Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Business

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim Jul 2022

Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim

Journal of Cybersecurity Education, Research and Practice

Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.

In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …


Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly Feb 2022

Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly

Transforming Libraries for Graduate Students

This poster outlines strategies for creating a support system for online graduate students learning new software. The Northcentral University (NCU) Library is a 100 percent online library providing services and delivering resources to students in a remote context. According to university facts and figures, approximately 98 percent of students are enrolled in a graduate program and nearly 69 percent of those students are pursuing a doctoral degree. In May 2019, a reference and instruction librarian developed a program to support graduate students learning how to use ProQuest RefWorks, a web-based research management tool. Elements of the program include synchronous options …


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Collegiate Competition And The Propensity For Gender Bias, Deborah H. Lester, Aberdeen Leila Borders, Terry W. Loe, Keith Tudor Sep 2015

Collegiate Competition And The Propensity For Gender Bias, Deborah H. Lester, Aberdeen Leila Borders, Terry W. Loe, Keith Tudor

Atlantic Marketing Association Proceedings

Since the dawn of time gender has played a starring role in human behavior. The behavioral implications of an individual’s sex have permeated research findings in a wide variety of academic disciplines. This preliminary investigation will explore the concept and definition of gender, gender bias, and gender stereotype on actions and conduct. Specifically, this inquiry will determine the scope and types of gender bias/stereotypes that exist in the business world with a primary concentration on the area of professional sales. The ultimate objective is to discover the type and level of influence a person’s gender contributes to evaluation, performance and …


Using Marketing Research And Positioning Techniques To Create Imc Campaigns For Private, Charter, Or Public Magnet Schools, John M. Mcgrath Ph.D. Apr 2014

Using Marketing Research And Positioning Techniques To Create Imc Campaigns For Private, Charter, Or Public Magnet Schools, John M. Mcgrath Ph.D.

Atlantic Marketing Journal

This article describes how two common tools of consumer marketers, marketing research and positioning analysis, were used to promote enrollment at a private elementary school that draws students from across district lines. The case study uses literature in the relevant fields to follow the process from the development, methodology, and results of the marketing research study to their inclusion in a positioning analysis and map of the school’s perceived strengths and weaknesses, to the final integrated marketing communications (IMC) campaign that resulted.


Best Practices For Hiring Academic Librarians With Faculty Status And Rank, Christopher Shaffer Oct 2011

Best Practices For Hiring Academic Librarians With Faculty Status And Rank, Christopher Shaffer

The Southeastern Librarian

When library school students graduate, their primary goal frequently is to find a job; they may have a preference for a position as a public librarian, academic librarian, or school media specialist, but most important is finding gainful employment in order to put food on the table. The person responsible for hiring academic librarians must attempt to discern, based on a résumé and a relatively brief personal interview whether a candidate is capable of performing the basic tasks of being a librarian, interacting with faculty, guiding students, and performing their duties as a member of the academy. To make the …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


Developing A Customized Program Assessment Methodology For Assurance Of Learning: A Case Study, Hope Baker, Dorothy Brawley, Jane E. Campbell, Ernest Capozzoli, Linda Malgeri, Gary B. Roberts Aug 2007

Developing A Customized Program Assessment Methodology For Assurance Of Learning: A Case Study, Hope Baker, Dorothy Brawley, Jane E. Campbell, Ernest Capozzoli, Linda Malgeri, Gary B. Roberts

Faculty and Research Publications

For most academic institutions, selecting and/or designing a Program Assessment methodology for Assurance of Learning is a challenging task. This paper describes the steps taken to establish goals, values and criteria driving this process for a College of Business. In this case analysis, we document the options we explored in finding the right vehicle for our particular situation. Our experience with a beta test and full rollout of our Program Assessment is detailed. After considerable research and a trial and error process, we have implemented a hybrid Program Assessment approach for our undergraduate students. This approach includes a business simulation …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Use Of An Advising Team, Jane E. Campbell, Randy Stuart Jan 2005

Use Of An Advising Team, Jane E. Campbell, Randy Stuart

Faculty and Research Publications

The Michael J. Coles College of Business at Kennesaw State University uses selected faculty members on an Advising Team, and provides access to them through walk-in advising hours. Compared to our previous approach of assigning students to all faculty members, the benefits of this system for the students are more efficient and effective advising. Students have access to advising at more times, and are more likely to get correct answers quickly. The benefits for the faculty are that the faculty members on the Team enjoy advising and can have their performance expectations tailored to include advising, while those faculty members …


Attracting African American Honor Students Into Accounting, Dana Hermanson, Susan H. Ivancevich, Roger H. Hermanson Jan 1995

Attracting African American Honor Students Into Accounting, Dana Hermanson, Susan H. Ivancevich, Roger H. Hermanson

Faculty and Research Publications

The percentage of minority professionals in the major accounting firms has risen only 2 percentage points since 1976. Black members of a national collegiate honor society were surveyed to see if their perceptions of the accounting profession lead them to select other majors. The nonaccounting students perceived the accounting profession very positively in providing long-term financial rewards and availability of employment. The nonfinancial characteristics of lifestyle, work environment, and nature of accounting work were perceived poorly by respondents. It is vital that black students gain a better understanding of the nonfinancial nature of accounting work and of the role of …


Management Accounting & Academe, Heather M. Hermanson, Dana R. Hermanson Jun 1994

Management Accounting & Academe, Heather M. Hermanson, Dana R. Hermanson

Faculty and Research Publications

Management accounting offers rewarding research opportunities. If researchers are able to identify more efficient ways to analyze internal accounting data, these new methods can be adopted immediately by interested companies. Breakthroughs in management accounting research do not have to filter through a standard-setting body before they can have an impact on practice. Due to the absence of management accounting rules, the great demand for management accounting research, and the availability of management accounting data, it is not surprising that academic research is beginning to drive the field of management accounting.