Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Conference

Discipline
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 345

Full-Text Articles in Business

Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard Nov 2022

Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

This study implemented an expert panel to assess the content validity of hypothetical scenarios to be used in a survey of cybersecurity risk across project meta-phases. Six out of 10 experts solicited completed the expert panel exercise. Results indicate that although experts often disagreed with each other and on the expected mapping of scenario to project meta-phase, the experts generally found risk present in the scenarios and across all three project meta-phases, as hypothesized.


Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li Nov 2022

Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li

KSU Proceedings on Cybersecurity Education, Research and Practice

Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study includes a three-phased developmental approach in developing the Remote Worker Cyberslacking Security Risk Taxonomy. With feedback from cybersecurity …


Nids In Airgapped Lans--Does It Matter?, Winston Messer Nov 2022

Nids In Airgapped Lans--Does It Matter?, Winston Messer

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents an assessment of the methods and benefits of adding network intrusion detection systems (NIDS) to certain high-security airgapped isolated local area networks. The proposed network architecture was empirically tested via a series of simulated network attacks on a virtualized network. The results show an improvement of double the chances of an analyst receiving a specific, appropriately-severe alert when NIDS is implemented alongside host-based measures when compared to host-based measures alone. Further, the inclusion of NIDS increased the likelihood of the analyst receiving a high-severity alert in response to the simulated attack attempt by four times when compared …


What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson Nov 2022

What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson

KSU Proceedings on Cybersecurity Education, Research and Practice

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability of distinguishing deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …


Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar Nov 2022

Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar

KSU Proceedings on Cybersecurity Education, Research and Practice

Since 2004, Kennesaw State University, Georgia, has hosted an academic conference. Over the years, the event has brought together hundreds of faculty and students from throughout the U.S., sharing research into pedagogical efforts and instructional innovations. Initially, the conference was named the Information Security Curriculum Development conference and served as KSU’s contribution to engage our colleagues in growing security education from its infancy. It was paired with KSU’s inaugural security education journal, the Information Security Education Journal. In 2016, the event was rebranded as the Conference on Cybersecurity Education, Research, and Practice to reflect both an expansion of topics suitable …


Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt Aug 2022

Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt

African Conference on Information Systems and Technology

With the growing popularity of Work-From-Home (WFH) organizations have been required to adapt their ‘ways of working’ strategies to the ‘new normal’, as both employees and organizations aim to reap the benefits of WFH. This has resulted in organizations and their leadership teams needing to create WFH strategies for their organizations. With many of these WFH strategies developed in isolation of all stakeholders, with the feasibility of these WFH strategies remain uncertain. Therefore, this research task has reviewed literature to develop a conceptual model that describes how leadership teams can make informed feasible WFH strategy decisions, through the concept of …


Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi Aug 2022

Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi

African Conference on Information Systems and Technology

Inclusive design in information and communication technology (ICT) is the development of information and communication technology artifacts that are accessible and easy to use for as many people as possible. Human diversities must be considered when producing these inclusive design artifacts. It is not only important for abled people but also extends to people with disabilities, the elderly and anybody challenged with using these artifacts. Yet, few designers and developers adopt inclusive design methodologies in their practice. This study seeks to identify and understand the factors that influence the implementation of inclusive design practices in organisations. The methodology was based …


The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda Aug 2022

The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda

African Conference on Information Systems and Technology

Banks need to remain competitive in the ever-changing business environment. Millennials are one of the largest customer segments with a large digital and mobile appetite; as a result, they form a natural target for banks. To increase their customer base, banks need to ensure that their customer experience strategy caters for these young customers in accordance with their expectations. This study explores factors that influence customer experience in mobile banking and how this experience influences customer loyalty to their bank. This study used a mixed-methods strategy and collected data from 344 mobile banking users via an online survey questionnaire and …


Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen Aug 2022

Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen

African Conference on Information Systems and Technology

Lack of access to technologies and quality data are key challenges for reducing the digital divide and developing digital citizens to support Smart City initiatives. This paper reviews efforts towards Smart Cities and access to smart technology and Open Data in developed economies globally and in South Africa. Reviews of literature and websites were conducted and the Qualitative Content Analysis method was used to analyse the data. The contributions are the commonalities and differences between Smart City initiatives in developed economies and in South Africa. The findings revealed that in developed countries the focus was mainly on e-services, citizen engagement, …


Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua Aug 2022

Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua

African Conference on Information Systems and Technology

This paper synthesised the literature on the adoption of Information and Communication Technology within Africa. The purpose was to determine factors (reported by the literature) determining technology adoption and use, in Africa. The paper used the systematic literature review. The study analysed the factors descriptively. Based on the analysis, the following are the main five factors reported to affect the adoption and use of Information Technology in Africa: Lack of ICT knowledge, unreliable infrastructure, high cost of adoption, the perceived usefulness of ICT, and the perceived ease of use. The government and technology implementing organisation has the key role to …


College Students' Energy Drink Consumption And Sponsor Recall, Daniel Sewell, Kyu-Soo Chung Apr 2022

College Students' Energy Drink Consumption And Sponsor Recall, Daniel Sewell, Kyu-Soo Chung

Symposium of Student Scholars

Energy drink companies like Red Bull, Monster, Bang, Reign and Celsius annually invest millions of dollars to sponsor a variety of athletes and events across numerous sports. These vast investments raise the question: Which partnerships, sponsorships or activities ultimately make an impact on society and attract new consumers? It is imperative to dissect the factors that impact consumer decisions to purchase specific products in order to more efficiently allocate resources. This research has the potential to aid companies in unearthing decision making patterns of college students regarding energy drink purchases and how these beverages are utilized. The purpose of this …


Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker Apr 2022

Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker

Symposium of Student Scholars

The business college’s new 3D lab, launched in August 2021, has been providing 3D design and 3D printing workshops for core business classes, specifically IS 2200 and IS 3100, to allow students to experiment with additive manufacturing, more commonly known as 3D printing. In the age of digital transformation, it is more important than ever that business school graduates are exposed to these emerging technologies, learn from experimentation, and develop a foundational understanding of these technologies so that they are better prepared to innovate and lead once they have graduated.

The idea of the 3D printing workshops is that a …


Branding, Internationalization And Performance Of Restaurant Chains, Saarthak Bhatia, Joel Smith Apr 2022

Branding, Internationalization And Performance Of Restaurant Chains, Saarthak Bhatia, Joel Smith

Symposium of Student Scholars

Every year, restaurant companies try and find new and innovative ways to grow their business. Many companies look towards creating new brands and expanding internationally as a means of achieving this goal but do multibranding and the scope of internationalization (number of countries) have an influence on the firm performance of restaurant companies? We dive into this by looking at data from over 100 publicly traded companies to see what the results show.

The examination period for this study was 1997 to 2019. Data for 2013-2019 is still being collected. Sample selection started with 118 publicly traded restaurant firms listed …


Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane Mar 2022

Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane

Transforming Libraries for Graduate Students

For a variety of reasons, some graduate students ultimately determine that they would like to pursue a career outside of the ivory tower. At the same time, these scholars may be uncertain about how to translate their expertise into a nonacademic position. At Cornell University, a partnership between the Management Library and the Careers Beyond Academia office has allowed librarians to utilize their unique expertise to assist graduate students throughout their job search.

At the Management Library, business librarians have historically worked with the Career Management Center of the Johnson Graduate School of Management to assist MBA and graduate business …


Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs. Mar 2022

Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs.

Transforming Libraries for Graduate Students

Athens State University is located in Athens, Alabama in the northern part of Alabama bordering Giles County, Tennessee. It is one of the only upper-level universities serving juniors, seniors, and graduate students in the country. The student body consists primarily of non-traditional and first-generation students. In 2014, Athens State University was approved to offer a graduate program in Global Logistics and Supply Chain Management in the College of Business by the Alabama Commission on Higher Education (ACHE). Since then, Athens State University has expanded its graduate offerings to include five additional fields of study: Strategic Healthcare Management and Administration, Strategic …


Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly Feb 2022

Creating A Support System For Online Graduate Students Learning New Software, Marisha C. Kelly

Transforming Libraries for Graduate Students

This poster outlines strategies for creating a support system for online graduate students learning new software. The Northcentral University (NCU) Library is a 100 percent online library providing services and delivering resources to students in a remote context. According to university facts and figures, approximately 98 percent of students are enrolled in a graduate program and nearly 69 percent of those students are pursuing a doctoral degree. In May 2019, a reference and instruction librarian developed a program to support graduate students learning how to use ProQuest RefWorks, a web-based research management tool. Elements of the program include synchronous options …


Components Of An Effective Grant Proposal, Leonine Greaves Nov 2021

Components Of An Effective Grant Proposal, Leonine Greaves

Symposium of Student Scholars

United Way of Greater Atlanta is seeking to start a homeless initiative in Cherokee County, Georgia. For the initiation of any program or service, it requires a stream of funding. In the case of nonprofit organizations, grant funding is a source of revenue to support those services and programs. Grant funding is acquired by submitting a grant proposal to a funder through an application process meeting their requirements. This project identifies key components that all grant proposals should possess when pursuing grant funding. These key components were found by searching and analyzing peer-reviewed scholarly literature that details the nature and …


Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan Oct 2021

Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan

KSU Proceedings on Cybersecurity Education, Research and Practice

The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …


Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz Oct 2021

Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.

This paper will describe and explain the concept of cyber resiliency. It will then evaluate …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar Oct 2021

Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …


Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim Oct 2021

Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim

KSU Proceedings on Cybersecurity Education, Research and Practice

Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].

However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …


A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo Oct 2021

A Taxonomy Of Cyberattacks Against Critical Infrastructure, Miloslava Plachkinova, Ace Vo

KSU Proceedings on Cybersecurity Education, Research and Practice

The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber, physical, and cyber-physical components of any cyber-physical system (suitable target), and security (capable guardian). The focus of the study is to develop and evaluate the classification tool using Design Science Research (DSR) methodology. Publicly available data was used to evaluate the utility and usability of the proposed artifact by exploring three possible scenarios – Stuxnet, …


From Delhi To Mumbai, Apple Seeks A Bigger Slice Of The Pie, Taylor Greer, Brent Cassidy, Mike Williams, Nick Hill, Chandler Burger, Adam Pedraza, Steven Wehde, Caleb Fortney Aug 2021

From Delhi To Mumbai, Apple Seeks A Bigger Slice Of The Pie, Taylor Greer, Brent Cassidy, Mike Williams, Nick Hill, Chandler Burger, Adam Pedraza, Steven Wehde, Caleb Fortney

Symposium of Student Scholars

From Delhi to Mumbai, Apple Seeks a Bigger Slice of The Pie in India:

An International Marketing Case Study

Mike Williams, Adam Pedraza, Taylor Greer, Brent Cassidy, Nick Hill, Chandler Burger, Steven Wehde, and Caleb Fortney

Abstract

Apple Inc., headquartered in the United States, is the world’s largest technology company with revenues of $265 billion as of 2018 (Johnson, 2012). Apple has been trying to compete in India’s smartphone market, the world’s fastest-growing and second-largest smartphone market globally, accounting for nearly 30 million purchases per quarter (Sheth, 2019). Despite its success in the U.S., Apple has not been able to …


Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Eric Jacobs, Miguel Pereira, Savannah Rubio Aug 2021

Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Eric Jacobs, Miguel Pereira, Savannah Rubio

Symposium of Student Scholars

Mobike’s Bike-Share Battle in India: An International Marketing Case Study

Amber Cranston, Savannah Rubio, Sam Kroll, Austin Tudor, Eric Jacobs, Evan Coulter, and Miguel Pereira

Abstract

Mobike, the world’s first cashless and station-free bicycle service, launched in Shanghai in 2016 and now operates in over 19 countries including India (Khanna, 2017). Growing urbanization has led to increasing traffic congestion and pollution in most large cities around the world. Recently, there have been increasing calls for more sustainable transportation methods and one solution that is becoming popular is bike-sharing. The global bike ride-sharing market is projected to be worth around $8.6 …


Zara: Facing Fast Fashion Challenges In China. An International Marketing Case Study, Daniela Schaich Graniel, Alexxus Finnell, Caitlin Hopkins, Candace Salters, Elimay Baez, Larissa Hernandez, Madison Mcintyre, Raven Lee Aug 2021

Zara: Facing Fast Fashion Challenges In China. An International Marketing Case Study, Daniela Schaich Graniel, Alexxus Finnell, Caitlin Hopkins, Candace Salters, Elimay Baez, Larissa Hernandez, Madison Mcintyre, Raven Lee

Symposium of Student Scholars

Zara, one of the largest international fashion companies, was founded in Spain in 1974. It has a brand value of $18.4 billion and global revenues of $ 28.22 billion in 2018. Zara entered China in 2006 to compete in its $5.58 billion fast fashion market (Ge, 2018). China is an attractive emerging market with a GDP of $13.6 trillion, growing at 5.9% (World Bank, 2019). Zara’s fast fashion typically appeals to young college students and the middle class with income ranging from $7,250 to $62,500, representing about 39% of the population (Cyrill, 2019). In China, Zara targeted young women entering …


Finding Similar Stocks By Detecting Cliques In Market Graphs, Sudhashree Sayenju Aug 2021

Finding Similar Stocks By Detecting Cliques In Market Graphs, Sudhashree Sayenju

Symposium of Student Scholars

The stock market provides an abundant source of data. However, when the amount of raw data becomes overwhelming it grows increasingly difficult to know how the stocks interact with each other. Stock data visualization as a market graph serves as one of the most popular way of summarizing important information. When modelling the data as a graph, vertices correspond to stocks and edges correspond to strong correlation in their pricing in a certain period of time. This project presents a technique to find stocks that behave very similarly. Such information helps investors make decisions on which stocks to purchase next. …


Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Savannah Rubio, Miguel Pereira Aug 2021

Mobike’S Bike-Share Battle In India, Amber Cranston, Sam Kroll, Evan Coulter, Austin Tudor, Savannah Rubio, Miguel Pereira

Symposium of Student Scholars

Mobike’s Bike-Share Battle in India: An International Marketing Case Study

Amber Cranston, Savannah Rubio, Sam Kroll, Austin Tudor, Eric Jacobs, Evan Coulter, and Miguel Pereira

Abstract

Mobike, the world’s first cashless and station-free bicycle service, launched in Shanghai in 2016 and now operates in over 19 countries including India (Khanna, 2017). Growing urbanization has led to increasing traffic congestion and pollution in most large cities around the world. Recently, there have been increasing calls for more sustainable transportation methods and one solution that is becoming popular is bike-sharing. The global bike ride-sharing market is projected to be worth around $8.6 …


How Can Apple Be More Fruitful In India, Isabella Bertolani, Amani Elchaar, Kamari Davis, Lawrence Ofili, Michal Kardacz, Nakia Abdul, Pamela Diaz, Zack Mcpherson Aug 2021

How Can Apple Be More Fruitful In India, Isabella Bertolani, Amani Elchaar, Kamari Davis, Lawrence Ofili, Michal Kardacz, Nakia Abdul, Pamela Diaz, Zack Mcpherson

Symposium of Student Scholars

Abstract

How Apple Can become Fruitful in India: An International Marketing Case Study

Izzy Bertolani, Pamela Diaz, Zack McPherson, Amani Elchaar, Michal Kardacz, Kamari Davis, Nakia Abdul, and Lawrence Ofili

Apple, founded by Steve Jobs and Steve Wozniak in the United States in 1976, is a $91.8 billion, leading global technology company with 61% of revenue coming from international sales (“Apple Reports,”2020). Apple markets its iPhones in 26 countries and entered India with its iPhone 4 in 2011 (“The 15 coolest”2019). India is an attractive emerging market with a 1.37 billion population, $280 billion GDP, 5% growth rate, and a …


Ev’S Leading In China, Ford Is A Few Cars Behind, Jacob Murfin, Katie Mccombs, Tyler Lehman, Hayden Harrison, David Whitehead, Chris Sterling, Brianna Vangordon Aug 2021

Ev’S Leading In China, Ford Is A Few Cars Behind, Jacob Murfin, Katie Mccombs, Tyler Lehman, Hayden Harrison, David Whitehead, Chris Sterling, Brianna Vangordon

Symposium of Student Scholars

As the world is looking at sustainable energy sources, electric vehicles are likely to be a big part of the perceived future. China has 18.47% of the world’s population, is one of the highest emitters of carbon dioxide, and is the world’s largest market for electric vehicles (Country Meters). China’s GDP was USD 13.608 trillion in 2018 and is expected to increase substantially in coming years (Wang, 2019). With 25 million vehicles sold in 2019, China’s automobile market is the biggest in the world. With that, China accounts for 27.52% of the world’s CO2 emissions (Statista). To decrease that number, …