Search results

1 – 10 of 673
Book part
Publication date: 7 December 2023

Anu Suominen, Vilho Jonsson, Eric Eriksson, Jessica Fogelberg and Johan Bäckman

One of the two main tasks of innovation leadership, a practice to inspire and enable creativity and innovation in organisations, is to construct a creativity-enabling…

Abstract

One of the two main tasks of innovation leadership, a practice to inspire and enable creativity and innovation in organisations, is to construct a creativity-enabling organisational environment. One form of this main task is using developmental interactions, like mentoring, as innovation leadership practices. A hackathon is one type of innovation contest with three designed phases: pre-hackathon, hackathon event and post-hackathon, involving multiple stakeholders with distinct roles, such as hackers and mentors. In a hackathon, the central activity of mentors is to support the hackers’ innovation process, especially in idea creation and concept development. The mentor role has not been focal in hackathon studies; thus, this chapter addresses the role, impact, and ways to acknowledge the mentors as an integral, contributing innovation leadership practice in hackathons. As an empirical study, this chapter presents the results of a public sector case in a Swedish multi-disciplinary municipality conducting intra-organisational hackathons in three different collocations. The chapter contributes to the literature on innovation leadership at the team level with mentorship in innovation contests in the public sector context by revealing the dual-role tension of innovation leadership in mentor activities in the hackathon event phase from both the hackers’ and mentors’ viewpoints, and the necessity of mentor-benefitting training in pre-hackathon phase.

Details

Innovation Leadership in Practice: How Leaders Turn Ideas into Value in a Changing World
Type: Book
ISBN: 978-1-83753-397-8

Keywords

Book part
Publication date: 30 September 2021

J. David Hacker, Michael R. Haines and Matthew Jaremski

The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also…

Abstract

The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also took place long before the nation’s mortality transition, industrialization, and urbanization. This paper assembles new county-level, household-level, and individual-level data, including new complete-count IPUMS microdata databases of the 1830–1880 censuses, to evaluate different theories for the nineteenth-century American fertility transition. We construct cross-sectional models of net fertility for currently-married white couples in census years 1830–1880 and test the results with a subset of couples linked between the 1850–1860, 1860–1870, and 1870–1880 censuses. We find evidence of marital fertility control consistent with hypotheses as early as 1830. The results indicate support for several different but complementary theories of the early US fertility decline, including the land availability, conventional structuralist, ideational, child demand/quality-quantity tradeoff, and life cycle savings theories.

Book part
Publication date: 7 October 2019

Saeed J. Roohani and Xiaochuan Zheng

With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to…

Abstract

With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally produced video series. The authors developed these videos for educating students on cybersecurity and the videos are available free to instructors from other institutions who wish to use them. The videos are filled with insights and advice from our two experts – one a former hacker and the other an experienced cybersecurity professional. This dialogue between two different sides provides a rich discussion that leads to answering many questions that people often have about cybersecurity. Further, in Exhibit 1, this chapter offers a framework for characterizing and analyzing some recent publicized data-breach cases, which can supplement discussion on cybersecurity modules. Instructors can add more cases to this source overtime. Finally, the authors share the analysis of feedback from students who went through the series. The results suggest that the students show interest in the topic, and videos helped them better understand the complexity of cybersecurity risk and controls.

Details

Advances in Accounting Education: Teaching and Curriculum Innovations
Type: Book
ISBN: 978-1-78973-394-5

Keywords

Book part
Publication date: 23 August 2022

Craig A. Talmage, Kaleb Boyl and T. Alden Gassert

Entrepreneurship is ubiquitous, but it is not unequivocally a human force for social and economic good. Critical perspectives of the entrepreneur, entrepreneurship, and

Abstract

Entrepreneurship is ubiquitous, but it is not unequivocally a human force for social and economic good. Critical perspectives of the entrepreneur, entrepreneurship, and entrepreneurial success (and failure) are evolving in the scholarly literature. Dark side theory has emerged as a language for critiquing the dominant narratives of entrepreneurship portrayed in scholarship, education, planning, policy, and other forms of practice. This chapter draws from dark side entrepreneurship theory, Baumolian entrepreneurship, and exemplars of counterculture to craft language for an emerging theory of misfit entrepreneurship, which consists of misfit entrepreneurs and alternative enterprises. Alternative enterprises and misfit entrepreneurs are conceptualized, and literary examples (i.e., Robin Hood and Song Jiang) and modern-day examples (i.e., Hacker groups) are supplied. The unique actions and impacts of misfit entrepreneurs and alternative enterprises are offered for discussion. This new theory of misfit entrepreneurship leaves readers with exploratory questions that enhance critical perspectives and modern understandings of entrepreneurship today.

Details

How Alternative is Alternative? The Role of Entrepreneurial Development, Form, and Function in the Emergence of Alternative Marketscapes
Type: Book
ISBN: 978-1-80071-773-2

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Book part
Publication date: 27 November 2018

K. Hazel Kwon and Jana Shakarian

This chapter explores collective information processing among black-hat hackers during their crises events. The chapter presents a preliminary study on one of Tor-based darknet…

Abstract

This chapter explores collective information processing among black-hat hackers during their crises events. The chapter presents a preliminary study on one of Tor-based darknet market forums, during the shutdowns of two cryptomarkets. Content and network analysis of forum conversations showed that black-hat users mostly engaged with rational information processing and were adept at reaching collective solutions by sharing security advices, new market information, and alternative routes for economic activities. At the same time, the study also found that anti-social and distrustful interactions were aggravated during the marketplace shutdowns. Communication network analysis showed that not all members were affected by the crisis events, alluding to a fragmented network structure of black-hat markets. The chapter concludes that, while darknet forums may constitute resilient, solution-oriented users, market crises potentially make the community vulnerable by engendering internal distrust.

Details

Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow
Type: Book
ISBN: 978-1-78769-666-2

Keywords

Abstract

Details

Radical Transparency and Digital Democracy
Type: Book
ISBN: 978-1-80043-763-0

Book part
Publication date: 16 January 2023

Philip C. Sookram

This chapter examines the current state of crypto exchange-traded funds (ETFs). It focuses on issues preventing wider implementation and specific products. ETFs have become a…

Abstract

This chapter examines the current state of crypto exchange-traded funds (ETFs). It focuses on issues preventing wider implementation and specific products. ETFs have become a popular investment vehicle that investors use to help achieve their long-term goals. A recurring theme is that regulators protect individual investors from direct exposure to cryptocurrency, which many view as highly speculative investments. Pressure from institutions and investors for a bitcoin-based ETF made progress in 2021 when Proshares, an ETF specialized investment company, debuted the first-ever bitcoin futures ETF in the United States. This event is the first-time investors could buy a fund on the New York Stock Exchange that tracks derivative futures contracts of bitcoin. This occurrence pushed this digital asset’s spot price to all-time highs, serving as a breakthrough in cryptocurrency history.

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

Keywords

Book part
Publication date: 19 December 2017

Sharon Zukin and Max Papadantonakis

Hackathons, time-bounded events where participants write computer code and build apps, have become a popular means of socializing tech students and workers to produce “innovation”…

Abstract

Hackathons, time-bounded events where participants write computer code and build apps, have become a popular means of socializing tech students and workers to produce “innovation” despite little promise of material reward. Although they offer participants opportunities for learning new skills and face-to-face networking and set up interaction rituals that create an emotional “high,” potential advantage is even greater for the events’ corporate sponsors, who use them to outsource work, crowdsource innovation, and enhance their reputation. Ethnographic observations and informal interviews at seven hackathons held in New York during the course of a single school year show how the format of the event and sponsors’ discursive tropes, within a dominant cultural frame reflecting the appeal of Silicon Valley, reshape unpaid and precarious work as an extraordinary opportunity, a ritual of ecstatic labor, and a collective imaginary for fictional expectations of innovation that benefits all, a powerful strategy for manufacturing workers’ consent in the “new” economy.

1 – 10 of 673