager collection of empirical studies on various taxonomies of innovation and their effects on open innovation strategies for the development of entrepreneurship, despite abundance of studies and researches that are available on the broader aspect of open innovation categorization. Based on a longitudinal literature review with three time series, this study has tried to deduct patterns of innovation among business sectors, during pre-concurrent-post periods of popularization of the term ‘open innovation’, emphasizing their implications on entrepreneurship development. However, efforts have been given to emphasize on prominent taxonomies that exists among small and medium enterprises (SMEs). Thereafter, it has tried to develop a framework on taxonomies of innovation focusing the emerging knowledge economy and the prevailing global economic crisis. The paper is an exploratory literature review and assists in knowledge acquisition. Open Innovation in Entrepreneurships: Taxonomies of Innovation in Knowledge-Based Economy","PeriodicalId":102199,"journal":{"name":"Int. J. E Entrepreneurship Innov.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133851387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}