Professional Documents
Culture Documents
Full Chapter Innovation in Sustainable Management and Entrepreneurship 2019 International Symposium in Management Sim2019 Gabriela Prostean PDF
Full Chapter Innovation in Sustainable Management and Entrepreneurship 2019 International Symposium in Management Sim2019 Gabriela Prostean PDF
https://textbookfull.com/product/strategic-engineering-
innovation-entrepreneurship-and-management-1st-edition-arcade-
jacques/
https://textbookfull.com/product/proceedings-of-ideas-2019-the-
interdisciplinary-conference-on-innovation-design-
entrepreneurship-and-sustainable-systems-luciana-pereira/
https://textbookfull.com/product/entrepreneurship-and-management-
in-an-islamic-context-1st-edition-veland-ramadani/
https://textbookfull.com/product/management-participation-and-
entrepreneurship-in-the-cultural-and-creative-sector-martin-
piber/
Tropical Wetlands Innovation in Mapping and Management
Proceedings of the International Workshop on Tropical
Wetlands Innovation in Mapping and Management October
19 20 2018 Banjarmasin Indonesia 1st Edition Yiyi
Sulaeman (Editor)
https://textbookfull.com/product/tropical-wetlands-innovation-in-
mapping-and-management-proceedings-of-the-international-workshop-
on-tropical-wetlands-innovation-in-mapping-and-management-
october-19-20-2018-banjarmasin-indonesia-1st/
https://textbookfull.com/product/digital-startups-in-transition-
economies-challenges-for-management-entrepreneurship-and-
education-agnieszka-skala/
https://textbookfull.com/product/international-scientific-
conference-energy-management-of-municipal-facilities-and-
sustainable-energy-technologies-emmft-2019-volume-1-vera-murgul/
https://textbookfull.com/product/international-scientific-
conference-energy-management-of-municipal-facilities-and-
sustainable-energy-technologies-emmft-2019-volume-2-vera-murgul/
https://textbookfull.com/product/success-in-academic-surgery-
innovation-and-entrepreneurship-mark-s-cohen/
Springer Proceedings in Business and Economics
Gabriela Prostean
Juan José Lavios Villahoz
Laura Brancu
Gyula Bakacsi Editors
Innovation in
Sustainable
Management and
Entrepreneurship
2019 International Symposium in
Management (SIM2019)
Springer Proceedings in Business and Economics
Springer Proceedings in Business and Economics brings the most current research
presented at conferences and workshops to a global readership. The series features
volumes (in electronic and print formats) of selected contributions from conferences
in all areas of economics, business, management, and finance. In addition to an
overall evaluation by the publisher of the topical interest, scientific quality, and
timeliness of each volume, each contribution is refereed to standards comparable to
those of leading journals, resulting in authoritative contributions to the respective
fields. Springer’s production and distribution infrastructure ensures rapid publica-
tion and wide circulation of the latest developments in the most compelling and
promising areas of research today.
The editorial development of volumes may be managed using Springer’s
innovative Online Conference Service (OCS), a proven online manuscript
management and review system. This system is designed to ensure an efficient
timeline for your publication, making Springer Proceedings in Business and
Economics the premier series to publish your workshop or conference volume.
Editors
Innovation in Sustainable
Management
and Entrepreneurship
2019 International Symposium
in Management (SIM2019)
123
Editors
Gabriela Prostean Juan José Lavios Villahoz
Polytechnic University of Timişoara University of Burgos
Timișoara, Romania Burgos, Spain
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction
v
vi Introduction
Part II Entrepreneurship
7 Trust at Work and Entrepreneurial Intentions Among Employed
Persons in Organizations in Serbia . . . . . . . . . . . . . . . . . . . . . . . . . 81
Predrag Mali, Bogdan Kuzmanović, Milan Nikolić,
Edit Terek Stojanović, and Siniša Mitić
vii
viii Contents
Abstract The experience of recent years has brought to the forefront a problem
that can affect our everyday life: cybercrime. In higher education institutions, this
problem is quite acute due to the increase in the number and types of equipment
that can be connected to data networks. This problem is also influenced by the
nature of educational and research activities involving a large number of teaching
staff, auxiliary or non-teaching staff and students as well as complex computing and
research systems in various fields. Members of higher education institutions are may
be victims of cyber-attacks of all kinds (social engineering, DDOS attacks, Trojans,
viruses and worms), or the need to find win–win variants as easily as possible can
bring some of these into cybercrime. Finding a restricted access variant with different
security barriers is essential for the proper functioning of the education and research
process in this type of institution. In this context, the research objective is to identify
and classify the main threats and attacks on the data network, the various information
and research currently faced by higher education institutions. These issues need to be
treated with utmost seriousness because, in general, the annihilation of cyber-attacks
is done after they have been done, thus completely or partially losing certain data,
and the creation of security barriers could limit access by attackers to confidential
information of the institution. The results serve to open a new research direction
that leads to the development of a security management model tailored to academic
activity.
1.1 Introduction
Since the twentieth century, written information, stored and transmitted on paper, has
begun to be replaced, almost entirely in some fields of activity, with electronic ones.
Also, the emergence of electronic signature will soon lead to the complete digitiza-
tion of documents and finally the disappearance of paper-based official documents,
which need signature and stamp. The experience of recent years has brought to the
forefront a problem that can affect our everyday life: cybercrime. In higher education
institutions, this problem is quite acute due to the increase in the number and types of
equipment that can be connected to data networks. This problem is also influenced by
the nature of educational and research activities involving a large number of teaching
staff, auxiliary or non-teaching staff and students as well as complex computing and
research systems in various fields [1].
The main aspects of cyber-security in higher education institutions are related to
frequency of cyber-attacks, limited IT resources and cyber-security culture.
1.2.1 Phishing
Phishing is a method of identity theft, so for those who launch such cyber-attacks,
any information which is precious will resort to any means to get what they want.
However, many measures will be taken, and they discover new ways of penetrat-
ing security barriers between computers or networks and the Internet. At this time,
1 Aspects of Cyber-Security in Higher Education Institutions 5
Fig. 1.1 Spear phishing attack model used to launch targeted attacks. Copyright © 2014 by Sood
and Richard [3]
phishing has been taken on a huge scale in higher education institutions in Romania,
which are very exposed, even more exposed than institutions in other parts of the
world. But that does not mean we cannot protect against this method of attacking
documents (Fig. 1.1).
In the higher education institutions, when a phishing attack occurs, the attacker
sends his emails or SMSes to his clients from various companies or important insti-
tutions. The subject of the email and its content differs from a phishing attack to
another, indicating malfunctions or technical errors that need to be resolved by re-
entering the personal data of the attacker and going up to messages that promise
certain pecuniary benefits. This type of cyber-attack is almost as old as the Internet.
Criminals use so-called social engineers to trick users, infecting computers with var-
ious types of viruses, stealing their money from cards or their identity, and taking
their data and even some digital documents related to studies or research.
6 A.-C. Cojocariu et al.
The computer and communication security model presented above must com-
ply with the security levels without being a “top-down” bypass on the net-
works/departments [7].
This involves securing access to the same security management model and having
respective security levels and security barriers. The information must be classified
according to the level of risk where they come from, and their transmission between
the departments of a security level or between them is being made under strict
record [8].
In higher education institutions, many students and staff members have no knowl-
edge of cyber-security. For this reason, along with the expansion of technology use,
they increase the cyber-attack area on the institution. To be able to use technol-
ogy and innovation in research in good conditions without compromising security,
higher education institutions need to develop a defence strategy against these digital
security aspects. Developing a cyber-security culture can cause an IT user to verify
the authenticity of the sender of a mail requesting various personal information or
selecting a link or opening an attachment [10].
Achieving a cyber-security culture plan is essential. This can be done in five steps
as follows:
1. Knowledge of the institution, which has an essential role in the realization of the
cyber-security culture plan;
2. Measure the current level of the cyber-security culture of the target audience at
the academic level;
3. Developing a cyber-security culture plan in this institution;
4. Implementing an updated cyber-security culture plan at the institution level;
5. Acquiring state-of-the-art, efficient, anti-cyber-attack programs [11].
1.6 Conclusions
The three aspects of digital security must be treated with utmost seriousness because
it influences the good course of the institution at all levels. Finding a restricted
access variant with different security barriers is essential for the proper functioning
of the education and research process in this type of institution. In this context, the
research objective is to identify and classify the main threats and attacks on the data
1 Aspects of Cyber-Security in Higher Education Institutions 11
network, the various information and research currently faced by higher education
institutions. These issues need to be treated with utmost seriousness because, in
general, the annihilation of cyber-attacks is done after they have been done, thus
completely or partially losing certain data, and the creation of security barriers could
limit access by attackers to confidential information of the institution. The results
serve to open a new research direction that leads to the development of a security
management model tailored to academic activity [12].
References
Abstract The purpose of this paper is to identify the most influential documents
using mobile technology for creating alerts in emergency situations and the concep-
tual research structure by analysing the most influential authors, cited papers, and
cited journals. In order to accomplish these objectives, the authors used the Dimen-
sions database. Articles from 2010 to 2019 were considered, and a total number of
2500 of articles were analysed. This analysis provides a thorough visualization of
the research directions of the field of alerts in emergency situations using mobile
applications.
2.1 Introduction
This paper proposes to identify the most influential and the most documents, the
existing collaboration networks, and also the intellectual structure in the field of
mobile applications designed for emergency notifications.
In order to accomplish these objectives, VOS Viewer software was used. VOS
Viewer software was developed by de Van Eck [10]. VOS Viewer is a software tool
for constructing and visualizing bibliometric networks and provides advanced visu-
alization tools. These networks may, for instance, include journals, researchers, or
individual publications, and they can be constructed based on citation, bibliographic
coupling, co-citation, or co-authorship relations, and geographic areas influence upon
the researched field. Within the present research, VOS Viewer version 1.6.11 was
used [10].
In the field of mobile alert application for emergency situations, there are only few
scientometric studies using the mapping of these topics. Therefore, we shall briefly
extract from the abstracts the main topics of these articles and introduce them in
the reference list. None of these articles applies the bibliometric methodology in the
field of the mobile application for emergency alerts. The main topics of scientometric
studies on mobile applications alerts are listed in Table 2.1.
This study will provide, for academic and industrial environments, an overview in
the field of mobile application notifications for emergency situations and will identify
new approaches and the newest related topics in the field. Furthermore, there will be
extensive information about the authors and papers with the highest influence and
the development directions of different aspects concerning the mobile emergency
applications.
This article also proposes to contribute to a better understanding of the alerts in
emergency situations created by mobile applications, by providing useful informa-
tion to researchers working in this area. In the next section, we present in brief the
scientometric methods, then we detail upon the research methodology and then the
research and collaboration tendencies are presented for the field of mobile emergency
applications, and then, the main results are represented. Finally, the conclusions,
implications, and limitations of this study are highlighted.
Table 2.1 Main topics of scientometric studies on mobile application alerts topics
Title of the article Citation Abstract
A scientometric analysis of mobile Santhakumar and Kaliyaperumal [8] “This paper focus on the growth and
technology publications development of mobile technology
research in terms of publication
output as reflected in Web of
Science database. During
2000–2013 a total of 10,638
publications were published in the
field. The average number of
publications published per year was
759.86 and the highest number of
publications 1495 were published in
2013”
Scientific production on mobile Pinto et al. [7] “This paper offers a bibliometric
information literacy in higher analysis of the scientific production
education: a bibliometric analysis on Mobile Information Literacy in
(2006–2017) Higher Education published
between 2006 and 2017, taking into
account papers covered by Web of
Science, Scopus, Library and
Information Science Abstracts,
Library and Information Science
and Technology Abstract, and
Education Resources Information
Center”
(continued)
2 Alerts in Emergency Situations Using Mobile Technology, Scientometric … 15
There are several reasons to use scientometric methods in research. First, we can get
an overview of the literature in the field. Second, the traditional methods provide a
critical analysis but a subjective choice of the selected articles, and third, the studies
using the date have more relevance when different subjects are analysed [3].
The realization of the intellectual structure of a research field can be achieved
through the analysis of co-citation. Co-citation is defined as the frequency with
which two documents are quoted together by other documents. In this analysis, it
has been considered that two articles cited together have similar topics and a higher
frequency of co-citation involves a higher affinity among them [9].
Another used technique is bibliographic coupling which handles the number of
references commonly used by two documents, as a measure for similarity. This
technique offers a higher connectivity perspective of two documents analysed [11].
A different technique is based on the analysis of authors coupling, or co-
authorship, which studies the social structure of a certain field. The authors coupling
provide data about the authors and their affiliations in institutions and countries.
The analysis of keywords, or co-words, represents the use of keywords for the
conceptual structure study in the research field. It is the only method based upon
using the document’s content in order to build a measure of similarity, while other
methods are indirectly coupling the documents by co-citation and co-authorship. This
technique is one of the most effective methods for developing emerging tendencies
and topics in a scientific domain [6].
For the field of mobile applications designed for emergency alerts, we propose to
apply the methods described above in order to accomplish the mapping of scientific
research by:
• Creating the research question;
• Compiling the obtained databases;
• Result analysis;
• Data visualization;
• Data interpretation.
This research defines the following questions:
1. Which documents have the highest influence in the field of the mobile application
designed for emergency situations?
2. Which is the intellectual structure of the mobile application designed for
emergency situations domain and how did it evolve?
First, we created the citations analysis in order to discover the most influential
documents in the field, and second, the analysis of co-citation was chosen in order
to identify the intellectual structure of the domain.
2 Alerts in Emergency Situations Using Mobile Technology, Scientometric … 17
Data compiling includes the selection of the databases, filtration of reference results,
and their refining. Next, the software must be chosen, and also, the manner of visual-
izing the information shall be decided. We decided to use the Dimensions database,
https://www.dimensions.ai/ [2].
Dimensions database was developed in a partnership with over 100 top research
organizations around the world. This database aims at eliminating the barriers from
the path of discovery and innovation, allowing the users to find and access faster the
most relevant information, to analyse the academic results and wider research and
gather information for future activities.
In order to select the information and include it in our analysis, we defined the
steps for synthesizing the information. We used the research strategy: “alerts” AND
“mobile technology”, as shown in Fig. 2.1.
As shown in Fig. 2.2, 7591 results were obtained, and we selected the publications
from 2010–2019 in the following domains: information systems, public health, arti-
ficial intelligence, business and management, and communication techniques. The
inclusion principle was the interest of the researchers for creating a mobile alert
Fig. 2.1 Conditions of documents inclusion and exclusion, image from dimensions
Fig. 2.2 Number of publications in the field between 2010 and 2019
18 R. Repanovici and A. Nedelcu
application for emergency situations and the interest areas for its realization. By
using Export Centre, we obtained the database as exposed in Fig. 2.3.
The first study is regarding the co-citation network in the field of mobile applications
designed for emergency alerts. According to small, the citation frequency of articles
represents a key concept, methods, or experiments in the field. So, this analysis
allows us to investigate which documents define the intellectual structure in the field
of mobile applications designed for emergency alerts.
Out of 2500 publications analysed, there were 55,920 cited articles, but only 318
met the condition of a minimum of 10 citations per article, as shown in Figs. 2.4 and
2.5.
Nodes of the same colour belong to the same cluster. The association method of
the link intensity used by VOS Viewer software identified five clusters in total, as
listed in Table 2.2. The total number of links is 12,818, and the total connections
between links are 23,375.
The second analysis was performed on the co-citation network. This analysis con-
tributes to the knowledge of the intellectual structure of different subjects, considering
the author as a set of works published by the author.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of From trail to
railway through the Appalachians
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
Language: English
BY
INDEX 183
LIST OF ILLUSTRATIONS
Figure Page
1. Cunard Steamship 3
2. Union Station, Springfield 6
3. Deerfield Valley, Charlemont, Mass. 8
4. Eastern Portal of Hoosac Tunnel 11
5. South Station, Boston 12
6. Henry Hudson 16
7. Sir William Johnson 20
8. Genesee Street, Utica 23
9. Old Fort Johnson, Amsterdam, New York 26
10. Oriskany Battle Monument 30
11. Herkimer directing the Battle of Oriskany 33
12. Herkimer’s Monument and Mansion 36
13. De Witt Clinton 43
14. Erie Canal, Utica 46
15. Erie Canal, Syracuse 48
16. Traveling by Packet on the Erie Canal 50
17. Erie Canal and Solvay Works, Syracuse 51
18. De Witt Clinton Train 54
19. Twentieth Century Limited 57
20. Rounding the Noses, Mohawk Valley 59
21. Penn Square, Lancaster, Pennsylvania 65
22. Bridge over Conestoga Creek, Lancaster,
Pennsylvania 67
23. Tollhouse near Lancaster, Pennsylvania 68
24. Hambright’s Hotel, on the “Lancaster Pike” 70
25. Old Road House, Chambersburg, Pennsylvania 71
26. Freight Locomotive, Pennsylvania Railroad 75
27. Tunnel, Portage Railway 76
28. Broad Street Station, Philadelphia 77
29. Bridge, Pennsylvania Railroad, above Harrisburg 79
30. Pennsylvania Railroad Shops, Altoona 80
31. Horseshoe Curve, Pennsylvania Railroad 81
32. Rock Cut, Pennsylvania Railroad 84
33. Tollhouse near Brownsville, Pennsylvania 87
34. Milestone, Braddock’s Road, Frostburg, Maryland 90
35. Old Road House, Brownsville, Pennsylvania 92
36. Cumberland and Gap in Wills Mountain 95
37. Bridge and Monument, National Road, near
Wheeling, West Virginia 96
38. Mount Royal Station, Baltimore 99
39. Chesapeake and Ohio Canal, Cumberland 100
40. Highest Point on Baltimore and Ohio Railroad, Sand
Patch, Pennsylvania 103
41. Down the Potomac from Harpers Ferry 106
42. Coke Ovens, Meyersdale, Pennsylvania 108
43. The Observation End, Baltimore and Ohio Railroad 110
44. Old Blockhouse, Pittsburg 112
45. Pittsburg 115
46. Coal Barges, Pittsburg 119
47. Pittsburg at Night 120
48. Furnaces near Pittsburg 121
49. River Front, Cincinnati 125
50. Luray, Shenandoah Valley 131
51. James River Gap in the Blue Ridge 134
52. Hilly Farm Lands, near Knoxville 136
53. Great Valley, from the Pinnacle, Cumberland Gap 139
54. Cumberland Gap from the East 143
55. Daniel Boone 145
56. Pineville Gap, Cumberland River 147
57. Cornfield near Cumberland Gap 150
58. Kentucky Blue Grass 152
59. Three States Monument, Cumberland Gap 153
60. George Rogers Clark 157
61. On the French Broad 159
62. John Sevier 162
63. James Robertson 164
64. Sevier Monument, Knoxville 165
65. Old Statehouse, Knoxville 166
66. Street in Knoxville 168
67. On the Campus, University of Tennessee 169
68. Marble Quarry near Knoxville 171
69. Statehouse, Nashville 173
70. Chattanooga from Cameron Hill 175
71. Broad Street, Atlanta 177
72. Fulton Bag and Cotton Mills, Atlanta 178
73. Georgia Institute of Technology, Atlanta 179
74. Iron Furnace, Birmingham 180
MAPS
Eastern United States Frontispiece
New England 4
New York 26
Pennsylvania 64
Southern Appalachian Region 132
FROM TRAIL TO RAILWAY
CHAPTER I
BOSTON AND THE BERKSHIRES
For generations, as the city has grown, her people have been
crowding back the ocean by filling in the shallows, and now her busy
streets extend over acres of “made land,” while from the south, the
west, and the north, lines of railway connect her with all parts of
America.
Not many years after the War of the Revolution a Boston
merchant ship went around the world. She took on board a native at
Hawaii, sold her load of furs in Canton, rounded Cape Horn, and
anchored at length in Boston harbor. So great an achievement did
this seem that Governor Hancock and the people said fine things
and made merry.
This little ship was eighty-three feet long, and you could measure
off seven or eight times her length on one of the big liners of to-day.
Later the same ship set sail again, and on the west coast of America,
in one of the roughest seas, her master, Captain Gray, saw the
mouth of a great river. He was determined to enter it. Having crossed
the breakers, he sailed up the river more than twenty miles, and to-
day it bears the name of his ship, the Columbia. Boston was
reaching out into the wide world. Many years later this discovery had
much to do with securing the rights of the United States in the
Oregon country against the claims of Great Britain.
Young lads often went out on these voyages, and the training
made them strong men. There were dangers on the ocean then
which to-day we do not fear, for pirates still lay in wait for
merchantmen and foreign powers took liberties with American ships.
One vessel seen in Boston harbor was named Catch-me-if-you-can.
Many years later, when Mr. Samuel Cunard of Halifax took a
contract to carry the royal mail between Liverpool and America, there
was an immediate protest from the Boston merchants against ending
the voyage at Halifax. They urged the great commercial advantage
of having the ships run westward to Boston after stopping at Halifax,
and so powerful were these arguments that the first Cunard liners
came steaming into Massachusetts bay.