Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

145,261 Full-Text Articles 103,632 Authors 85,197,975 Downloads 459 Institutions

All Articles in Business

Faceted Search

145,261 full-text articles. Page 2190 of 4277.

2017 Program, Office of Academic Affairs 2017 Eastern Illinois University

2017 Program, Office Of Academic Affairs

Programs

Scholarship, creativity, innovation, and the many forms of collaborative engagement that shape faculty life and student learning are central to the mission of Eastern Illinois University. For that reason, our faculty, department chairs, college deans, the Provost, and the entire campus community celebrate the achievements and outstanding contributions of our colleagues and students to their disciplines and professions every year. And, as the following pages illustrate, faculty engaged in continuing scholarly and creative activities that have provided outstanding mentoring experiences for our undergraduate and graduate students.

In addition to recognizing faculty performances, shows, publications, grants and other professional efforts, the …


Facilities Management: How Public Leadership Is Responding To Crisis, Rebecca Jane Smith 2017 University of South Florida

Facilities Management: How Public Leadership Is Responding To Crisis, Rebecca Jane Smith

USF Tampa Graduate Theses and Dissertations

This research presents the results of a qualitative and quantitative investigation to understand the challenges of public sector facilities management and maintenance to include the negative impact of deferred maintenance, it’s history, the current industry practices and the potential to reverse the negative impact of the current trend.

History has been known to speak loudly, and with accuracy relative to the expansion of public facilities and the challenge to maintain them. The challenge to keep pace with the growing population and the ever-changing requirements for contemporary designs are felt in every sector of our public facilities. Regardless, we, the public …


2017-10-25 President's Message, Morehead State University. Faculty Senate. 2017 Morehead State University

2017-10-25 President's Message, Morehead State University. Faculty Senate.

Faculty Senate Records

Message delivered from the President's Office to Faculty, Staff and Students from October 25, 2017.


Kinetic Problem Solving, Charles Arant 2017 University of South Florida

Kinetic Problem Solving, Charles Arant

USF Tampa Graduate Theses and Dissertations

Government leaders stand to benefit from improved program management capabilities within their organizations. Often, they are faced with crisis situations that require a rapid-fire, precise, effective problem solving process. Some of these programs are more severe or complex than others. With time and certainty of the solution as constraints, efficient program management supporting the Defense Acquisition Life Cycle remains an enigma for organizations at best and a hazard at worst.

Program management dealing with crisis problem solving, which is characterized by critical events and high cost, is a real-time process where requirements are identified and resolved to achieve a desired …


Protecting The Viability Of The Small Donor In Modern Elections, Ben Miller 2017 Fried Frank, Harris, Shriver & Jacobson LLP

Protecting The Viability Of The Small Donor In Modern Elections, Ben Miller

Arkansas Law Review

Campaign finance reform stands as one of the most important issues in today’s modern elections. From national to municipal contests, the influx of large donations places wealthy individuals—and interests—at odds with the average voter. Over the years, volumes of academic and legislative reforms have been proposed that encompass a wide range of electoral subject matter. From Citizens United to Federal Elections Commission (FEC) control mechanisms, solutions on how to change our campaign finance regulatory regime cover a large and diverse area of law and policy. However, the central theme throughout these reforms is maximizing transparency and curbing the undue influence …


Deal Maker: Robyn Glaser '89 Makes It Happen For The Kraft Group And New England Patriots, Gerry Boyle 2017 Colby College

Deal Maker: Robyn Glaser '89 Makes It Happen For The Kraft Group And New England Patriots, Gerry Boyle

Colby Magazine

"If there are any impediments to my success, I really don't notice because I don't care. Im just going to blaze on and do it." - Robyn Glaser '89


Snap, Crackle, Crunch: For This Team Of Food Visionaries, Insects Are The Key To Feeding The World, Susan Abram 2017 Colby College

Snap, Crackle, Crunch: For This Team Of Food Visionaries, Insects Are The Key To Feeding The World, Susan Abram

Colby Magazine

For most people, a cricket's chirp is the song of summer. But for a multidisciplinary team of Colby alumni, the uninhibited chorus that comes from the insects marks a leap towards the future of sustainable food systems.


Emotions Involved In Shopping At The Airport, Alexis D. Tymkiw 2017 University of Southern Mississippi

Emotions Involved In Shopping At The Airport, Alexis D. Tymkiw

The Catalyst

This paper examines the emotional motivations that drive consumers to shop at airport retailers. Airport retailing is a rapidly growing segment as airports continue to expand retail areas and the number of passengers increase each year. With larger retail areas, airports are beginning to resemble shopping areas. However, with higher prices and consumers experiencing time and space constraints, the airport is a very unique shopping environment. This paper explored two unique emotional motivations for shopping at airports: (1) to escape the stress of travel and (2) to eliminate boredom. Analysis of the in-depth interviews led to the development of four …


A Mixed-Method Multiple Case Study Of Three Business Models For Local Healthy Food Delivery Systems In Underprivileged Urban Areas, Gretchen Elizabeth Krivak, Garth B. Woodruff, S. Forrest, Hannah Mbungu, Kechler Orcel, Soraya Fish, Sherine R. Brown-Fraser 2017 Andrews University

A Mixed-Method Multiple Case Study Of Three Business Models For Local Healthy Food Delivery Systems In Underprivileged Urban Areas, Gretchen Elizabeth Krivak, Garth B. Woodruff, S. Forrest, Hannah Mbungu, Kechler Orcel, Soraya Fish, Sherine R. Brown-Fraser

Faculty Publications

Define a USDA food desert Analyze the three business models for benefits and deficiencies Identify methods for starting a sustainable mobile farmers market program. Over 40% of Berrien County Michigan land use is agricultural. Many products are fruits and vegetables. Yet, the county has six identified USDA defined Food Deserts. Past research, based on a mobile farmers market, confirmed local trends and deficits. The purpose for this research is to define a sustainable business model that delivers healthy local food options to USDA Food Deserts combating food inequity. A mixed method multiple case study was created to test three business …


Determinants Of Tipping Rates: New Findings And Extensions, Christopher Carl Olson 2017 University of South Florida

Determinants Of Tipping Rates: New Findings And Extensions, Christopher Carl Olson

USF Tampa Graduate Theses and Dissertations

There is a movement underway to eliminate the practice of tipping restaurant servers that is gaining momentum (Goldberger, 2015). In lieu of gratuities, restaurants are simply raising menu prices or assessing a service charge and paying servers a fixed hourly wage (Kummer, 2016). Before restaurateurs can adopt such a strategy, they need to thoroughly understand the factors that affect tipping behavior in order to develop meaningful fixed wage rates that do not diminish service levels or employee morale. The first step in this process is a better understanding of the determinants of tipping rates.

The existing research has identified many …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder 2017 College of Engineering and Computing, Nova Southeastern University

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper 2017 North Carolina A & T State University

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz 2017 University of North Georgia

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder 2017 Kennesaw State University

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins 2017 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang 2017 University of Tennessee at Chattanooga

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


2017 – Draft Summaries Of Land Patent Acres In The Salinas Valley Groundwater Basin, 2017 California State University, Monterey Bay

2017 – Draft Summaries Of Land Patent Acres In The Salinas Valley Groundwater Basin

Summaries of Data Relating to the Basins

Two tables summarizing the Bureau of Land Management records relating to land patents issued in the Salinas Valley Groundwater Basin based on acres: 1) Summary of Land Patent Acres by Patentee and County, and 2) Summary of Land Patent Acres by Patentee in the Bulletin 118 Salinas Valley Groundwater Basin.


Comparative Content Analysis Of Professional, Semi-Professional, And User-Generated Restaurant Reviews, Anish Parikh, Carl Behnke, Barbera Almanza, Doug Nelson, Mihaela Vorvoreanu 2017 Montclair State University

Comparative Content Analysis Of Professional, Semi-Professional, And User-Generated Restaurant Reviews, Anish Parikh, Carl Behnke, Barbera Almanza, Doug Nelson, Mihaela Vorvoreanu

Department of Hospitality and Tourism Faculty Scholarship and Creative Works

This study examines the content of professional, semi-professional, and user-generated reviews. By comparing these three review types, this study was able to identify characteristics and factors unique to each type of review. Although, the amount of discourse in a particular factor varied, food is clearly the most important review factor regardless of review type. Semi-professional reviews emphasize atmosphere and décor more than both newspaper and user-generated reviews, while price factors were more prevalent in semi-professional reviews and user-generated reviews than in newspaper reviews. Understanding the varied structures of review types provides guidance for both restaurateurs and review users.


Digital Commons powered by bepress