Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

23,528 Full-Text Articles 19,825 Authors 14,389,713 Downloads 238 Institutions
Active Readership Map This map shows download activity from this Commons.
Waiting for the next download...
Digital Commons Network
Real-time Readership

0
Downloads since
.

All Articles in Business

Faceted Search

23,528 full-text articles. Page 1 of 545.

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson 2015 Northern Michigan University

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson

Madison Ngafeeson

No abstract provided.


Family Control, Socioemotional Wealth And Earnings Management In Publicly Traded Firms, Geoffrey P. Martin Dr, Joanna Campbell Dr, Luis R. Gomez-Mejia Prof 2015 Melbourne Business School

Family Control, Socioemotional Wealth And Earnings Management In Publicly Traded Firms, Geoffrey P. Martin Dr, Joanna Campbell Dr, Luis R. Gomez-Mejia Prof

Geoffrey P Martin

We examine the unique nature of agency problems within publicly traded family firms by investigating the earnings management decision of dominant family owners relative to non-family. To do so, we draw upon literature demonstrating that family owners are loss averse with respect to the family’s socioemotional wealth (SEW), or the affective endowment derived from firm ownership and control. Our theory and findings suggest that potential reputational consequences of earnings management lead family principals to engage in less of this practice relative to non-family firms, and that founder family firms are less likely than non-founder family firms to use earnings ...


Alianzas Estratégicas, Guillermo Arosemena 2015 SelectedWorks

Alianzas Estratégicas, Guillermo Arosemena

Guillermo Arosemena

No abstract provided.


Transforming The Legal Studies Classroom: Clickers And Engagement, Susan Park J.D., Denise Farag J.D. 2015 Boise State University

Transforming The Legal Studies Classroom: Clickers And Engagement, Susan Park J.D., Denise Farag J.D.

Susan Park

No abstract provided.


A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg 2015 SelectedWorks

A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg

Jan Kallberg

The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...


A Business Trust For Partnerships? Early Conceptions Of Company-Related Assets In Legal Literature, And Antwerp Forensic And Commercial Practice (Later Sixteenth-Early Seventeenth Century), Dave De ruysscher 2015 SelectedWorks

A Business Trust For Partnerships? Early Conceptions Of Company-Related Assets In Legal Literature, And Antwerp Forensic And Commercial Practice (Later Sixteenth-Early Seventeenth Century), Dave De Ruysscher

Dave De ruysscher

The Antwerp example demonstrates that in the early modern period entity shielding for partnerships existed in some form by law, and that it was devised in doctrine and the practice of courts rather than in legislation. The affectation of assets for the business venture that did not entail limited liability nonetheless allowed for some separation of personal from partnership-related assets. This innovation, which was devised in doctrine in the early 1600s, was important in a mercantile context in which partnerships with open goals and with active partners or directors engaged in diverse business activities. Yet, according to an older rule ...


Q-Methodology, Chris Phelan 2015 SelectedWorks

Q-Methodology, Chris Phelan

Dr Chris Phelan

No abstract provided.


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson 2015 SelectedWorks

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


Work Made For Hire – Analyzing The Multifactor Balancing Test, Ryan G. Vacca 2015 University of Akron

Work Made For Hire – Analyzing The Multifactor Balancing Test, Ryan G. Vacca

Akron Law Publications

Authorship, and hence, initial ownership of copyrighted works is oftentimes controlled by the 1976 Copyright Act’s work made for hire doctrine. This doctrine states that works created by employees within the scope of their employment result in the employer owning the copyright. One key determination in this analysis is whether the hired party is an employee or independent contractor. In 1989, the U.S. Supreme Court, in CCNV v. Reid, answered the question of how employees are distinguished from independent contractors by setting forth a list of factors courts should consider. Unfortunately, the Supreme Court did not give further ...


Work Made For Hire – Analyzing The Multifactor Balancing Test, Ryan G. Vacca 2015 University of Akron

Work Made For Hire – Analyzing The Multifactor Balancing Test, Ryan G. Vacca

Ryan G. Vacca

Authorship, and hence, initial ownership of copyrighted works is oftentimes controlled by the 1976 Copyright Act’s work made for hire doctrine. This doctrine states that works created by employees within the scope of their employment result in the employer owning the copyright. One key determination in this analysis is whether the hired party is an employee or independent contractor. In 1989, the U.S. Supreme Court, in CCNV v. Reid, answered the question of how employees are distinguished from independent contractors by setting forth a list of factors courts should consider. Unfortunately, the Supreme Court did not give further ...


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim 2015 SelectedWorks

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations ...


The Role Of Coordination Bias In Platform Competition, Hanna Halaburda, Yaron Yehezkel 2015 SelectedWorks

The Role Of Coordination Bias In Platform Competition, Hanna Halaburda, Yaron Yehezkel

Hanna Halaburda

This paper considers platform competition in a two-sided market that includes buyers and sellers. One of the platforms benefits from a favorable coordination bias in the market, in that for this platform it is less costly than for the other platform to convince customers that the two sides will coordinate on joining it. We find that the degree of the coordination bias affects the platform's decision regarding the business model (i.e., whether to subsidize buyers or sellers), the access fees and the size of the platform. A slight increase in the coordination bias may induce the advantaged platform ...


Aquifer Analysis: Told And Untold Stories In Warwick Churches, Vaughan S. Roberts 2014 SelectedWorks

Aquifer Analysis: Told And Untold Stories In Warwick Churches, Vaughan S. Roberts

Vaughan S Roberts

This presentation to a seminar on organizational storytelling at Lincoln Business School in 2013 explores how told and untold stories were filtered during a narrative review by a team of churches in Warwick, UK. The full paper was distributed beforehand to participants and a revised version appears in Untold Stories in Organizations – further details can be found here: http://www.routledge.com/books/details/9781138790018/


Managing Value In Supply Chains: Case Studies On The Sourcing Hub Concept, Anupam Agrawal, Arnoud De Meyer, Luk Van Wassenhove 2014 Singapore Management University

Managing Value In Supply Chains: Case Studies On The Sourcing Hub Concept, Anupam Agrawal, Arnoud De Meyer, Luk Van Wassenhove

Research Collection Lee Kong Chian School Of Business

A firm’s raw material sourcing knowledge can be a strategic resource. This article explores how firms can capture and use this knowledge. It examines the sourcing experiences of four firms in four different countries in the automotive industry and identifies the raw material sourcing knowledge-related parameters. Synthesizing the findings from these case studies, it proposes the concept of the sourcing hub—a collaborative center involving the firm, its suppliers, and raw material suppliers—which can effectively capture and deploy the raw material sourcing knowledge for managing value in upstream sourcing.


From Independence To Regulation: A Look Into Major Accounting Scandals And The Changes Implemented By The Sarbanes-Oxley Act, Rachel A. Elkins 2014 University of Tennessee, Knoxville

From Independence To Regulation: A Look Into Major Accounting Scandals And The Changes Implemented By The Sarbanes-Oxley Act, Rachel A. Elkins

University of Tennessee Honors Thesis Projects

No abstract provided.


Attracting Fdi And Benefiting From It: Challenges For The Least Developed Countries, Karl P. Sauvant Dr. 2014 SelectedWorks

Attracting Fdi And Benefiting From It: Challenges For The Least Developed Countries, Karl P. Sauvant Dr.

Karl P. Sauvant Dr.

No abstract provided.


A Closer Look At The Impact Of Quantitative Easing On The Capital Markets: Garch Analysis Of The Exchange Traded Funds Market, Nicholas R. Duafala 2014 Illinois Wesleyan University

A Closer Look At The Impact Of Quantitative Easing On The Capital Markets: Garch Analysis Of The Exchange Traded Funds Market, Nicholas R. Duafala

Undergraduate Economic Review

This paper analyzes the effects of quantitative easing (QE) on the capital markets by modeling exchange traded funds (ETFs) returns using a generalized autoregressive conditional heteroskedasticity (GARCH) methodology. The results show that the 10-Year Treasury yields are significant in the returns of some sectors of the economy more so than others, and the Federal Funds Futures trading volume is significant in all ETFs return volatility. The implications of these results not only provide information about the reaction of the ETF market and QE, but also provide insight for developing investment strategies.


Business & Environment Vs. Corporate Social Responsibilities, Ayo Onabajo 2014 SelectedWorks

Business & Environment Vs. Corporate Social Responsibilities, Ayo Onabajo

Ayo Onabajo

This report is based on my view of key requirements for implementing successful strategic sustainability of Environmental Management System, as a CSR in an organisation. The highlight of the report will include critical evaluation of implementing strategic sustainability of EMS in an organisational perspective to correspond with Nestlé


Should We Love Or Hate Big Data? The Good, The Bad, And The Ugly, Dennis Crossen M.Sc., MBA, Karti Puranam PhD, Madjid Tavana PhD 2014 La Salle University

Should We Love Or Hate Big Data? The Good, The Bad, And The Ugly, Dennis Crossen M.Sc., Mba, Karti Puranam Phd, Madjid Tavana Phd

Explorer Café

No abstract provided.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer 2014 SelectedWorks

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate wireless ...


Digital Commons powered by bepress