Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Accounting (1)
- Bloom's Taxonomy (1)
- Business Intelligence (1)
- Competition (1)
- Computer Security (1)
-
- Control (1)
- Crime (1)
- ELearning (1)
- Health Belief Model (1)
- Information Technology (1)
- Information systems (1)
- Instructional Video (1)
- Intern Experience (1)
- Internship (1)
- Marketing strategies (1)
- Marriage Education (1)
- Optimization (1)
- Placement (1)
- Professional education (1)
- Public accounting (1)
- PwC process (1)
- Shiitake mushroom industry (1)
- Society (1)
- Team-Based Learning (1)
- Technology Adoption (1)
- Utah (1)
- Virtually Isolated Learning (1)
Articles 1 - 7 of 7
Full-Text Articles in Entire DC Network
Optimization Of Crime Control Resources In A Society, Steven S. Thompson
Optimization Of Crime Control Resources In A Society, Steven S. Thompson
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
This paper looks at the economics of crime control through the Phillips-Votey Societal Cost Function model and mathematically proves that there is a socially optimal point at which society should be devoting resources towards the prevention of crime. This allows the society to minimize the social cost of crime given a theoretical cost constraint. This paper take the model further by conducting comparative analysis to determine the effect that changes in the functional form of crime generation, and crime prevention will have on society as represented in the model. This paper also looks at the counter intuitive effect that growth …
Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley
Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley
Undergraduate Honors Capstone Projects
Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …
How To Navigate Public Accounting Recruitment, Jill Heather Aoki
How To Navigate Public Accounting Recruitment, Jill Heather Aoki
Undergraduate Honors Capstone Projects
For many accounting graduates, public accounting is an excellent place to start a career. However, recruitment at accounting firms is highly competitive. The majority of personnel are hired through internships, and competition for these positions is fierce. The process usually spans over multiple years and involves participating in leadership seminars, attending social events, and much more in addition to interviewing. Successful placement requires not only exceptional academic achievements but also strong relationships with personnel at the firm. One primary differentiator among the numerous public accounting firms is their people and culture. Other factors include local clients and specializations. Thus, candidates …
The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay
The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The purpose of this study was to test the effectiveness of the readiness assurance process of team-based learning (TBL) in virtually isolated settings. Many Internet sites offer courses for adults to use on their own without access to mentors or other learners. However, educational theory suggests that people learn better with others than by themselves. The focus of this investigation was whether the inclusion of the readiness assurance process would increase participants’ levels of learning based on Bloom’s revised taxonomy within the limits of virtual isolation.
In this study an experimental pretest-posttest design was employed. Using a 2- day mini-course …
Personal Intern Experience Assessment, Jacob Reed
Personal Intern Experience Assessment, Jacob Reed
Undergraduate Honors Capstone Projects
I am a senior, finishing up the last accounting class for my undergraduate degree in accounting. I recently completed an internship with PwC in the McLean, Virginia office. At PwC, I was an assurance intern primarily responsible for assisting my engagement teams by performing tests around financial statement line items such as 'cash.' I learned quite a bit about the PWC process for auditing these items because I performed these same procedures on six different clients.
My role as an intern was to perform uniform tasks that needed to be done on each engagement, and when I was done I …
An Investigation Of Potential Marketing Strategies For Entry Into The Shiitake Mushroom Industry In Utah, Imran Khan
An Investigation Of Potential Marketing Strategies For Entry Into The Shiitake Mushroom Industry In Utah, Imran Khan
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
This study provides an analysis of the mushroom industry in the Utah with a focus on identifying opportunities for entry into the specialty mushroom market. Determining the strategic position of the mushroom industry requires the use of local information. In this study, a local survey of consumers in Northern Utah was used to generate specific information about consumer preferences and attitudes about mushrooms and how a new entrant might be positioned to address consumers’ wants and needs related to mushrooms, and specifically specialty mushrooms. Regression analysis and trend analysis were also performed using data obtained either from the survey or …
The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar
The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.
The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …