Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (225)
- Kennesaw State University (121)
- Illinois State University (54)
- Universitas Indonesia (43)
- University of South Florida (36)
-
- Clemson University (27)
- Chinese Academy of Sciences (26)
- Embry-Riddle Aeronautical University (23)
- The University of Maine (21)
- Harbin University of Science and Technology (16)
- Vocational Training Council (16)
- Brigham Young University (14)
- Pepperdine University (14)
- Fordham Law School (13)
- Southern Methodist University (10)
- University of Central Florida (10)
- De La Salle University (9)
- Institute of Business Administration (8)
- Walden University (8)
- St. John's University (7)
- University of Maryland Francis King Carey School of Law (7)
- American Dental Association (6)
- Florida International University (6)
- University of New Hampshire (6)
- Association of Arab Universities (5)
- DePaul University (5)
- University of Massachusetts Boston (5)
- University of Rhode Island (5)
- Colby College (4)
- Gettysburg College (4)
- Keyword
-
- Technology (71)
- Cybersecurity (38)
- Innovation (30)
- Information (28)
- Internet (22)
-
- Blockchain (18)
- Management (17)
- IT (16)
- Systems (15)
- Business (14)
- Social media (14)
- Editorial Board (13)
- Education (13)
- Editorial (12)
- Maine (12)
- Privacy (12)
- Security (12)
- Online (11)
- AI (10)
- Economy (10)
- ToC (10)
- Marketing (9)
- Patent (9)
- Trust (9)
- Web (9)
- COVID-19 (8)
- Communication (8)
- Cryptocurrency (8)
- Entrepreneurship (8)
- Healthcare (8)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (222)
- Journal of Cybersecurity Education, Research and Practice (99)
- International Journal for Business Education (54)
- CSID Journal of Infrastructure Development (33)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (26)
-
- Journal of the Patent and Trademark Resource Center Association (26)
- University of South Florida (USF) M3 Publishing (24)
- Maine Policy Review (21)
- Journal of Science and Technology Management (16)
- The African Journal of Information Systems (16)
- SIGNED: The Magazine of The Hong Kong Design Institute (15)
- Fordham Journal of Corporate & Financial Law (13)
- International Journal of Aviation, Aeronautics, and Aerospace (11)
- Marriott Student Review (10)
- SMU Data Science Review (10)
- Asia-Pacific Journal of IP Management and Innovation (9)
- Business Review (8)
- Journal of Global Business Insights (8)
- The Journal of Business, Entrepreneurship & the Law (8)
- Journal of Business & Technology Law (7)
- Journal of Global Awareness (7)
- International Journal of Applied Management and Technology (6)
- The Journal of the Michigan Dental Association (6)
- Beyond: Undergraduate Research Journal (5)
- Hospitality Review (5)
- Human-Machine Communication (5)
- Markets, Globalization & Development Review (5)
- New England Journal of Public Policy (5)
- Rosen Research Review (5)
- The Journal of Entrepreneurial Finance (5)
Articles 211 - 240 of 866
Full-Text Articles in Business
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid
Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid
Journal of Cybersecurity Education, Research and Practice
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …
A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber
A “Duty To Write” Smart Contracts That Unsophisticated Users Have A “Duty To Read”, Chase Webber
Minnesota Journal of Law, Science & Technology
No abstract provided.
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Washington Journal of Law, Technology & Arts
Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …
“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf
“Listen To Me” – A Systematic Literature Review About Learning From Others’ Failure Narrations, Verena Liszt-Rohlf
International Journal for Business Education
The dedicated stream of learning from others’ failure has gained increasing attention in entrepreneurship education research and—because of the COVID-19 crisis—among practitioners. The emerging literature on entrepreneurship education addresses this important phenomenon but lacks specific theoretical underpinnings; its new approaches to and empirical inquiry are one-sided. Therefore, a systematic literature review is warranted to provide a more comprehensive view of learning from others’ entrepreneurial failures and to develop a research model. Unprecedentedly, the author explores the type of research streams and gaps that can be included in a research model for entrepreneurship education research in the area of learning from …
Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry
Ro Khanna, Dignity In A Digital Age: Making Tech Work For All Of Us (2022), James W. Gentry
Markets, Globalization & Development Review
No abstract provided.
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
International Journal for Business Education
The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …
Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Key Performance Indicators Detection Based Data Mining, Fatma Abogabal, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding …
Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs
Hired By A Machine: Can A New York City Law Enforce Algorithmic Fairness In Hiring Practices?, Lindsey Fuchs
Fordham Journal of Corporate & Financial Law
Workplace antidiscrimination laws must adapt to address today’s technological realities. If left underregulated, the rapidly expanding role of Artificial Intelligence (“AI”) in hiring practices has the danger of creating new, more obscure modes of discrimination. Companies use these tools to reduce the duration and costs of hiring and potentially attract a larger pool of qualified applicants for their open positions. But how can we guarantee that these hiring tools yield fair outcomes when deployed? These issues are just starting to be addressed at the federal, state, and city levels. This Note tackles whether a new city law can be improved …
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Catholic University Journal of Law and Technology
The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.
This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …
Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora
Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora
Journal of International Technology and Information Management
Since the COVID-19 outbreak, many hospitals suffered from a surge of some high-risk inpatients needing to be admitted to the ICU. In this study, we propose a method
predicting the likelihood of COVID-19 inpatients’ admission to the ICU within a time frame of 12 hours. Four steps, the Bayesian Ridge Regression-based missing value imputation, the synthesis of training samples by the combination of two rows (the first and another row) of each patient, customized oversampling, and XGBoost classifier, are used for the proposed method. In the experiment, the AUC-ROC and F-score of our method is compared with those of other …
From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke
From Tether To Terra: The Current Stablecoin Ecosystem And The Failure Of Regulators, Mary E. Burke
Fordham Journal of Corporate & Financial Law
The Tether controversy and Terra crash have placed stablecoins in the regulatory spotlight. Stablecoins are often portrayed as posing systemic risks to financial markets, with some pundits labelling them “the villain of the finance world.” Global regulatory bodies, namely the International Monetary Fund (IMF) and the Bank of International Settlement (BIS), and political leaders, including the Biden Administration, have all called for stablecoin regulation. These officials allege that stablecoins’ structure, combined with their exponential growth, pose a unique risk to global markets. Before the May 2022 Terra crash, government reports superficially treated stablecoins by exclusively focusing on asset-backed coins. Post …
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Fordham Journal of Corporate & Financial Law
There is no comprehensive financial privacy law that can protect consumers from a company’s collection sharing and selling of consumer data. The most recent federal financial privacy law, the Gramm-Leach-Bliley Act (“GLBA”), was enacted by Congress over 20 years ago. Vast technological and financial changes have occurred since 1999, and financial privacy law is due for an upgrade.
As a result, loopholes exist where companies can share financial data without being subject to laws or regulations. Additionally, federal financial privacy related laws provide little to no recourse for consumers to self-remediate with litigation, also known as a private right of …
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
Catholic University Journal of Law and Technology
A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill
Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill
Journal of International Technology and Information Management
The interdependent learning process is regarded as a crucial part of e-learning success, but it has been largely ignored in e-learning empirical research. Grounded in constructivist and social constructivist theory, we present and test an e-learning success model consisting of eight e-learning critical success factors (CSF) derived from constructivist and social constructivist models. Three hundred seventy-two on-line students from a Midwestern university in the United States participated in the survey. The data collected from the survey was used to examine the partial least squares structural equation model. The results highlight the importance of self-regulated learning and dialogical processes to explain …
Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray
Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray
Journal of International Technology and Information Management
The growing popularity of non-fungible tokens (NFTs) has created a new digital collectibles asset class and market. NFTs are unique digital tokens built on blockchain technology that can represent anything from art, property rights, certificates of authentication to sports collectibles. The use of blockchain provides the framework for digital ownership and brings the notion of scarcity to the digital NFT asset class. With the emerging NFT market and growing consumer base little work has investigated the factors behind NFT interest and participation. Using a dataset of 26,444 tweets on NBA Top Shot, one of the largest and most popular NFT …
Asia Pacific Perspectives Vol. 18 No 1. 2023, University Of San Francisco
Asia Pacific Perspectives Vol. 18 No 1. 2023, University Of San Francisco
Asia Pacific Perspectives
Contents:
Articles
Urban Youth on the Margins: Inequality in China’s Sent Down Youth Movement by Sanjiao Tang
Chinese Firms in the Belt and Road Initiative: A Cross-Sectoral Study of BRI Activities in Kenya by Yabo Wu
Book Review
W. Puck Brecher. Animal Care in Japanese Tradition: A Short History by James Stone Lunde
The Intention To Use Mobile Banking As A Financial Technology Service Among Islamic Bank Users, Ratna Juwita, Adam Darma Kusumah, Tiara Syahrani Aqila, Hanan Tsabitah, Muhammad Farhan Syauqi
The Intention To Use Mobile Banking As A Financial Technology Service Among Islamic Bank Users, Ratna Juwita, Adam Darma Kusumah, Tiara Syahrani Aqila, Hanan Tsabitah, Muhammad Farhan Syauqi
Indonesian Capital Market Review
The development of Financial Technology (FinTech) in Islamic banks has not brought increasing us- ers. Therefore, it is necessary to determine which factors influence intention to use FinTech from the demand side or the customers’ side. For this study, we chose mobile banking as our research object, considering that the largest digital transactions in Islamic banks come from mobile banking. Mobile banking also provides banks various benefits to banks such as increased long-term profitability, cus- tomer loyalty, and financial inclusion. The objective of this study is to observe the determinant factor by using the theory of planned behavior (TPB) and …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
Blockchain In The Food Industry: Integrating Machine Learning In A Systematic Literature Review, Juan M. Gómez, Omar H. Fares, Myuri Mohan, Seung Hwan Lee
Blockchain In The Food Industry: Integrating Machine Learning In A Systematic Literature Review, Juan M. Gómez, Omar H. Fares, Myuri Mohan, Seung Hwan Lee
Journal of International Technology and Information Management
This study provides a systematic literature review of blockchain technology in the food industry with a supply chain lens. We identify primary and sub-themes, discuss implications and applications in terms of delivering value and propose literature-informed future research directions. This review uncovered three primary themes: a) Value Creation; b) Supply Chain Digitization; and c) Transformation. It demonstrates that digitalizing food networks with blockchain technology may benefit from increased stakeholder involvement and data visibility to gain competitive advantage. Beyond the theoretical contributions, this research provides a methodological contribution by demonstrating the uses of machine learning techniques to perform systematic literature reviews.
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Journal of International Technology and Information Management
The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Journal of International Technology and Information Management
This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …
Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot
Preferences Of Coffee Farmers For Attributes Of Selected Coffee Technologies In The Philippines, Jayson S. Cabral, Dia Noelle F. Velasco, Mar B. Cruz, Nohreen Ethel P. Manipol, Hannah D. Miranda-Quibot
Journal of Economics, Management and Agricultural Development
This paper looked into the preferences of 151 coffee farmers for the attributes of selected coffee technologies. The study was done to help guide technology developers in crafting post harvest processing facilities for coffee which their target market will need which can lead to a higher probability of commercialization of new coffee technologies. The study examined the preferences for attributes for coffee dryers, moisture meters, coffee depulpers, and coffee sorters using the Analytic Hierarchy Process (AHP) framework. The results revealed that the quality of the final product is the top priority for coffee farmers when choosing a coffee dryer. Non-destructiveness …
Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu
Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu
The African Journal of Information Systems
Digital organizations have become highly dependent on digital platforms and customer needs as key resources for digital service innovation. These resources in the competitive environment are making and shaping innovation of digital services because, though external, they remain central to digital organizations’ strategic innovation and competitiveness. Yet, how and why organizing these resources influences digital service innovation is under-explained in the literature. This paper, based on an empirical study and grounded theory methodology, addresses this limitation. It explains that digital service innovation occurs through two complementary types of organizing, namely: foundational knowledge organizing by combining digital platforms and customer needs, …
2021 Ijbe V2 Front Matter, Tamra Connor
2021 Ijbe V2 Front Matter, Tamra Connor
International Journal for Business Education
- Editorial Board
- Letter from International President
- SIEC-ISBE International
Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara
Sharing Economy Of Online Food Delivery: Revealing The Underlying Attributes Of The Customer Experience Through Semantic Network Analysis, Hepinda Fajari Nuharini, Mustika Sufiati Purwanegara
The South East Asian Journal of Management
Research Aims: This study aimed to reveal the underlying attributes of the customer experience in the sharing economy of online food delivery (OFD).
Design/Methodology/Approach: After collecting 45,116 reviews from the Google Play store, a semantic network analysis was conducted. Python programming language and text mining were utilised to extract keywords from online reviews, a frequency analysis was performed, and a CONvergence of iterated CORrelations (CONCOR) analysis was conducted using Ucinet 6.0.
Research Findings: The keywords ‘food,’ ‘order,’ ‘driver,’ and ‘application’ had the highest frequency and centrality. Customer experience attributes were classified into four clusters: ‘Delivery Procedure’, ‘OFD Platform’, ‘Payment Process’ …
Vertical Partnerships Between Oem And First Tier: Lessons From Automotive Component Companies In Greater Jakarta-Indonesia, Donny Oktavian Syah, Rambat Lupiyoadi, Embun Suryani
Vertical Partnerships Between Oem And First Tier: Lessons From Automotive Component Companies In Greater Jakarta-Indonesia, Donny Oktavian Syah, Rambat Lupiyoadi, Embun Suryani
The South East Asian Journal of Management
Research Aims: This research aimed to investigate vertical partnerships between Original Equipment Manufacturers (OEMs) and first-tier automotive component firms based on the relationships between technology transfer, technical exchange, government role and supplier performance in the Greater Jakarta area.
Design/Methodology/Approach: A total of 65 respondent firms participated, comprising 6 OEMs and 59 first-tier firms. The research included site visits and interviews with companies based on questionnaires completed by representative individuals from middle management upward with responsibility for assessing product quality (purposive sampling). The questionnaire results were measured using Partial Least Squares Path Modelling (PLS-PM).
Research Findings: The results highlighted significant relationships …
What Has Changed For Top Mba Schools Within A Decade In Terms Of Mindfulness?, Dr. Damla Aktan, Asst. Prof. Nilgün Gürkaynak
What Has Changed For Top Mba Schools Within A Decade In Terms Of Mindfulness?, Dr. Damla Aktan, Asst. Prof. Nilgün Gürkaynak
International Journal for Business Education
The concepts of “mindful consumption” and “sustainability” became indispensable parts of both academia and business life. Based upon an initial research conducted in 2012, this research aims to understand and compare the change within a decade in MBA curricula in terms of mindfulness content inclusion as well as sustainability and ecological orientation. The results compare the evolution of the integration of concepts to curricula since 2012 through the official websites of the top 100 MBA schools of the Financial Times Global Ranking in both 2012 and 2022. The study aims to summarize how the concepts of sustainability, mindful consumption and …
Proceedings Of The Project Management Innovation Annual Conference, Tom Wise
Proceedings Of The Project Management Innovation Annual Conference, Tom Wise
Beyond the Project Horizon: Journal of the Center for Project Management Innovation
The Project Management Innovation Conference brings together professionals, leaders, visionaries, researchers, and students to engage in the topics related to the future of project management. Attendees represent all fields and industries, including government, corporate, and private. Attendee demographics include practitioners, front-line staff, and executive management.
Principles Of Information Security, Alison Hedrick
Principles Of Information Security, Alison Hedrick
KSU Distinguished Course Repository
An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.