Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (8)
- University of South Florida (5)
- SelectedWorks (4)
- University of Mississippi (3)
- University of Tennessee, Knoxville (3)
-
- Kennesaw State University (2)
- Air Force Institute of Technology (1)
- American Dental Association (1)
- Bryant University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Chapman University (1)
- Cleveland State University (1)
- Coastal Carolina University (1)
- Fordham University (1)
- Georgia Southern University (1)
- Grand Valley State University (1)
- Maurer School of Law: Indiana University (1)
- Montclair State University (1)
- Old Dominion University (1)
- Purdue University (1)
- Singapore Management University (1)
- Southern Cross University (1)
- St. John Fisher University (1)
- University of Central Florida (1)
- University of Massachusetts Boston (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Utah State University (1)
- West Chester University (1)
- Keyword
-
- Cybersecurity (4)
- Accounting (2)
- Austerity (2)
- Authority (2)
- Cloud computing (2)
-
- E-commerce (2)
- Government (2)
- Information Warfare (2)
- Information technology (2)
- Legitimacy (2)
- Open Government (2)
- Open government (2)
- Privacy (2)
- Social networking (2)
- Terrorism / counterterrorism (2)
- Abbie Gail Parham (1)
- Accounting Advisory Council Scholars (1)
- Accounting/Taxation (1)
- Adrian Gardiner (1)
- Advance fee fraud Mails (1)
- Africa (1)
- Al-Qaida (1)
- Alan Mackelprang (1)
- Alex Knight (1)
- Allen Boudet (1)
- Allie Jonsen (1)
- Alvie Coes III (1)
- Amit Arora (1)
- Anti-Discrimination Committee (ADC) (1)
- Arab Spring (1)
- Publication
-
- Journal of Strategic Security (5)
- Arcot Desai NARASIMHALU (2)
- Industry Guides (AAGs), Risk Alerts, and Checklists (2)
- Jan Kallberg (2)
- Manoj Maharaj (2)
-
- The African Journal of Information Systems (2)
- ADA News (1)
- AFIT Documents (1)
- Agribusiness (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Articles by Maurer Faculty (1)
- Brookings Mountain West Publications (1)
- Business Faculty Articles and Research (1)
- Business Faculty Publications (1)
- Chancellor’s Honors Program Projects (1)
- Conference for Positive Marketing (1)
- Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship (1)
- Department of Marketing Faculty Scholarship and Creative Works (1)
- Doctoral Dissertations (1)
- Dr Deogratias Harorimana (1)
- Eagle Executive Magazine (2022) (1)
- Economics & Finance Faculty Publications (1)
- Electronic Theses and Dissertations (1)
- Exposure Drafts, Comment Letters, and Statements of Position (1)
- George H Baker (1)
- George M Coles (1)
- Great Lakes Hospitality & Tourism Educators Conference (1)
- Honors Projects in Marketing (1)
- Honors Theses (1)
- Honors Thesis Program in the College of Management (1)
- Publication Type
- File Type
Articles 1 - 30 of 49
Full-Text Articles in Entire DC Network
Outsourcing: More Harm Than Good, Ly Luu Pham
Outsourcing: More Harm Than Good, Ly Luu Pham
Honors Theses
Outsourcing is a highly effective strategy, widely used in various types of business to gain a competitive edge. The tremendous growth of outsourcing first started in the manufacturing and information technology industries. It has also spread into the accounting industry as well. However, in accounting the major problems and benefits caused by outsourcing are different from those identified in the manufacturing and IT industries. This leads to the question of whether or not outsourcing in accounting would create more advantages than disadvantages. This paper analyzes the question through four steps: (1) how accounting outsourcing is done, (2) which accounting tasks …
Expanding Your Accounting Classroom With Digital Video Technology, Mark Holtzblatt, Norbert Tschakert
Expanding Your Accounting Classroom With Digital Video Technology, Mark Holtzblatt, Norbert Tschakert
Business Faculty Publications
In the past, many activities of accounting professors were restricted or confined by their classroom walls. Bringing in guest speakers, taking students on field trips and teaching students off-campus (either locally or globally) were extraordinary efforts that required significant organization. Today, numerous technological advancements in communication infrastructure, equipment and online tools greatly facilitate such initiatives. Outside experts can now visit the classroom, students can explore or collaborate in distant places and professors can extend the geographical reach of their lessons simply via the means of digital video technology. Based on our 2010 Conference on Teaching and Learning in Accounting (CTLA) …
Facebook Addiction: Factors Influencing An Individual's Addiction, Erica Sherman
Facebook Addiction: Factors Influencing An Individual's Addiction, Erica Sherman
Honors Thesis Program in the College of Management
Prior research has proved that an individual could be addicted to the Internet in general, but no research has been done specifically to social networking sites such as Facebook. This study investigates how factors such as personality, gender, procrastination, boredom and ones values may affect the amount of time they spend on Facebook, further concluding that they are either overly obsessive or not about the usage thereof. Further, this study tests whether those same factors influence and individuals likelihood of facing Facebook withdrawal or Facebook devotion. Prior research was conducted using scholarly articles that focused on personality types and Internet …
The Role Of Social Network Websites In Consumer-Brand Relationship, Hyejune Park
The Role Of Social Network Websites In Consumer-Brand Relationship, Hyejune Park
Doctoral Dissertations
This research explored the phenomenon of online social network in the context of consumer-brand relationship. The specific research objectives were: (a) to examine whether perceived benefits of a Brand’s Social Network Website (BSN) predict BSN relationship quality; (b) to investigate whether perceived benefits of BSN predict perceived relationship investment; (c) to examine if online social connection strengthens the relationship between perceived benefits of BSN and BSN relationship quality; (d) to examine if experience with BSN strengthens the relationship between perceived benefits of BSN and BSN relationship quality; (e) to investigate whether BSN relationship quality predicts brand relationship quality; (f) to …
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Jared A. Harshbarger
Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.
Unify, Regionalize, Diversify: An Economic Development Agenda For Nevada, Mark Muro
Unify, Regionalize, Diversify: An Economic Development Agenda For Nevada, Mark Muro
Brookings Mountain West Publications
Nevada stands at a crossroads, yet it appears ready to remap its future.
Silver Staters sense that the current economic slump has not been just a temporary reversal but a challenge to the state’s traditional growth model—one that has revealed an economy over-dependent on consumption sectors, prone to booms and busts, and too little invested in innovation and economic diversification. And yet, for all that Nevadans have been early to recognize that the current slump will beget, in some places, innovation and renewal, and in other places erosion—and so requires action.
To that end, this report draws on an intense …
Comment Letters On Proposed Statement On Auditing Standards, The Auditor’S Consideration Of An Entity’S Ability To Continue As A Going Concern (Redrafted), November 11, 2011, American Institute Of Certified Public Accountants. Auditing Standards Board
Comment Letters On Proposed Statement On Auditing Standards, The Auditor’S Consideration Of An Entity’S Ability To Continue As A Going Concern (Redrafted), November 11, 2011, American Institute Of Certified Public Accountants. Auditing Standards Board
Exposure Drafts, Comment Letters, and Statements of Position
No abstract provided.
Inaugural Conference For Positive Marketing, Linda Purcell
Inaugural Conference For Positive Marketing, Linda Purcell
Conference for Positive Marketing
Inaugural Conference for Positive Marketing, November 4, 2011
Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii
Risk-Based Critical Infrastructure Priorities For Emp And Solar Storms, George H. Baker Iii
George H Baker
Two electromagnetic phenomena have the potential to create continental-scale disasters. The first, nuclear electromagnetic pulse (EMP), results from a nuclear detonation high above the tropopause. The second, a major solar storm, or "solar tsunami" occurs naturally when an intense wave of charged particles from the sun perturbs the earth's magnetic field. Both phenomena can debilitate electrical and electronic systems necessary for the operation of infrastructure systems and services. One reason why a U.S. protection program has yet to be initiated is that policy makers continue to wrestle with the question of where to begin, given the Department of Homeland Security’s …
A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr
A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr
Dr Deogratias Harorimana
Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.
Athletes On Facebook, Kristen Vella
Athletes On Facebook, Kristen Vella
Sport Management Undergraduate
As technology has risen at a rapid rate in recent years, social networking has become a large part of society. Specifically Facebook has become a part of a regular routine and a daily task for many, including athletes. Privacy settings for athletes are important as many activities online are now being monitored by university personnel. This exploratory study uncovered the quantity, content and rationalization of Facebook posts with a select group of Division III athletes. Utilizing survey technology, it was discovered that athletes seem to be more cautious than expected and do take privacy settings into consideration. These findings contradict …
The Price Decline Anomaly In Christmas Season Internet Auctions Of Ps3s, Thomas Andrews, Cynthia Benzing, Matthew Fehnel
The Price Decline Anomaly In Christmas Season Internet Auctions Of Ps3s, Thomas Andrews, Cynthia Benzing, Matthew Fehnel
Economics & Finance Faculty Publications
No abstract provided.
Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj
Factors Influencing Successful Use Of Mobile Technologies To Facilitate E-Commerce In Small Enterprises: The Case Of Kenya, Patrick Kanyi Wamuyu, Manoj Maharaj
The African Journal of Information Systems
This paper interrogates the suitability of Mobile Technologies to facilitate e-commerce in Kenyan Micro and Small Enterprises (MSEs). The study proposed a theoretical model and empirically tested it using a sample selected using proportionate stratified sampling within well-defined geographic clusters. The study revealed that, while there is massive use of mobile Internet Services (MIS), there is limited use of Mobile Money Transfer Services (MMTS) for B2B and B2C transactions as opposed to C2C and C2B e-commerce transactions. Results also indicated that utilizing MIS and MMTS, positively and significantly influenced organization’s performance through operational, transactional and interactional benefits. On the research …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
Worker Shortage, Outsourcing, And Immigration As Features Of Computer Technology Competition Between The United States And India, Melvin L. Tobias
Worker Shortage, Outsourcing, And Immigration As Features Of Computer Technology Competition Between The United States And India, Melvin L. Tobias
Masters Theses
In this study, we examine questions relating to the state of competition between the United States and India in the field of computer technology. We consider whether there is continual increase in the outsourcing by American firms of computer service work abroad, claims of computer worker shortage, and claims of the need for increased immigration of foreign computer workers to deal with a supposed deterioration in American technology. We conclude, first, that both U.S. and Indian computer service companies and their potential clients prefer close collaboration rather than “arms length” relationships. As a result, service companies in both nations have …
A Phenomenological Study Of Millennial Generation Cooperative Extension Educators' Development Of Core Competencies, David L. Varner
A Phenomenological Study Of Millennial Generation Cooperative Extension Educators' Development Of Core Competencies, David L. Varner
Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship
The purpose of this qualitative research study was to describe the experiences that contribute to the development of core competencies among Millennial Generation, county-based Extension educators in the University of Nebraska-Lincoln Extension Division. Fourteen educators were randomly purposefully selected to participate in the study. Participants were born in 1977 or later as determined by Tapscott (2009). Educators’ tenure in Cooperative Extension ranged from two months to seven years. Three themes and associated sub-themes emerged from semi-structured interviews: (a) Blindfolded and Scared—educators were confused, overwhelmed and in need of support; (b) Developing the Big Skills: A Daunting Task—focused on discovering competencies …
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Journal of Strategic Security
The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
Journal of Strategic Security
This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
Journal of Strategic Security
No abstract provided.
The Use Of Role-Player Prompts In Assessment Center Exercises, Eveline Schollaert, Filip Lievens
The Use Of Role-Player Prompts In Assessment Center Exercises, Eveline Schollaert, Filip Lievens
Research Collection Lee Kong Chian School Of Business
So far, a substantial amount of assessment center (AC) studies have aimed to improve the quality of the AC method by focusing on the assessors. However, systematic studies about the role-player in AC exercises are nonexistent. This is surprising as the role-player might serve as a key figure for consistently evoking job-relevant behavior across candidates. Therefore, this study focused on the 'role' of role-players in ACs. We examined the effects of instructing role-players to use prompts among 233 candidates. Results suggest that role-players are able to use prompts and that their negative impact on candidates' reactions is negligible. In addition, …
Analogy Breakers: A Reality Check On Emerging Technologies, Luke Milligan
Analogy Breakers: A Reality Check On Emerging Technologies, Luke Milligan
Luke Milligan
The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar
The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.
The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …
Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs
Privacy Law And The Internet Using Facebook.Com As A Case Study, Amelia D. Grubbs
Chancellor’s Honors Program Projects
No abstract provided.
A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith
A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith
Purdue Polytechnic Masters Theses
Any major research institution has a substantial number of computer systems on its campus, often in the scale of tens of thousands. Given that a large amount of scientific computing is appropriate for execution in an opportunistic environment, a campus grid is an inexpensive way to build a powerful computational resource. What is missing, though, is a model for making an informed decision on the cost-effectives of a campus grid. In this thesis, the author describes a model for measuring the costs and benefits of building a campus computing resource based on the institution’s existing investment in computing hardware.
For …
Does Twitter Create Similar Patterns Of Positivity/Negativity As Face-To-Face Word-Of-Mouth?, Nicholis Jones
Does Twitter Create Similar Patterns Of Positivity/Negativity As Face-To-Face Word-Of-Mouth?, Nicholis Jones
Honors Projects in Marketing
Word-of-mouth communication is important to organizations because it is a free form of advertising and has been shown to be influential on consumers’ purchasing decisions. Marketers of course, would like WOM to be positive and thus increase brand reputation and sales. In the past decade, new forms of communication have created different channels for WOM to travel through. Current social media websites such as Facebook and Twitter allow one person to send a message to many almost instantaneously. This study’s objective is to examine the WOM on the networking site Twitter. Previous research has indentified the relative incidence rates of …
On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan
On The Origins Of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers, Olumide Longe, Adenike Osofisan
The African Journal of Information Systems
One issue that is concerning to the web security community is the correct identification of the origins of advance fee fraud mails. This has serious implications for directing concerted efforts towards mitigating the malaise in the right direction. Although previous research (Cuckier et al, 2007, Gbenga, 2007; Igwe, 2007; Progame, 2007) opined that these mails originate mainly from Nigeria and other West African Countries, research is warranted using available tracking tools to validate previously held notions about the issue of advance fee e-fraud mails. We harvested in real-time aggregated advance fraud e-mails over a two year period using the sinkhole …
Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer
Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer
UNLV Gaming Law Journal
The newly developed Internet gambling forum has produced myriad legal issues affecting state, federal, and international law. The difficulty in addressing the issues arises from the ubiquity of the Internet. Based on an analysis of the Kentucky Case, this Note argues that a state cannot seize an Internet gambling website’s domain name for violating that state’s laws. First, Kentucky did not have personal jurisdiction over the gambling domain names’ registrars to have authority to seize them. Second, Kentucky’s gambling statute violates the Commerce Clause. Part II provides background to and the facts underlying the Kentucky Case and its procedural …
Examining Local Consumer Interest In Selling Cal Poly Honey Online, Harrison Luce
Examining Local Consumer Interest In Selling Cal Poly Honey Online, Harrison Luce
Agribusiness
This study was undertaken to determine whether Cal Poly affiliated people were interested in purchasing Cal Poly honey online through its own web store. In addition to determining the level of interest, the target market was examined to explore how to market Cal Poly honey more effectively. The underlying objective of the project was to determine if a Cal Poly honey web store would be profitable as a honey marketing outlet in addition to current sales at stores around campus.
A survey was administered to Cal Poly affiliated people online using SurveyMonkey.com over a nine-day time period. The survey focused …