Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Business

A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield Aug 2016

A Study Of Information Security Awareness Program Effectiveness In Predicting End-User Security Behavior, James Michael Banfield

Master's Theses and Doctoral Dissertations

As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation …


An Analysis Of The Factors Associated With Adoption Of Electronic Supply Chain Management (E-Scm) Procurement Systems Within The U.S. Automotive Industry, Joseph James Joyce Apr 2016

An Analysis Of The Factors Associated With Adoption Of Electronic Supply Chain Management (E-Scm) Procurement Systems Within The U.S. Automotive Industry, Joseph James Joyce

Master's Theses and Doctoral Dissertations

The U.S. automotive industry is a vitally important industry to our nation; over 7,000,000 individuals directly rely on this industry for their livelihood (Hill, K. (2014). Just How High‐Tech is the Automotive Industry? Ann Arbor, MI: Center for Automotive Research (CAR)). This study investigated the use of electronic supply chain management (e-SCM) system usage within this industry and its influence on work-related procurement outcomes. An electronic questionnaire was used to gather perceptions consistent with the constructs of the technology acceptance model, or “TAM” (Davis, F. D. (1985). A technology acceptance model for empirically testing new end-user information systems: theory and …


Student Intent To Persist Relative To Perceptions Of Service Quality And Satisfaction With Selected Onboarding Services In Community Colleges, Matthew Robert Fall Jan 2016

Student Intent To Persist Relative To Perceptions Of Service Quality And Satisfaction With Selected Onboarding Services In Community Colleges, Matthew Robert Fall

Master's Theses and Doctoral Dissertations

Background: Low persistence rates have continued to plague community colleges. A framework linking perceived service quality, satisfaction, and behavioral intent has been identified in the existing literature and found to be useful in various service sectors outside of higher education. Purpose: To explore the relationship between community college students’ perceptions of service quality, satisfaction, and behavioral intent (intent to persist) regarding first interactions with their colleges. Setting: Three community colleges representing large, medium, and small enrollment headcount from a Midwestern state were selected to represent that state’s community college student population. Subjects: A proportional number of students were selected randomly …


The Effect Of Electronic Devices Self-Efficacy, Electronic Devices Usage And Information Security Awareness On Identity-Theft Anxiety Level, Sushma Sanga Jan 2016

The Effect Of Electronic Devices Self-Efficacy, Electronic Devices Usage And Information Security Awareness On Identity-Theft Anxiety Level, Sushma Sanga

Master's Theses and Doctoral Dissertations

Identity-theft means stealing someone’s personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identitytheft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices usage, and information security awareness on anxiety levels of southeastern Michigan students in becoming victims of identity-theft and whether there is any significant relationship between these variables. This research study used the effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level among southeastern …


Effects Of Emotional Intelligence On Academic Achievement In The Alternative High School Classroom, Rhonda L. Marcum-Phillips Jan 2016

Effects Of Emotional Intelligence On Academic Achievement In The Alternative High School Classroom, Rhonda L. Marcum-Phillips

Master's Theses and Doctoral Dissertations

This study examines the impact of emotional intelligence, academic self-efficacy in science and technology, and family background on academic achievement of alternative high school students. Gender, age, learning style, and ethnicity of the student are analyzed to determine any moderator effect on these relationships. Seventy-five students, ages 14 to19, who attend a public alternative high school were surveyed. Analysis of the data revealed a positive relationship for males between self-efficacy in STEM classes and family background (support) and their academic achievement in science class. A positive relationship was shown between self-efficacy in STEM classes and academic achievement, between self-efficacy in …