Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

76,266 Full-Text Articles 56,465 Authors 37,941,451 Downloads 390 Institutions

All Articles in Business

Faceted Search

76,266 full-text articles. Page 2 of 2192.

Evaluating Event Effectiveness Across Alternate Platforms, Kristin Malek, Sarah Tanford, Seyhmus Baloglu 2018 Kansas State University

Evaluating Event Effectiveness Across Alternate Platforms, Kristin Malek, Sarah Tanford, Seyhmus Baloglu

Hospitality Faculty Publications

Organizations are rapidly adopting new technologies and have justified their return on investment by examining new attendee rates, “click throughs” on links, and company-specific metrics. Despite advances in technology and growing consumer dependence on electronics, the meeting and events industry has been slow to adopt IT advances for fear of cannibalization. The purpose of this study was to gather foundational knowledge of how various event platforms, such as face to face and online, can affect overall event effectiveness. Variables examined include attendee satisfaction, loyalty, and content retention. This research used a multimethod approach in which one experimental study and one ...


The Managed Body: Developing Girls & Menstrual Health In The Global South, 2018 Selected Works

The Managed Body: Developing Girls & Menstrual Health In The Global South

Chris Bobel

The Managed Body productively complicates ‘menstrual hygiene management’ (MHM)--a growing social movement to support menstruating girls in the Global South. Bobel offers an invested critique of the complicated discourses of MHM including its conceptual and practical links with the Water, Sanitation and Hygiene (WASH) development sector, human rights and ‘the girling of development.’ Drawing on analysis of in-depth interviews, participant observations and the digital materials of NGOs and social businesses, Bobel shows how MHM frames problems and solutions to capture attention and direct resources to this highly-tabooed topic. She asserts that MHM organizations often inadvertently rely upon weak evidence ...


Therma Trim: Increases The Energy Levels Into Your Body, Herbal Health Review 2018 University of California, San Francisco

Therma Trim: Increases The Energy Levels Into Your Body, Herbal Health Review

Herbal Health Review

Therma Trim Reviews: You better believe that! Slim Body is very good for the soul.We're in good company. It was rather nonconforming. Slim Body is a means to an end. A number of today's buds received their first Therma Trim when they were young. I also sent them a memo as that concerns that private forum. I don't comprehend your circumstances though although, like my Grandpop often quotes in relation to Weight Loss, "You should make like a tree and get out of here." This is a wake-up call to me. All you need to do ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley 2018 Kennesaw State University

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady 2018 University of North Georgia

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy 2018 Nova Southeastern University

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black 2018 University of South Alabama

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley 2018 Kennesaw State University

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau 2018 Norfolk State University

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur sandhu, Kweku Muata A. Osei-Bryson 2018 Virginia Commonwealth University

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best ...


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards 2018 Jacksonville State University

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address ...


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros 2018 Oklahoma State University - Main Campus

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased ...


Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh 2018 Babson College

Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh

KSU Proceedings on Cybersecurity Education, Research and Practice

Using cybersecurity risk assessment techniques, organizations can gain a holistic and prioritized view of information security objectives. However, with current methods, cybersecurity risk assessments are cost-prohibitive for small and medium sized businesses (SMB). These organizations experience increased vulnerability to adverse cyber events, are stuck in a reactive cycle and scramble to meet compliance goals.

The ongoing research seeks to create a risk assessment tool using the NIST Cybersecurity Framework in conjunction with complementary innovations to reduce the cost of a cyber risk assessment exercise for SMBs and enable the effective communication of security controls to various stakeholders in small and ...


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne 2018 NC A&T State Unversity

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two ...


Car Hacking: Can It Be That Simple?, Bryson Payne 2018 University of North Georgia

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy 2018 Nova Southeastern University

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr. 2018 Oklahoma State University - Main Campus

Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr.

KSU Proceedings on Cybersecurity Education, Research and Practice

Increasing the number of security breaches caused by humans, scholars are interested in exploring contributed factors of information security threats. There are several studies regarding security violations by malicious insiders and intentional behaviors; however, studies which focus on important factors and antecedents of human’s unintentional misbehaviors are rare. To this end, we aim to investigate human traits which lead to unintentional information security misbehaviors. Particularly, we study individual’s risk-taking behavior by applying Dual System Theory (DST). We have developed a theoretical model to find how individuals’ risk-taking behavior relates to online information security misbehaviors. Our hypothesized model consists ...


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan 2018 North Carolina A&T State University

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is ...


Black Panther: Thrills, Postcolonial Discourse, And Blacktopia, Giana M. Eckhardt 2018 Royal Holloway University of London

Black Panther: Thrills, Postcolonial Discourse, And Blacktopia, Giana M. Eckhardt

Markets, Globalization & Development Review

Black Panther challenges traditional depictions of African nations in film by showcasing the fictional African country of Wakanda as a global technological leader, its citizens as being comfortable in global settings, and by having Wakanda deliver social aid to the US, reversing the typical global flow of assistance. Wakanda is depicted as a Blacktopia, where societies thrive beyond the reach of white supremacy as they have not been subject to colonization.


Duplicity In Alternative Marketing Communications, Cristina Nistor, Taylan Yalcin, Ekin Pehlivan 2018 Chapman University

Duplicity In Alternative Marketing Communications, Cristina Nistor, Taylan Yalcin, Ekin Pehlivan

Markets, Globalization & Development Review

In the past couple of decades, following the advancements in communication technologies, alternative marketing communications such as consumer generated content, influencer marketing and native advertising, have emerged as a viable and gainful tactic. These alternative marketing communications blur the boundaries between the roles of consumer and marketer. The possibility of duplicity and deception in marketing relationships is fueled by the ambiguity of these roles and the lack of clarity in persuasion knowledge when alternative marketing communications are utilized. In this paper, we illustrate the various types of duplicity in marketing relationships that use alternative marketing communications. We adopt a conceptual ...


Digital Commons powered by bepress