Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Business

Components Of An Effective Grant Proposal, Leonine Greaves Nov 2021

Components Of An Effective Grant Proposal, Leonine Greaves

Symposium of Student Scholars

United Way of Greater Atlanta is seeking to start a homeless initiative in Cherokee County, Georgia. For the initiation of any program or service, it requires a stream of funding. In the case of nonprofit organizations, grant funding is a source of revenue to support those services and programs. Grant funding is acquired by submitting a grant proposal to a funder through an application process meeting their requirements. This project identifies key components that all grant proposals should possess when pursuing grant funding. These key components were found by searching and analyzing peer-reviewed scholarly literature that details the nature and …


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo Oct 2021

A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo

KSU Proceedings on Cybersecurity Education, Research and Practice

The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber, physical, and cyber-physical components of any cyber-physical system (suitable target), and security (capable guardian). The focus of the study is to develop and evaluate the classification tool using Design Science Research (DSR) methodology. Publicly available data was used to evaluate the utility and usability of the proposed artifact by exploring three possible scenarios – Stuxnet, …


From Delhi To Mumbai, Apple Seeks A Bigger Slice Of The Pie, Taylor Greer, Brent Cassidy, Mike Williams, Nick Hill, Chandler Burger, Adam Pedraza, Steven Wehde, Caleb Fortney Aug 2021

From Delhi To Mumbai, Apple Seeks A Bigger Slice Of The Pie, Taylor Greer, Brent Cassidy, Mike Williams, Nick Hill, Chandler Burger, Adam Pedraza, Steven Wehde, Caleb Fortney

Symposium of Student Scholars

From Delhi to Mumbai, Apple Seeks a Bigger Slice of The Pie in India:

An International Marketing Case Study

Mike Williams, Adam Pedraza, Taylor Greer, Brent Cassidy, Nick Hill, Chandler Burger, Steven Wehde, and Caleb Fortney

Abstract

Apple Inc., headquartered in the United States, is the world’s largest technology company with revenues of $265 billion as of 2018 (Johnson, 2012). Apple has been trying to compete in India’s smartphone market, the world’s fastest-growing and second-largest smartphone market globally, accounting for nearly 30 million purchases per quarter (Sheth, 2019). Despite its success in the U.S., Apple has not been able to …


Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Eric Jacobs, Miguel Pereira, Savannah Rubio Aug 2021

Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Eric Jacobs, Miguel Pereira, Savannah Rubio

Symposium of Student Scholars

Mobike’s Bike-Share Battle in India: An International Marketing Case Study

Amber Cranston, Savannah Rubio, Sam Kroll, Austin Tudor, Eric Jacobs, Evan Coulter, and Miguel Pereira

Abstract

Mobike, the world’s first cashless and station-free bicycle service, launched in Shanghai in 2016 and now operates in over 19 countries including India (Khanna, 2017). Growing urbanization has led to increasing traffic congestion and pollution in most large cities around the world. Recently, there have been increasing calls for more sustainable transportation methods and one solution that is becoming popular is bike-sharing. The global bike ride-sharing market is projected to be worth around $8.6 …


Zara: Facing Fast Fashion Challenges In China. An International Marketing Case Study, Daniela Schaich Graniel, Alexxus Finnell, Caitlin Hopkins, Candace Salters, Elimay Baez, Larissa Hernandez, Madison Mcintyre, Raven Lee Aug 2021

Zara: Facing Fast Fashion Challenges In China. An International Marketing Case Study, Daniela Schaich Graniel, Alexxus Finnell, Caitlin Hopkins, Candace Salters, Elimay Baez, Larissa Hernandez, Madison Mcintyre, Raven Lee

Symposium of Student Scholars

Zara, one of the largest international fashion companies, was founded in Spain in 1974. It has a brand value of $18.4 billion and global revenues of $ 28.22 billion in 2018. Zara entered China in 2006 to compete in its $5.58 billion fast fashion market (Ge, 2018). China is an attractive emerging market with a GDP of $13.6 trillion, growing at 5.9% (World Bank, 2019). Zara’s fast fashion typically appeals to young college students and the middle class with income ranging from $7,250 to $62,500, representing about 39% of the population (Cyrill, 2019). In China, Zara targeted young women entering …


Finding Similar Stocks By Detecting Cliques In Market Graphs, Sudhashree Sayenju Aug 2021

Finding Similar Stocks By Detecting Cliques In Market Graphs, Sudhashree Sayenju

Symposium of Student Scholars

The stock market provides an abundant source of data. However, when the amount of raw data becomes overwhelming it grows increasingly difficult to know how the stocks interact with each other. Stock data visualization as a market graph serves as one of the most popular way of summarizing important information. When modelling the data as a graph, vertices correspond to stocks and edges correspond to strong correlation in their pricing in a certain period of time. This project presents a technique to find stocks that behave very similarly. Such information helps investors make decisions on which stocks to purchase next. …


Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Savannah Rubio, Miguel Pereira Aug 2021

Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Savannah Rubio, Miguel Pereira

Symposium of Student Scholars

Mobike’s Bike-Share Battle in India: An International Marketing Case Study

Amber Cranston, Savannah Rubio, Sam Kroll, Austin Tudor, Eric Jacobs, Evan Coulter, and Miguel Pereira

Abstract

Mobike, the world’s first cashless and station-free bicycle service, launched in Shanghai in 2016 and now operates in over 19 countries including India (Khanna, 2017). Growing urbanization has led to increasing traffic congestion and pollution in most large cities around the world. Recently, there have been increasing calls for more sustainable transportation methods and one solution that is becoming popular is bike-sharing. The global bike ride-sharing market is projected to be worth around $8.6 …


How Can Apple Be More Fruitful In India, Isabella Bertolani, Amani Elchaar, Kamari Davis, Lawrence Ofili, Michal Kardacz, Nakia Abdul, Pamela Diaz, Zack Mcpherson Aug 2021

How Can Apple Be More Fruitful In India, Isabella Bertolani, Amani Elchaar, Kamari Davis, Lawrence Ofili, Michal Kardacz, Nakia Abdul, Pamela Diaz, Zack Mcpherson

Symposium of Student Scholars

Abstract

How Apple Can become Fruitful in India: An International Marketing Case Study

Izzy Bertolani, Pamela Diaz, Zack McPherson, Amani Elchaar, Michal Kardacz, Kamari Davis, Nakia Abdul, and Lawrence Ofili

Apple, founded by Steve Jobs and Steve Wozniak in the United States in 1976, is a $91.8 billion, leading global technology company with 61% of revenue coming from international sales (“Apple Reports,”2020). Apple markets its iPhones in 26 countries and entered India with its iPhone 4 in 2011 (“The 15 coolest”2019). India is an attractive emerging market with a 1.37 billion population, $280 billion GDP, 5% growth rate, and a …


Ev’S Leading In China, Ford Is A Few Cars Behind, Jacob Murfin, Katie Mccombs, Tyler Lehman, Hayden Harrison, David Whitehead, Chris Sterling, Brianna Vangordon Aug 2021

Ev’S Leading In China, Ford Is A Few Cars Behind, Jacob Murfin, Katie Mccombs, Tyler Lehman, Hayden Harrison, David Whitehead, Chris Sterling, Brianna Vangordon

Symposium of Student Scholars

As the world is looking at sustainable energy sources, electric vehicles are likely to be a big part of the perceived future. China has 18.47% of the world’s population, is one of the highest emitters of carbon dioxide, and is the world’s largest market for electric vehicles (Country Meters). China’s GDP was USD 13.608 trillion in 2018 and is expected to increase substantially in coming years (Wang, 2019). With 25 million vehicles sold in 2019, China’s automobile market is the biggest in the world. With that, China accounts for 27.52% of the world’s CO2 emissions (Statista). To decrease that number, …


Mobike: Backpedaling Out Of India, Brant Schwendel, Madison Tumey, Madison Godwin, Lauren Lance, Rachel Pastoric, Ashley Reese, Caroline Phillips Aug 2021

Mobike: Backpedaling Out Of India, Brant Schwendel, Madison Tumey, Madison Godwin, Lauren Lance, Rachel Pastoric, Ashley Reese, Caroline Phillips

Symposium of Student Scholars

In the past few years, the bike-sharing industry has gained traction in large cities and suburban areas all over the world. Mobike, an app-based bike-sharing company founded in China in 2015, introduced a new, efficient and eco-friendly mode of travel for short commutes using smart bikes which are bikes with a motor that help assist the rider’s pedal-power. Bike-sharing has grown into a booming industry due to rapid urbanization, traffic congestion, and pollution problems. Mobike entered India in 2018 but faced many challenges. Since the takeover and expansion of Mobike, Meituan, the holding company, has suffered a loss of 4.6 …


Transfordming China With Electric Vehicles: An International Marketing Case Study, Jasmine Washington, Koran Baraka Aug 2021

Transfordming China With Electric Vehicles: An International Marketing Case Study, Jasmine Washington, Koran Baraka

Symposium of Student Scholars

TransFORDming China with Electric Vehicles: An International Marketing Case Study

Teyana Pryor, Koran Baraka, Kaleb Bell, Jasmine Washington,

Kyle King, Dylan Newman, and Bryce Lee

Abstract

Ford is a legendary automobile company established in the United States in 1903 by Henry Ford. Ford is a $1.35 million company worldwide with operations in 10 countries but it has experienced an annual drop of roughly eight percent in the last year (Wagner, 2020). Ford entered China’s automobile industry in 2004 when automobile sales totaled 215,60 vehicles (CEIC). In 2001, Due to the high level of pollution in the country and main cities, …


Restoring History: Mixed-Use Hotel & Retail Center, William Chase Sisk Aug 2021

Restoring History: Mixed-Use Hotel & Retail Center, William Chase Sisk

Symposium of Student Scholars

Monroe, Georgia, is a unique small town, located halfway between Athens and Atlanta. The small-town atmosphere and amenities have become a popular destination for people attracted to the historic buildings, downtown events and UGA football home games. Monroe is popular for its wedding venues, antique malls, and car shows, but there are not enough hotel rooms. Currently within the historic downtown, there are only one bed and breakfast, two AirBNB’s, and no hotels, although every downtown storefront is occupied by restaurants, retail stores, and businesses.

The need for overnight accommodations has raised the possibility of a new mixed-use hotel and …


Amazon: A Maze Through China - An International Marketing Case Study, Hanane Goubil Aug 2021

Amazon: A Maze Through China - An International Marketing Case Study, Hanane Goubil

Symposium of Student Scholars

Amazon is an e-commerce technology company best known for its fast delivering time and for being one of the tops of the big four technology companies in the United States. Despite its success in the U.S. and several countries abroad, it has struggled to succeed in China since 2004 where Alibaba and JD.com control 82% of the market. This is due to Amazon failing to compete with Alibaba and neglecting to acclimatize their online offers to appease Chinese customers’ preferences. An example of this is that Alibaba has its own payment system called Alipay, while Amazon had yet to include …


Market Research: How To Keep And Gain Customers, Chris Mccall Aug 2021

Market Research: How To Keep And Gain Customers, Chris Mccall

Symposium of Student Scholars

Customer-centered market research is essential to the creation and management of successful marketing campaigns. A company that understands their customers will be able to provide those customers with products and services that fit their needs better than the competition, and ultimately increase profits. My research focuses on a database containing customer information for a telecommunications company called Telco. Within this research, I will focus on a number of customer attributes including demographics, services provided, payment methods, contract lengths, monthly charges, and tenure with the company. Considering how these attributes relate to one another will give me a better understanding of …


Best Practices In Volunteer Management For Cherokee Family Violence Center, Andi Edwards Aug 2021

Best Practices In Volunteer Management For Cherokee Family Violence Center, Andi Edwards

Symposium of Student Scholars

Volunteer programs have long been utilized by the nonprofit sector to meet growing societal needs in a cost-effective manner. However, many organizations remain unaware or resistant to volunteer management protocols that could potentially increase agency capacity and reach. Based upon existing research, industry best practices, and organizational changes needed in light of COVID-19, this project evaluates the importance of effective volunteer management as a capacity building exercise for nonprofits. The data collected were used to develop a volunteer management manual for Cherokee Family Violence Center (CFVC), a domestic violence service agency in north metropolitan Atlanta.

The overarching research question examined …


A Journey Of Success: Italy’S Welcoming Of Jeep Into The Fiat Family, Madison Griffin Aug 2021

A Journey Of Success: Italy’S Welcoming Of Jeep Into The Fiat Family, Madison Griffin

Symposium of Student Scholars

The following Theory Application Paper examined the unique cultural acquisition of Jeep by the Italian automotive giant Fabbrica Italiana Automobili Torino (FIAT) Chrysler Automobiles. The CELM cultural analysis model (Gao, 2013) was used to examine the culture, business environment, consumer lifestyle and mentality that allowed an “All-American” vehicle to find a new home in the Italian market. The use of the CELM model gives an in depth look at the culture of Italian business practices and what drives Italian consumers to participate in the market. The ultimate purpose of this research was to acquire the knowledge of successful tactics used …


I. Using Social Media To Promote Awareness Of Hiv And Aids In Children: Education And Community Resources, Savannah Barnett Aug 2021

I. Using Social Media To Promote Awareness Of Hiv And Aids In Children: Education And Community Resources, Savannah Barnett

Symposium of Student Scholars

In this day and age, social media is critical to the success of a company whether it be for-profit or nonprofit. Eighty (80) percent of nonprofits use Facebook and 70 percent use Twitter worldwide which means that agencies who opt not to use social media are missing out on free to low-cost advertising and community engagement/ awareness (Domingues, Lopez, & Astudillo, 2016). No matter the business model or tax status, the way a company gains social media attention stays consistent in terms of what to post, how often, and the overall aesthetic and graphics that go along with the posts. …


The I-Mode (Almost) Went Global. A Case Study In Product Export Failure., Paola Rattu May 2021

The I-Mode (Almost) Went Global. A Case Study In Product Export Failure., Paola Rattu

Symposium of Student Scholars

The i-mode, the world’s first commercial web browser technology for mobile phones was launched in Japan in 1999, encountering immediate success and rapidly dominating the Japanese market. Nevertheless, when the technology was launched in the US and in Europe in the early 2000s it was highly unsuccessful. Ultimately, the technology was abandoned outside Japan, and several manufacturers exited the mobile phone industry following their inability to understand foreign customers’ needs and to innovate. This paper reconstructs the history of the i-mode technology and provides a business-oriented analysis of the causes of its debacle.