Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Conference

2022

Articles 1 - 22 of 22

Full-Text Articles in Business

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger Dec 2022

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger

Symposium of Student Scholars

Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …


Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa Nov 2022

Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa

Symposium of Student Scholars

Many undergraduate students are not familiar with the research process involved in a book publication proposal. Through this multidisciplinary collaborative research, the faculty intends to minimize this gap by engaging the students in such a process from the early phase of proposal preparation. The student will research and review the past five years of EQUINOX Week* programs focused on Sustainable Development Goals within a collection of local and global initiatives to support a proposal for the EQUINOX proceeding publication.

With an extensive set of qualitative and quantitative data gathered over a span of 5 years. The student will be …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk Nov 2022

Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper attempts to discover the reasons behind the increase in cybercrime in developing nations over the past two decades. It discusses many examples and cases of projects to increase internet access in developing countries and how they enabled cybercrime. This paper examines how nations where many cybercrimes occurred, did not have the necessary resources or neglected to react appropriately. The other primary focus is how cybercrimes are not viewed the same as other crimes in many of these countries and how this perception allows cybercriminals to do as they please with no stigma from their neighbors. It concludes that …


Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk Nov 2022

Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

The beginning of the 21st century has had a drastic effect on the video game industry. The advent of almost universal Internet access, the release of inexpensive broadband-enabled consoles, and the availability of mobile gaming have led to game developers and publishers heavily relying on premium in-game currencies, exclusive paid items, and loot boxes to subsidize or even replace profits from traditional video game business models. By 2020, in-game purchases made up a market of $92.6B worldwide and, in the US, experienced growth of over 30%.[1] In this highly lucrative market, the legal and ethical landscape is constantly bubbling with …


Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk Nov 2022

Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk

KSU Proceedings on Cybersecurity Education, Research and Practice

Researchers are paying closer attention to the rise of disinformation on social media platforms and what responsibility, if any, the companies that control these platforms have for false information being spread on their websites. In this paper, we highlight the recent growth in concern regarding online disinformation, discuss other works regarding the use of social media as a tool for spreading disinformation, and discuss how coordinated disinformation campaigns on social media platforms are used to spread propaganda and lies about current political events. We also evaluate the reactions of social media platforms in combatting disinformation and the difficulty in policing …


Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard Nov 2022

Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

This study implemented an expert panel to assess the content validity of hypothetical scenarios to be used in a survey of cybersecurity risk across project meta-phases. Six out of 10 experts solicited completed the expert panel exercise. Results indicate that although experts often disagreed with each other and on the expected mapping of scenario to project meta-phase, the experts generally found risk present in the scenarios and across all three project meta-phases, as hypothesized.


Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li Nov 2022

Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li

KSU Proceedings on Cybersecurity Education, Research and Practice

Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study includes a three-phased developmental approach in developing the Remote Worker Cyberslacking Security Risk Taxonomy. With feedback from cybersecurity …


Nids In Airgapped Lans--Does It Matter?, Winston Messer Nov 2022

Nids In Airgapped Lans--Does It Matter?, Winston Messer

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents an assessment of the methods and benefits of adding network intrusion detection systems (NIDS) to certain high-security airgapped isolated local area networks. The proposed network architecture was empirically tested via a series of simulated network attacks on a virtualized network. The results show an improvement of double the chances of an analyst receiving a specific, appropriately-severe alert when NIDS is implemented alongside host-based measures when compared to host-based measures alone. Further, the inclusion of NIDS increased the likelihood of the analyst receiving a high-severity alert in response to the simulated attack attempt by four times when compared …


What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson Nov 2022

What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson

KSU Proceedings on Cybersecurity Education, Research and Practice

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability of distinguishing deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …


Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar Nov 2022

Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar

KSU Proceedings on Cybersecurity Education, Research and Practice

Since 2004, Kennesaw State University, Georgia, has hosted an academic conference. Over the years, the event has brought together hundreds of faculty and students from throughout the U.S., sharing research into pedagogical efforts and instructional innovations. Initially, the conference was named the Information Security Curriculum Development conference and served as KSU’s contribution to engage our colleagues in growing security education from its infancy. It was paired with KSU’s inaugural security education journal, the Information Security Education Journal. In 2016, the event was rebranded as the Conference on Cybersecurity Education, Research, and Practice to reflect both an expansion of topics suitable …


Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt Aug 2022

Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt

African Conference on Information Systems and Technology

With the growing popularity of Work-From-Home (WFH) organizations have been required to adapt their ‘ways of working’ strategies to the ‘new normal’, as both employees and organizations aim to reap the benefits of WFH. This has resulted in organizations and their leadership teams needing to create WFH strategies for their organizations. With many of these WFH strategies developed in isolation of all stakeholders, with the feasibility of these WFH strategies remain uncertain. Therefore, this research task has reviewed literature to develop a conceptual model that describes how leadership teams can make informed feasible WFH strategy decisions, through the concept of …


Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi Aug 2022

Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi

African Conference on Information Systems and Technology

Inclusive design in information and communication technology (ICT) is the development of information and communication technology artifacts that are accessible and easy to use for as many people as possible. Human diversities must be considered when producing these inclusive design artifacts. It is not only important for abled people but also extends to people with disabilities, the elderly and anybody challenged with using these artifacts. Yet, few designers and developers adopt inclusive design methodologies in their practice. This study seeks to identify and understand the factors that influence the implementation of inclusive design practices in organisations. The methodology was based …


The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda Aug 2022

The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda

African Conference on Information Systems and Technology

Banks need to remain competitive in the ever-changing business environment. Millennials are one of the largest customer segments with a large digital and mobile appetite; as a result, they form a natural target for banks. To increase their customer base, banks need to ensure that their customer experience strategy caters for these young customers in accordance with their expectations. This study explores factors that influence customer experience in mobile banking and how this experience influences customer loyalty to their bank. This study used a mixed-methods strategy and collected data from 344 mobile banking users via an online survey questionnaire and …


Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen Aug 2022

Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen

African Conference on Information Systems and Technology

Lack of access to technologies and quality data are key challenges for reducing the digital divide and developing digital citizens to support Smart City initiatives. This paper reviews efforts towards Smart Cities and access to smart technology and Open Data in developed economies globally and in South Africa. Reviews of literature and websites were conducted and the Qualitative Content Analysis method was used to analyse the data. The contributions are the commonalities and differences between Smart City initiatives in developed economies and in South Africa. The findings revealed that in developed countries the focus was mainly on e-services, citizen engagement, …


Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua Aug 2022

Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua

African Conference on Information Systems and Technology

This paper synthesised the literature on the adoption of Information and Communication Technology within Africa. The purpose was to determine factors (reported by the literature) determining technology adoption and use, in Africa. The paper used the systematic literature review. The study analysed the factors descriptively. Based on the analysis, the following are the main five factors reported to affect the adoption and use of Information Technology in Africa: Lack of ICT knowledge, unreliable infrastructure, high cost of adoption, the perceived usefulness of ICT, and the perceived ease of use. The government and technology implementing organisation has the key role to …


College Students' Energy Drink Consumption And Sponsor Recall, Daniel Sewell, Kyu-Soo Chung Apr 2022

College Students' Energy Drink Consumption And Sponsor Recall, Daniel Sewell, Kyu-Soo Chung

Symposium of Student Scholars

Energy drink companies like Red Bull, Monster, Bang, Reign and Celsius annually invest millions of dollars to sponsor a variety of athletes and events across numerous sports. These vast investments raise the question: Which partnerships, sponsorships or activities ultimately make an impact on society and attract new consumers? It is imperative to dissect the factors that impact consumer decisions to purchase specific products in order to more efficiently allocate resources. This research has the potential to aid companies in unearthing decision making patterns of college students regarding energy drink purchases and how these beverages are utilized. The purpose of this …


Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker Apr 2022

Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker

Symposium of Student Scholars

The business college’s new 3D lab, launched in August 2021, has been providing 3D design and 3D printing workshops for core business classes, specifically IS 2200 and IS 3100, to allow students to experiment with additive manufacturing, more commonly known as 3D printing. In the age of digital transformation, it is more important than ever that business school graduates are exposed to these emerging technologies, learn from experimentation, and develop a foundational understanding of these technologies so that they are better prepared to innovate and lead once they have graduated.

The idea of the 3D printing workshops is that a …


Branding, Internationalization And Performance Of Restaurant Chains, Saarthak Bhatia, Joel Smith Apr 2022

Branding, Internationalization And Performance Of Restaurant Chains, Saarthak Bhatia, Joel Smith

Symposium of Student Scholars

Every year, restaurant companies try and find new and innovative ways to grow their business. Many companies look towards creating new brands and expanding internationally as a means of achieving this goal but do multibranding and the scope of internationalization (number of countries) have an influence on the firm performance of restaurant companies? We dive into this by looking at data from over 100 publicly traded companies to see what the results show.

The examination period for this study was 1997 to 2019. Data for 2013-2019 is still being collected. Sample selection started with 118 publicly traded restaurant firms listed …


Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane Mar 2022

Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane

Transforming Libraries for Graduate Students

For a variety of reasons, some graduate students ultimately determine that they would like to pursue a career outside of the ivory tower. At the same time, these scholars may be uncertain about how to translate their expertise into a nonacademic position. At Cornell University, a partnership between the Management Library and the Careers Beyond Academia office has allowed librarians to utilize their unique expertise to assist graduate students throughout their job search.

At the Management Library, business librarians have historically worked with the Career Management Center of the Johnson Graduate School of Management to assist MBA and graduate business …


Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs. Mar 2022

Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs.

Transforming Libraries for Graduate Students

Athens State University is located in Athens, Alabama in the northern part of Alabama bordering Giles County, Tennessee. It is one of the only upper-level universities serving juniors, seniors, and graduate students in the country. The student body consists primarily of non-traditional and first-generation students. In 2014, Athens State University was approved to offer a graduate program in Global Logistics and Supply Chain Management in the College of Business by the Alabama Commission on Higher Education (ACHE). Since then, Athens State University has expanded its graduate offerings to include five additional fields of study: Strategic Healthcare Management and Administration, Strategic …


Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly Feb 2022

Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly

Transforming Libraries for Graduate Students

This poster outlines strategies for creating a support system for online graduate students learning new software. The Northcentral University (NCU) Library is a 100 percent online library providing services and delivering resources to students in a remote context. According to university facts and figures, approximately 98 percent of students are enrolled in a graduate program and nearly 69 percent of those students are pursuing a doctoral degree. In May 2019, a reference and instruction librarian developed a program to support graduate students learning how to use ProQuest RefWorks, a web-based research management tool. Elements of the program include synchronous options …