{"title":"Understanding Smart Contracts: Hype or Hope?","authors":"E. Zinovyeva, Raphael C. G. Reule, W. Härdle","doi":"10.2139/ssrn.3804861","DOIUrl":"https://doi.org/10.2139/ssrn.3804861","url":null,"abstract":"Smart Contracts are commonly considered to be an important component or even a key to many business solutions in an immense variety of sectors and promises to securely increase their individual efficiency in an ever more digitized environment. Introduced in the early 1990's, the technology has gained a lot of attention with its application to blockchain technology to an extent, that can be considered a veritable hype. Reflecting the growing institutional interest, this intertwined exploratory study between statistics, information technology, and law contrasts these idealistic stories with the data reality and provides a mandatory step of understanding the matter, before any further relevant applications are discussed as being ``factually\" able to replace traditional constructions. Besides fundamental flaws and application difficulties of currently employed Smart Contracts, the technological drive and enthusiasm backing it may however serve as a jump-off board for future developments thrusting well in the presently unshakeable traditional structures.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Bauer, Keith N. Hampton, Laleah Fernandez, Craig T. Robertson
{"title":"Overcoming Michigan’s Homework Gap: The Role of Broadband Internet Connectivity for Student Success and Career Outlooks","authors":"J. Bauer, Keith N. Hampton, Laleah Fernandez, Craig T. Robertson","doi":"10.2139/ssrn.3714752","DOIUrl":"https://doi.org/10.2139/ssrn.3714752","url":null,"abstract":"Differences in home Internet access have direct and indirect effects on K-12 student educational achievements. Much of the attention during the past years has been on the homework gap, disadvantages to students of lacking or poor Internet connectivity at home for the completion of homework assignments. Our research, based on a detailed survey of 3,258 students in grades 8-11 in small town and rural Michigan school districts, shows that the homework gap is real even after controlling for socioeconomic and other factors. It also shows that disparities in home Internet connectivity are associated, directly and indirectly, with much broader student performance gaps. They are associated with the development of digital skills, grades, standardized test scores, career orientation, and interest in pursuing post-secondary education. These challenges require a portfolio of responses, including coordinated efforts by local, state and federal policymakers to mitigate broadband infrastructure access and affordability gaps. They also require measures to make appropriate access devices available and the facilitation of skills and practices to take advantage of the opportunities offered by digitally supported teaching and learning.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Problems of Managing Business Processes of Engineering Companies in the Implementation of Investment Projects","authors":"A. Gurenko, Sergey A. Gurenko","doi":"10.15587/2706-5448.2020.207243","DOIUrl":"https://doi.org/10.15587/2706-5448.2020.207243","url":null,"abstract":"The object of research is a business process management system of engineering companies. The paper considers the existing system of interaction between design institutes, engineering companies and manufacturing enterprises implementing investment projects. In particular, the differences in the construction of business processes in previously existing design institutions and modern engineering companies are identified. The research methodology is based on theoretical and methodological analysis of scientific literature, statistical methods, as well as observation, comparative method, description, measurement. The use of scientific research methods has revealed weaknesses and contradictions in the business process management system.<br><br>The results of this research indicate that the development, verification and approval of design and estimate specifications are the main business process of engineering companies. It is proved that these business processes are an integral part of the investment project. Therefore, for the successful implementation of company projects, customers attract a large number of external contracting organizations – design, engineering, construction companies. The increase in the number of participants in the investment process significantly complicates the construction of business processes, which leads to an increase in the timing of development, verification and approval of design and estimate specifications.<br><br>The analysis allows to identify the causes of inconsistencies when working with specification. The main reasons for increasing the verification time are systemic problems in organizing the interaction of project participants. It is determined that the pre-existing holders of archival design specification that provided comprehensive turnkey services have practically disappeared from the market. Contracting organizations appeared in their place, separated from large specialized design organizations. The created contracting organizations work in different versions of the software, therefore they created sets of documents of varying degrees of detail of design decisions. In general, it is recommended to optimize the docking of documents between participants in investment projects. The implementation of the proposed measures becomes possible in the context of the introduction of information technology based on joint teamwork to create an electronic model.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christy Faith Noñeza, Kimberly Digal, Glendell Jadraque, Shella Mae Estellore, Wilmera Pogoy, Jessa Mae Silagan
{"title":"Information System Development Plan For The Motorzone Marketing Inc.","authors":"Christy Faith Noñeza, Kimberly Digal, Glendell Jadraque, Shella Mae Estellore, Wilmera Pogoy, Jessa Mae Silagan","doi":"10.2139/ssrn.3626603","DOIUrl":"https://doi.org/10.2139/ssrn.3626603","url":null,"abstract":"The purpose of this research is to explain in detail the development plan of implementing the Information System on Motorzone Marketing Inc. The Company is a large business that supports multi-branded motorcycle brands and sells it to the market. This study will give information and background of the business and also the business owner or the person in charge.<br><br>This paper will state and provide a depth analysis of the business's processes and problems encountered in the industry by conducting an interview. Through this method, we could provide insights, ideas, and solutions. Provide ideas in having a good relationship, especially to their customers and the use of customer intelligence (CI). This research will propose an Information System that will fit the business needs and solve current problems. And also provide an IT Infrastructure plan to help more the business workflow and management that could build excellent services and opportunities for the market.<br>","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks","authors":"Cheman Shaik","doi":"10.5121/ijcsea.2020.10101","DOIUrl":"https://doi.org/10.5121/ijcsea.2020.10101","url":null,"abstract":"A counter challenge authentication method is presented for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case the correct answer is received from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer or inability of the web application to provide the correct answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping submission of password to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Remote Health Monitoring System","authors":"T. Patel, P. Sharma, Vikas Yadav, S. Suman","doi":"10.2139/ssrn.3536149","DOIUrl":"https://doi.org/10.2139/ssrn.3536149","url":null,"abstract":"As the technology changing every year so, there have been an attempts to utilize the new technology in various areas to improve the quality of human life. One of the major field of research that has seen an adoption of the technology is the healthcare sector. As a result, our project is an attempt to solve a healthcare problem currently people are facing. The main objective of our project is to design a remote healthcare system. It covers of three main parts. The first part is, detection of patient’s condition with the proposed system, second is to storing data on cloud storage and the last part is to provide the data for remote viewing. Remote viewing of the data enables a doctor or guardian to monitor a patient’s health progress from anywhere. In this project, we have presented an IoT architecture customized for healthcare applications. The main motive of this project is to come up with a Remote Health Monitoring System that will made with locally available sensors with a view to making it affordable for everyone.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"89 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Duenser, M. Paier, Astrid Unger, M. Barber, Thomas Scherngell
{"title":"Regional Knowledge Creation and R&D Collaboration in Europe: Specification of an Empirical Agent-Based Model","authors":"M. Duenser, M. Paier, Astrid Unger, M. Barber, Thomas Scherngell","doi":"10.2139/ssrn.3456085","DOIUrl":"https://doi.org/10.2139/ssrn.3456085","url":null,"abstract":"This working paper reports the current stage of development of an agent-based model (ABM) of regional knowledge creation in Europe. Building on the scientific and conceptual foundations laid out before (see Duenser et al. 2017) the paper focuses on the specifications regarding model architecture, knowledge creation processes and collaboration procedures. The novelty of the model is in the extensive use of empirical data for the initialization and the calibration of the ABM, both at the level of firms, at the level of regions and inter-regional networks, which will enable us to apply the model to real world contexts: In policy experiments the effect of external framework conditions (especially policy interventions) on the regional knowledge creation can be simulated, in order to support the ex-ante evaluation of different policy measures in the field of regional innovation. Both the theoretical foundation and the empirical foothold of the model will raise the level of its practical relevance for policymakers at regional, national and European levels.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System Theoretic Approach to Cybersecurity Risk Analysis and Mitigation for Autonomous Passenger Vehicles","authors":"Lee Sian Wei, S. Madnick","doi":"10.2139/ssrn.3370555","DOIUrl":"https://doi.org/10.2139/ssrn.3370555","url":null,"abstract":"Urban Mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, as well as connected and self-driving vehicles. Technological advancements often lead to new hazards and changing nature in how accidents can happen. Coupled with the increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as one of the key threats affecting the safety of these vehicles. Traditional hazards analysis methods treat safety and security in isolation, and are limited in their ability to account for interactions among organizational, socio-technical, human, and technical components. In response to these challenges, the System Theoretic Process Analysis (STPA) was developed to meet the growing need for system engineers to holistically analyze complex socio-technical systems. We applied STPA-Sec, an extension to STPA to include security analysis, to co-analyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service use case, focusing on over-the-air software updates feature. Overall, STPA-Sec identified additional hazards and more effective requirements compared to CHASSIS. In particular, STPA-Sec demonstrated the ability to identify hazards due to unsafe/ unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for STPA-Sec. Finally, results from both methods were back-tested against a past cyber hack on a vehicular system, and we found that recommendations from STPA-Sec were likely to mitigate the risks of the incident.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citation Analysis of the Journal of Digital Information Management","authors":"S. R., G. Ulaganathan, Muthukrishnan M","doi":"10.26524/KRJ137","DOIUrl":"https://doi.org/10.26524/KRJ137","url":null,"abstract":"This Paper presents a Citation Analysis of the Journal of Digital Information Management for the period between 2010 to 2014. The analysis covers mainly the Volume-wise Distribution of Citations, Distribution of Citations According to Bibliographic Forms, Authorship Pattern of Citations, Chronological Distribution of Citations, Author self citation. All the studies point towards the merits and weaknesses of the Journal which will be helpful for its further development. The study reveals that the average citations per article are 17.64. The study also found that journals/serial publications remain the most useful source of information 1896 (41.28%) out of a total 4593 citations.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ravindran, Anjana Susarla, Deepa Mani, V. Gurbaxani
{"title":"Social Capital, Reputation and Contract Duration in Buyer-Supplier Networks for Information Technology Outsourcing","authors":"K. Ravindran, Anjana Susarla, Deepa Mani, V. Gurbaxani","doi":"10.2139/ssrn.1975210","DOIUrl":"https://doi.org/10.2139/ssrn.1975210","url":null,"abstract":"This paper presents new evidence on the role of embeddedness in predicting contract duration in the context of information technology outsourcing. Contract duration is a strategic decision that aligns interests of clients and vendors, providing the benefits of business continuity to clients and incentives to undertake relationship specific investments for vendors. Considering the salience of this phenomenon, there has been limited empirical scrutiny of how contract duration is awarded. We posit that clients and vendors obtain two benefits from being embedded in an interorganizational network. First, the learning and experience accumulated from being embedded in a client-vendor network could mitigate the challenges in managing longer term contracts. Second, the network serves as a reputation system that can stratify vendors according to their trustworthiness and reliability, which is important in longer term arrangements. In particular, we attempt to make a substantive contribution to the literature by theorizing about embeddedness at four distinct levels: structural embeddedness at the node level, relational embeddedness at the dyad level, contractual embeddedness at the level of a neighborhood of contracts, and finally, positional embeddedness at the level of the entire network. We analyze a data set of 22,039 outsourcing contracts implemented between 1989 and 2008. We find that contract duration is indeed associated with structural and positional embeddedness of participant firms, with the relational embeddedness of the buyer-seller dyad, and with the duration of other contracts to which it is connected through common firms. Given the nature of our data, identification using traditional ordinary least squares based approaches is difficult given the unobserved errors clustered along two nonnested dimensions and the autocorrelation in a firm's decision here the contract with those of contracts in its reference group. We use a multiway cluster robust estimation and a network auto-regressive estimation to address these issues. Implications for literature and practice are discussed.","PeriodicalId":285194,"journal":{"name":"IRPN: Innovation & Information Management (Topic)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128791214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}