Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

25,059 Full-Text Articles 21,494 Authors 15,310,214 Downloads 242 Institutions

All Articles in Business

Faceted Search

25,059 full-text articles. Page 1 of 580.

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson 2015 Northern Michigan University

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson

Madison Ngafeeson

No abstract provided.


Family Control, Socioemotional Wealth And Earnings Management In Publicly Traded Firms, Geoffrey P. Martin Dr, Joanna Campbell Dr, Luis R. Gomez-Mejia Prof 2015 Melbourne Business School

Family Control, Socioemotional Wealth And Earnings Management In Publicly Traded Firms, Geoffrey P. Martin Dr, Joanna Campbell Dr, Luis R. Gomez-Mejia Prof

Geoffrey P Martin

We examine the unique nature of agency problems within publicly traded family firms by investigating the earnings management decision of dominant family owners relative to non-family. To do so, we draw upon literature demonstrating that family owners are loss averse with respect to the family’s socioemotional wealth (SEW), or the affective endowment derived from firm ownership and control. Our theory and findings suggest that potential reputational consequences of earnings management lead family principals to engage in less of this practice relative to non-family firms, and that founder family firms are less likely than non-founder family firms to use earnings ...


Alianzas Estratégicas, Guillermo Arosemena 2015

Alianzas Estratégicas, Guillermo Arosemena

Guillermo Arosemena

No abstract provided.


Transforming The Legal Studies Classroom: Clickers And Engagement, Susan Park J.D., Denise Farag J.D. 2015 Boise State University

Transforming The Legal Studies Classroom: Clickers And Engagement, Susan Park J.D., Denise Farag J.D.

Susan Park

No abstract provided.


A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg 2015 University of Texas at Dallas

A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg

Jan Kallberg

The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...


A Business Trust For Partnerships? Early Conceptions Of Company-Related Assets In Legal Literature, And Antwerp Forensic And Commercial Practice (Later Sixteenth-Early Seventeenth Century), Dave De ruysscher 2015 Vrije Universiteit Brussel

A Business Trust For Partnerships? Early Conceptions Of Company-Related Assets In Legal Literature, And Antwerp Forensic And Commercial Practice (Later Sixteenth-Early Seventeenth Century), Dave De Ruysscher

Dave De ruysscher

The Antwerp example demonstrates that in the early modern period entity shielding for partnerships existed in some form by law, and that it was devised in doctrine and the practice of courts rather than in legislation. The affectation of assets for the business venture that did not entail limited liability nonetheless allowed for some separation of personal from partnership-related assets. This innovation, which was devised in doctrine in the early 1600s, was important in a mercantile context in which partnerships with open goals and with active partners or directors engaged in diverse business activities. Yet, according to an older rule ...


Racial And Ethnic Differences In Tipping: The Role Of Perceived Descriptive And Injunctive Tipping Norms, Michael Lynn, Zachary W. Brewster 2015 Cornell University

Racial And Ethnic Differences In Tipping: The Role Of Perceived Descriptive And Injunctive Tipping Norms, Michael Lynn, Zachary W. Brewster

Articles and Chapters

In U.S. restaurants, racial and ethnic minorities often tip less than whites. These differences in tipping create numerous problems ranging from discriminatory service to restaurant executives’ reluctance to open restaurants in minority communities. Thus, racial differences in tipping need to be sizably reduced, which requires an understanding of their underlying causes. In this paper, we ask a racially and ethnically diverse sample of respondents in an online survey about how much they would tip in a hypothetical dining scenario, how much their best friend would tip, and how much the average person in their area would tip, as well ...


Service Gratuities And Tipping: A Motivational Framework, Michael Lynn 2015 Cornell University

Service Gratuities And Tipping: A Motivational Framework, Michael Lynn

Articles and Chapters

In many countries around the world, consumers leave voluntary payments of money (called “tips”) to service workers who have served them. Since tips are an expense that consumers are free to avoid, tipping is an anomalous behavior that many economists regard as “irrational” or “mysterious.” In this paper, I present a motivational framework that offers plausible explanations for: (1) why people tip, (2) how tipping norms came into existence and evolve over time, (3) why tipping varies across individuals and situations, (4) why tipping is more common for some occupations than others, and (5) why tipping varies across nations. Many ...


How Big Data Can Create Big Impact: Findings From A Systematic Review And A Longitudinal Case Study, Samuel Wamba, Shahriar Akter 2015 Neoma Business School

How Big Data Can Create Big Impact: Findings From A Systematic Review And A Longitudinal Case Study, Samuel Wamba, Shahriar Akter

Shahriar Akter

Big data has the potential to revolutionize the art of management. Despite the high operational and strategic impacts, there is a paucity of empirical research to assess the potential of big data. Drawing on a systematic review and case study findings, this paper presents an interpretive framework that analyses the definitional perspectives and the applications of big data. The paper also provides a general taxonomy that helps broaden the understanding of big data and its role in capturing business value. The synthesis of the diverse concepts within the literature on big data and operations management provides deeper insights into achieving ...


Wahana303.Com Agen Sbobet Ibcbet 368bet Casino 338a Bola Tangkas Togel Singapura Hongkong Online Indonesia Terpercaya, amos pandapotan naninggola ninggolam 2015 Harvard University

Wahana303.Com Agen Sbobet Ibcbet 368bet Casino 338a Bola Tangkas Togel Singapura Hongkong Online Indonesia Terpercaya, Amos Pandapotan Naninggola Ninggolam

amos pandapotan naninggola ninggolam

No abstract provided.


Controls And Constraints, Steven S. Taylor 2015 Worcester Polytechnic Institute

Controls And Constraints, Steven S. Taylor

Organizational Aesthetics

We teach managers to seek control and eliminate constraints. In contrast artists often create constraints and lose control. That may be something of an exaggeration, but it also has a ring of truth. As a manager I saw constraints as something generally negative and control as something generally positive – lack of control was a sin when pointed out by auditors. In contrast as an artist I often intentionally construct complex constraints for my work and scoff at control, saying something like, “control is an illusion”. As a scholar I wonder about the implications of this difference.


Oxford Handbook: Institutional Investors In Corporate Governance, Edward B. Rock 2015 University of Pennsylvania Law School

Oxford Handbook: Institutional Investors In Corporate Governance, Edward B. Rock

Faculty Scholarship

This chapter of the Oxford Handbook on Corporate Law and Governance examines the role of institutional investors in corporate governance and the role of regulation in encouraging institutional investors to become active stewards. I approach these topics through asking what lessons we can draw from the U.S. experience for the E.U.’s 2014 proposed amendments to the Shareholder Rights Directive.

I begin by defining the institutional investor category, and summarizing the growth of institutional investors’ equity holdings over time. I then briefly survey how institutional investors themselves are governed and how they organize share voting. This leads me ...


Consumer Perception Of Tactile Packaging: A Research Study On Preferences Of Soft Touch And Hi Rise Coatings In Cosmetic Packaging, Malcolm G. Keif Ph.D., Colleen Twomey, Andrea Stoneman 2015 California Polytechnic State University - San Luis Obispo

Consumer Perception Of Tactile Packaging: A Research Study On Preferences Of Soft Touch And Hi Rise Coatings In Cosmetic Packaging, Malcolm G. Keif Ph.D., Colleen Twomey, Andrea Stoneman

Journal of Applied Packaging Research

A choice-based conjoint study was conducted sampling 400 individuals to determine their preference for Soft Touch and raised tactile coatings, which are sometimes called Hi Rise or profile coatings. Soft Touch coatings have a velvety, warm feel to them, and Hi Rise coatings simulate embossing with a glossy appearance to them. Both are considered tactile coatings, engaging the sense of touch.

Demographic profile data, level of agreement about statements related to cosmetic packaging and packaging choice set selections were collected. The conjoint sets contained three attributes: design color, tactile coatings, and price.

Design choice was split. Approximately half of the ...


Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat McInturff 2015 Institut National de Recherche Pedagogique

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff

Communications of the IIMA

The rapid advances in information and communication technologies coupled with the dominant overarching Neo-liberal/capitalist ideological underpinnings of the dominant Western powers have generated a momentum towards a homogeneous global village. The impact of which has been to expand World conflict and propelled many nations towards losing their national identity and traditions. This article discusses the various impacts from IT globalization and calls for a new global communication awareness.


A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang 2015 Hunan University

A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang

Communications of the IIMA

After reviewing the literature, the concept of Business Model or E-Business Models are discussed in Ms paper. Firms keep interacting with each other and build all kinds of relationships among them. Based on the theory of business networks, we put forward a networking-based view of business model analysis frame. When we make decisions to choose one or other business models, first, the source of value should be found. Second, business network models, which show the procedure of value creation and distribution, should be analyzed. Third, we choose the feasible network among networks we analyzed. Finally, the firms' strategy to ensure ...


Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot 2015 University of Northern Colorado

Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot

Communications of the IIMA

University-based education is facing direct competition from for-profit corporations over the lucrative lifetime-learning market. This is occurring primarily because universities have not adapted to advances in technology and changes in the educational needs of students. To correct this problem, a new curriculum solution is proposed. This solution is loosely based upon the model curricula generated by professional organizations. The solution utilizes personal learning plans tied to a global learning schema. The end result is a very flexible curriculum delivery model that effectively utilizes modern technology and is potentially superior to any offered by commercial education providers.


Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta 2015 Galveston College

Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta

Communications of the IIMA

With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. The main problem related to the retrieval of information from the World Wide Web is the enormous number of unstructured documents and resources, i.e., the difficulty of locating and tracking appropriate sources. In this article, a survey of the research in the area of web mining and suggest web mining categories and techniques. Furthermore, a presentation ...


Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette 2015 Georgia College & State University

Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette

Communications of the IIMA

When individuals and businesses conduct transactions electronically over a network using mobile devices, they have participated in mobile e-commerce. The advantages and disadvantages of mobile e-commerce are presented in this paper. This is followed by a discussion of who is using mobile e-commerce and why they are using it. Information is also presented on how to be successful with mobile e-commerce.


The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak 2015 Canisius College

The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak

Communications of the IIMA

Medical information has a special status among the various items of personal information. The introduction of information technology (IT) has changed the handling of medical information in ways that are both promising for improving health care as well as threatening to the individual patient's medical information privacy. The challenge to business practitioners is to manage medical information intelligently and to avoid the negative consequences of mismanaging this information, which may include customer backlash in the forms of boycotts, lawsuits, and loss of company reputation. This challenge is particularly important in the context of the U.S. National Health Information ...


Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir 2015 Prairie View A&M University

Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir

Communications of the IIMA

This paper discusses the performance of traffic flow over Local Area Networks (LAN) utilizing buffers to avoid any irrelevant traffic that clusters the network using sniffer pro. The study applies buffer technology to filter out unnecessary information so the system captures only required information packets. Buffers that capture the protocols are identified. These are. Address Resolution Protocols (ARP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). The study identified to the user/analyzer of an Ethernet technology, how to isolate a cluster network problem, monitor network performance, and offer tips on how to correctly ...


Digital Commons powered by bepress