Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Business

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 49

Full-Text Articles in Entire DC Network

Outsourcing: More Harm Than Good, Ly Luu Pham Dec 2011

Outsourcing: More Harm Than Good, Ly Luu Pham

Honors Theses

Outsourcing is a highly effective strategy, widely used in various types of business to gain a competitive edge. The tremendous growth of outsourcing first started in the manufacturing and information technology industries. It has also spread into the accounting industry as well. However, in accounting the major problems and benefits caused by outsourcing are different from those identified in the manufacturing and IT industries. This leads to the question of whether or not outsourcing in accounting would create more advantages than disadvantages. This paper analyzes the question through four steps: (1) how accounting outsourcing is done, (2) which accounting tasks …


Expanding Your Accounting Classroom With Digital Video Technology, Mark Holtzblatt, Norbert Tschakert Dec 2011

Expanding Your Accounting Classroom With Digital Video Technology, Mark Holtzblatt, Norbert Tschakert

Business Faculty Publications

In the past, many activities of accounting professors were restricted or confined by their classroom walls. Bringing in guest speakers, taking students on field trips and teaching students off-campus (either locally or globally) were extraordinary efforts that required significant organization. Today, numerous technological advancements in communication infrastructure, equipment and online tools greatly facilitate such initiatives. Outside experts can now visit the classroom, students can explore or collaborate in distant places and professors can extend the geographical reach of their lessons simply via the means of digital video technology. Based on our 2010 Conference on Teaching and Learning in Accounting (CTLA) …


Facebook Addiction: Factors Influencing An Individual's Addiction, Erica Sherman Dec 2011

Facebook Addiction: Factors Influencing An Individual's Addiction, Erica Sherman

Honors Thesis Program in the College of Management

Prior research has proved that an individual could be addicted to the Internet in general, but no research has been done specifically to social networking sites such as Facebook. This study investigates how factors such as personality, gender, procrastination, boredom and ones values may affect the amount of time they spend on Facebook, further concluding that they are either overly obsessive or not about the usage thereof. Further, this study tests whether those same factors influence and individuals likelihood of facing Facebook withdrawal or Facebook devotion. Prior research was conducted using scholarly articles that focused on personality types and Internet …


The Role Of Social Network Websites In Consumer-Brand Relationship, Hyejune Park Dec 2011

The Role Of Social Network Websites In Consumer-Brand Relationship, Hyejune Park

Doctoral Dissertations

This research explored the phenomenon of online social network in the context of consumer-brand relationship. The specific research objectives were: (a) to examine whether perceived benefits of a Brand’s Social Network Website (BSN) predict BSN relationship quality; (b) to investigate whether perceived benefits of BSN predict perceived relationship investment; (c) to examine if online social connection strengthens the relationship between perceived benefits of BSN and BSN relationship quality; (d) to examine if experience with BSN strengthens the relationship between perceived benefits of BSN and BSN relationship quality; (e) to investigate whether BSN relationship quality predicts brand relationship quality; (f) to …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Unify, Regionalize, Diversify: An Economic Development Agenda For Nevada, Mark Muro Nov 2011

Unify, Regionalize, Diversify: An Economic Development Agenda For Nevada, Mark Muro

Brookings Mountain West Publications

Nevada stands at a crossroads, yet it appears ready to remap its future.

Silver Staters sense that the current economic slump has not been just a temporary reversal but a challenge to the state’s traditional growth model—one that has revealed an economy over-dependent on consumption sectors, prone to booms and busts, and too little invested in innovation and economic diversification. And yet, for all that Nevadans have been early to recognize that the current slump will beget, in some places, innovation and renewal, and in other places erosion—and so requires action.

To that end, this report draws on an intense …


Comment Letters On Proposed Statement On Auditing Standards, The Auditor’S Consideration Of An Entity’S Ability To Continue As A Going Concern (Redrafted), November 11, 2011, American Institute Of Certified Public Accountants. Auditing Standards Board Nov 2011

Comment Letters On Proposed Statement On Auditing Standards, The Auditor’S Consideration Of An Entity’S Ability To Continue As A Going Concern (Redrafted), November 11, 2011, American Institute Of Certified Public Accountants. Auditing Standards Board

Exposure Drafts, Comment Letters, and Statements of Position

No abstract provided.


Inaugural Conference For Positive Marketing, Linda Purcell Nov 2011

Inaugural Conference For Positive Marketing, Linda Purcell

Conference for Positive Marketing

Inaugural Conference for Positive Marketing, November 4, 2011


Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii Oct 2011

Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii

George H Baker

Two electromagnetic phenomena have the potential to create continental-scale disasters. The first, nuclear electromagnetic pulse (EMP), results from a nuclear detonation high above the tropopause. The second, a major solar storm, or "solar tsunami" occurs naturally when an intense wave of charged particles from the sun perturbs the earth's magnetic field. Both phenomena can debilitate electrical and electronic systems necessary for the operation of infrastructure systems and services. One reason why a U.S. protection program has yet to be initiated is that policy makers continue to wrestle with the question of where to begin, given the Department of Homeland Security’s …


A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr Oct 2011

A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.


Athletes On Facebook, Kristen Vella Oct 2011

Athletes On Facebook, Kristen Vella

Sport Management Undergraduate

As technology has risen at a rapid rate in recent years, social networking has become a large part of society. Specifically Facebook has become a part of a regular routine and a daily task for many, including athletes. Privacy settings for athletes are important as many activities online are now being monitored by university personnel. This exploratory study uncovered the quantity, content and rationalization of Facebook posts with a select group of Division III athletes. Utilizing survey technology, it was discovered that athletes seem to be more cautious than expected and do take privacy settings into consideration. These findings contradict …


The Price Decline Anomaly In Christmas Season Internet Auctions Of Ps3s, Thomas Andrews, Cynthia Benzing, Matthew Fehnel Oct 2011

The Price Decline Anomaly In Christmas Season Internet Auctions Of Ps3s, Thomas Andrews, Cynthia Benzing, Matthew Fehnel

Economics & Finance Faculty Publications

No abstract provided.


Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj Sep 2011

Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj

The African Journal of Information Systems

This paper interrogates the suitability of Mobile Technologies to facilitate e-commerce in Kenyan Micro and Small Enterprises (MSEs). The study proposed a theoretical model and empirically tested it using a sample selected using proportionate stratified sampling within well-defined geographic clusters. The study revealed that, while there is massive use of mobile Internet Services (MIS), there is limited use of Mobile Money Transfer Services (MMTS) for B2B and B2C transactions as opposed to C2C and C2B e-commerce transactions. Results also indicated that utilizing MIS and MMTS, positively and significantly influenced organization’s performance through operational, transactional and interactional benefits. On the research …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


Worker Shortage, Outsourcing, And Immigration As Features Of Computer Technology Competition Between The United States And India, Melvin L. Tobias Aug 2011

Worker Shortage, Outsourcing, And Immigration As Features Of Computer Technology Competition Between The United States And India, Melvin L. Tobias

Masters Theses

In this study, we examine questions relating to the state of competition between the United States and India in the field of computer technology. We consider whether there is continual increase in the outsourcing by American firms of computer service work abroad, claims of computer worker shortage, and claims of the need for increased immigration of foreign computer workers to deal with a supposed deterioration in American technology. We conclude, first, that both U.S. and Indian computer service companies and their potential clients prefer close collaboration rather than “arms length” relationships. As a result, service companies in both nations have …


A Phenomenological Study Of Millennial Generation Cooperative Extension Educators' Development Of Core Competencies, David L. Varner Aug 2011

A Phenomenological Study Of Millennial Generation Cooperative Extension Educators' Development Of Core Competencies, David L. Varner

Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship

The purpose of this qualitative research study was to describe the experiences that contribute to the development of core competencies among Millennial Generation, county-based Extension educators in the University of Nebraska-Lincoln Extension Division. Fourteen educators were randomly purposefully selected to participate in the study. Participants were born in 1977 or later as determined by Tapscott (2009). Educators’ tenure in Cooperative Extension ranged from two months to seven years. Three themes and associated sub-themes emerged from semi-structured interviews: (a) Blindfolded and Scared—educators were confused, overwhelmed and in need of support; (b) Developing the Big Skills: A Daunting Task—focused on discovering competencies …


Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer Jul 2011

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer

Journal of Strategic Security

The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …


China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal Jul 2011

China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal

Journal of Strategic Security

This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …


"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson Jul 2011

"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson

Journal of Strategic Security

No abstract provided.


Cover & Front Matter Jul 2011

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


The Use Of Role-Player Prompts In Assessment Center Exercises, Eveline Schollaert, Filip Lievens Jun 2011

The Use Of Role-Player Prompts In Assessment Center Exercises, Eveline Schollaert, Filip Lievens

Research Collection Lee Kong Chian School Of Business

So far, a substantial amount of assessment center (AC) studies have aimed to improve the quality of the AC method by focusing on the assessors. However, systematic studies about the role-player in AC exercises are nonexistent. This is surprising as the role-player might serve as a key figure for consistently evoking job-relevant behavior across candidates. Therefore, this study focused on the 'role' of role-players in ACs. We examined the effects of instructing role-players to use prompts among 233 candidates. Results suggest that role-players are able to use prompts and that their negative impact on candidates' reactions is negligible. In addition, …


Analogy Breakers: A Reality Check On Emerging Technologies, Luke Milligan May 2011

Analogy Breakers: A Reality Check On Emerging Technologies, Luke Milligan

Luke Milligan

Courts naturally and necessarily turn to analogical reasoning to incorporate cyber-technologies into existing doctrinal rules. And when it comes to criminal procedure, the preferred form of legal reasoning has been mono-analogous. The term “mono-analogical” designates a brand of analogical reasoning where only a single dimension of a subject is mapped. I argue that the prevailing mono-analogical approach to cyber-issues (which places near-exclusive emphasis on a technological instrument's functional role) is indeterminate, undisciplined, and in disregard of the subtler lessons of landmark Fourth Amendment opinions such as United States v. Knotts and Kyllo v. United States.

This article suggests, as an …


The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar May 2011

The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.

The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …


Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs May 2011

Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs

Chancellor’s Honors Program Projects

No abstract provided.


A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith Apr 2011

A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith

Purdue Polytechnic Masters Theses

Any major research institution has a substantial number of computer systems on its campus, often in the scale of tens of thousands. Given that a large amount of scientific computing is appropriate for execution in an opportunistic environment, a campus grid is an inexpensive way to build a powerful computational resource. What is missing, though, is a model for making an informed decision on the cost-effectives of a campus grid. In this thesis, the author describes a model for measuring the costs and benefits of building a campus computing resource based on the institution’s existing investment in computing hardware.

For …


Does Twitter Create Similar Patterns Of Positivity/Negativity As Face-To-Face Word-Of-Mouth?, Nicholis Jones Apr 2011

Does Twitter Create Similar Patterns Of Positivity/Negativity As Face-To-Face Word-Of-Mouth?, Nicholis Jones

Honors Projects in Marketing

Word-of-mouth communication is important to organizations because it is a free form of advertising and has been shown to be influential on consumers’ purchasing decisions. Marketers of course, would like WOM to be positive and thus increase brand reputation and sales. In the past decade, new forms of communication have created different channels for WOM to travel through. Current social media websites such as Facebook and Twitter allow one person to send a message to many almost instantaneously. This study’s objective is to examine the WOM on the networking site Twitter. Previous research has indentified the relative incidence rates of …


On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan Apr 2011

On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan

The African Journal of Information Systems

One issue that is concerning to the web security community is the correct identification of the origins of advance fee fraud mails. This has serious implications for directing concerted efforts towards mitigating the malaise in the right direction. Although previous research (Cuckier et al, 2007, Gbenga, 2007; Igwe, 2007; Progame, 2007) opined that these mails originate mainly from Nigeria and other West African Countries, research is warranted using available tracking tools to validate previously held notions about the issue of advance fee e-fraud mails. We harvested in real-time aggregated advance fraud e-mails over a two year period using the sinkhole …


Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer Apr 2011

Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer

UNLV Gaming Law Journal

The newly developed Internet gambling forum has produced myriad legal issues affecting state, federal, and international law. The difficulty in addressing the issues arises from the ubiquity of the Internet. Based on an analysis of the Kentucky Case, this Note argues that a state cannot seize an Internet gambling website’s domain name for violating that state’s laws. First, Kentucky did not have personal jurisdiction over the gambling domain names’ registrars to have authority to seize them. Second, Kentucky’s gambling statute violates the Commerce Clause. Part II provides background to and the facts underlying the Kentucky Case and its procedural …


Examining Local Consumer Interest In Selling Cal Poly Honey Online, Harrison Luce Mar 2011

Examining Local Consumer Interest In Selling Cal Poly Honey Online, Harrison Luce

Agribusiness

This study was undertaken to determine whether Cal Poly affiliated people were interested in purchasing Cal Poly honey online through its own web store. In addition to determining the level of interest, the target market was examined to explore how to market Cal Poly honey more effectively. The underlying objective of the project was to determine if a Cal Poly honey web store would be profitable as a honey marketing outlet in addition to current sales at stores around campus.

A survey was administered to Cal Poly affiliated people online using SurveyMonkey.com over a nine-day time period. The survey focused …