Search results
1 – 10 of over 5000The history of the field of entrepreneurship and the entrepreneurship program at Saint Louis University is discussed, along with the descriptions of the Gateways to…
Abstract
The history of the field of entrepreneurship and the entrepreneurship program at Saint Louis University is discussed, along with the descriptions of the Gateways to Entrepreneurship Conferences and the creation of the Advances in Entrepreneurship, Firm Emergence, and Growth (AEFEG) series given in relation to those national- and campus-level contexts. The growth and development of the AEFEG series is discussed and the editorial contributors are noted, which could be of use to those interested in editorial roles and processes. Based on these elements, the chapter concludes with observations on the field of entrepreneurship and some ideas about its future.
Details
Keywords
Lawrence Dowler and Laura Farwell
In 1993, a proposal was made at Harvard College to renovate the principal undergraduate library (Lamont) to create a Gateway library. What do we mean by that phrase? A Gateway…
Abstract
In 1993, a proposal was made at Harvard College to renovate the principal undergraduate library (Lamont) to create a Gateway library. What do we mean by that phrase? A Gateway library, as we define it, is a transition from a traditional library (characterized, perhaps a little unfairly, as a passive storehouse of the scholarly output of printed texts and space for their study) to the emerging world of digital information and distributed computing, sometimes whimsically portrayed as a network of astonishing resources available over broadband networks from anywhere in the world. Specific predictions about how information technology will change and affect libraries is premature, in part, because we do not fully understand how it will affect universities, of which libraries are a necessary and integral part. The Gateway, then, represents a transition between two learning cultures—print and digital—and tries to bridge the gap between the traditional library and what it might become as higher education metamorphoses.
Arijit Ukil, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal and Tulika Bose
The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained…
Abstract
Purpose
The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process.
Design/methodology/approach
This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost.
Findings
It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution.
Research limitations/implications
This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol.
Practical implications
Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent.
Originality/value
Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.
Details
Keywords
It has taken about twenty years to develop and implement the wide range of public databases offered via host services today. In most cases the information available is…
Abstract
It has taken about twenty years to develop and implement the wide range of public databases offered via host services today. In most cases the information available is bibliographic, factual or numeric, but full text databases are becoming more and more important. To improve their services, some vendors have added sophisticated graphics and front end features to their bibliographic and numeric databases. These improvements have been applied both at the host site, with the host systems handling the bulk of data and graphics processing, and to PC and workstation software, where sophisticated graphics and text processing packages adapted to host‐specific output formats are required. Future developments are expected in three main areas: (1) host based menu‐driven systems which do not require sophisticated user hardware; (2) menu and front end interfaces on gateway and mailbox services which allow easy access to many databases, albeit with limited search capabilities; (3) PC or front end computer based systems which already have good retrieval interaction and input/output processing features, but require more expensive hardware and software at the user's site. In the future, PC based systems are expected to utilise expert systems, both to support the retrieval of information online and to enhance the quality of the retrieved information by sophisticated post‐processing features. The developments in user support features and advanced search input/output environments which have hitherto been implemented for non full text databases now need to be introduced to enhance full text retrieval.
The purpose of this article is to describe some recent experiences at the United Kingdom Open University (UKOU) in setting up computer‐mediated communication (CMC) support for…
Abstract
The purpose of this article is to describe some recent experiences at the United Kingdom Open University (UKOU) in setting up computer‐mediated communication (CMC) support for housebound disabled or otherwise isolated students. The driving force behind this experiment was the important role that CMC has as an educational tool; it empowers and reduces isolation of remote learners. This feature of CMC has received little attention, for, hitherto its application within education has been linked mainly to its use as a teaching aid. Educators concerned with the issue of widening access to higher education may be interested in learning about the OU project and its outcomes. The note first describes the context of this application, by reviewing the multimedia approach to home‐based, parttime, distance education used by the UKOU. The key lessons learned from the use of CMC as an educational tool since 1988 are summarized. The current housebound student project is then described, both in terms of the design stages through to implementation of network activity and interim evaluation and review. Finally, some key points for others interested in implementing a similar scheme are summarized.
Jerome A. Katz and Dean A. Shepherd
Cognition has always been central to the popular way of thinking about entrepreneurship. Entrepreneurs imagine a different future. They envision or discover new products or…
Abstract
Cognition has always been central to the popular way of thinking about entrepreneurship. Entrepreneurs imagine a different future. They envision or discover new products or services. They perceive or recognize opportunities. They assess risk, and figure out how to profit from it. They identify possible new combinations of resources. Common to all of these is the individual’s use of their perceptual and reasoning skills, what we call cognition, a term borrowed from the psychologists’ lexicon.
The purpose of this paper is to offer a conceptual understanding of the role played by social capital when firms engage in collaborative partnerships to develop their innovative…
Abstract
Purpose
The purpose of this paper is to offer a conceptual understanding of the role played by social capital when firms engage in collaborative partnerships to develop their innovative capability, especially under environmental turbulence.
Design/methodology/approach
The paper is theoretical in nature, drawing conceptual insights from two complementary theories: the resource-based view of the firm and institutional theory.
Findings
Social capital plays a beneficial role by enhancing the innovative capability of firms, but only up to a point. The paper argues social capital has both positive and negative effects and follows a non-linear relationship with innovative capability. Further, this relationship is also affected by the level of environmental turbulence faced by the firm.
Originality/value
By conceptualizing social capital as a double-edged sword in terms of its impact on firm innovative capability, the paper offers insights for managerial action and practice.
Details
Keywords