Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 2190

Full-Text Articles in Business

Collaborative Quizzes – Applications In Introductory Level Accounting, Wayne Singular Feb 2019

Collaborative Quizzes – Applications In Introductory Level Accounting, Wayne Singular

Teaching Practices Colloquium

Collaborative Quizzes – Applications in Introductory Level Accounting Courses by Wayne Singular, MBA, CPA, CMA, School of Business & Economics, Thompson Rivers University At Thompson Rivers University, two introductory level accounting courses are mandatory requirements for all students in the Bachelor of Business Administration (“BBA”) Accounting program. In these courses, pre-exam review classes are often very repetitive, challenging to maintain student engagement and often it is difficult to determine the exact needs of preparing students for an upcoming individual exam. Over the last several years, I have introduced a series of low-grade percentage collaborative quizzes to improve participation and engagement during these ...


Dos And Don'ts Of Data Science, Ryan Burton Feb 2019

Dos And Don'ts Of Data Science, Ryan Burton

SDSU Data Science Symposium

In an ideal world, we avoid all mistakes in our work. Some mistakes are preventable and others are unavoidable. A few common mistakes in data science that can be minimized include assuming correlation implies causation, modeling with an unrepresentative sample, and focusing on the mean without understanding the distribution. This talk will give an overview of some of the simple yet common mistakes in data science and guidance on how to avoid them.


Arts Organizations And Accountability, Anna Bernadska Nov 2018

Arts Organizations And Accountability, Anna Bernadska

Faculty Research and Creative Activities Symposium

No abstract provided.


Females Serving As The Head Coach Of Competitive Elite Male Sports, Christian Hensley Nov 2018

Females Serving As The Head Coach Of Competitive Elite Male Sports, Christian Hensley

Posters-at-the-Capitol

Student-athletes’ Perceptions of females serving as the head coach of competitive elite male sports

Recent coaching employment of Becky Hammon and Kathryn Smith in the NBA and NFL inspires the discussion of the potential of witnessing the first female head coach hired in men’s professional basketball and football. Despite the presence of female leaders in many business and political realms, there still seems to be lack of gender equality in the employment of female administrators and coaches in the male dominant sports. This study investigate how women were perceived as an ideal head coach candidate in a male dominant ...


Paying It Forward: Who Does This?, Elizabeth C. Alexander, Charles Braun Nov 2018

Paying It Forward: Who Does This?, Elizabeth C. Alexander, Charles Braun

Faculty Research Day

Paying it forward experiences sometimes make the news when an exceptionally long line of drive through customers decide to utilize upstream reciprocity, aka Pay It Forward (PIF), as in an example from December of 2012 at the Tim Horton’s in Winnipeg when 226 customers each individually paid for the order of the customer behind them in line (Tsvetkova and Macy 2014). But in most cases, the experience involves far fewer customers and is much less newsworthy. Nevertheless, paying it forward is a phenomenon that warrants investigating to understand the moti vations and attributes that contribute to the activity, possibly ...


Sustainability & Entrepreneurship Manufacturing In Distressed West Virginia Counties, Margie J. Phillips Nov 2018

Sustainability & Entrepreneurship Manufacturing In Distressed West Virginia Counties, Margie J. Phillips

Faculty Research Day

This project will identify and define the economic challenges faced by distressed counties in West Virginia regarding sustainable and entrepreneurship manufacturing. In addition, one historic model will be examined as to their successes and past challenges.Large scale manufacturing, once a mainstay in the state’s economy has been and is on a steady decline in West Virginia. Even when manufacturing was a viable component of the state’s economy, it was concentrated, for the most part in populated areas. Rural areas, lacking the necessary infrastructure for robust manufacturing, was stuck in a perpetual distressed condition with only the production ...


Understanding Facebook Privacy Behaviors: An Integrated Model, Nancy K. Lankton, D. Harrison Mcknight, John Tripp Nov 2018

Understanding Facebook Privacy Behaviors: An Integrated Model, Nancy K. Lankton, D. Harrison Mcknight, John Tripp

Faculty Research Day

Privacy in online social networking (OSN) is more complex than in traditional online environments such as e-commerce. In addition to simply limiting self-disclosure, OSN users can also use privacy settings and manage their network size to ensure privacy. This complexity calls for an enhanced OSN privacy model that more completely explains privacy behaviors. Combining the Privacy Calculus model with part of the Uses and Gratifications approach, this study proposes an OSN privacy model that depicts both antecedents (i.e., privacy concern, trusting beliefs, and personal interest) and outcomes (i.e., gratifications obtained) of perceived privacy and use behaviors. Using an ...


Real-Time Nowcasting Of Short-Run Of The Euro-Dollar Exchange Rate With Economic Fundamentals: Does The Measure Of Money Supply Matter?, Boniface Yemba, Michael Otunuga Nov 2018

Real-Time Nowcasting Of Short-Run Of The Euro-Dollar Exchange Rate With Economic Fundamentals: Does The Measure Of Money Supply Matter?, Boniface Yemba, Michael Otunuga

Faculty Research Day

This paper proposes a fundamental-monetary-based econometric model with mixed frequency data to now caste the Euro-Dollar short run exchange rate. We use the exact amount of information that are available to researchers or police makers at the time of prediction of exchange rate. The spot exchange rate information are available at week basis while other macroeconomic data like money supply, in action, industrial production, and interest rate are available at monthly basis. Since the monetary model consists of stable money demand functions (Bianco, 2012), not all the measure of money supply guaranties a stable money demand. Barnett (1978, 1980) has ...


An Analysis Of The Sale Of Contracts By The Athletics After The 1914 Season, Jeffrey Archambault, Marie E. Archambault Nov 2018

An Analysis Of The Sale Of Contracts By The Athletics After The 1914 Season, Jeffrey Archambault, Marie E. Archambault

Faculty Research Day

The Philadelphia Athletics lost the 1914 World Series to the Boston Braves, being swept in four games. The Athletics had been favored to win the Series over the Braves, who had been in last place as late as the Fourth of July. After the season, Connie Mack, the owner/manager, sold many of the best players for the Athletics. The sale of athletes is often attributed to financial pressures caused by the Federal League, which hired several star players at relatively high salaries and began play in 1914. Perhaps the sales were part of an effort to rebuild the team ...


Conditional Cash Transfer And Girl Child Survival In India, Nabaneeta Biswas Nov 2018

Conditional Cash Transfer And Girl Child Survival In India, Nabaneeta Biswas

Faculty Research Day

This paper examines the impact of a conditional cash transfer (CCT) program on girls’ early childhood survival in India. With a view to improve sex ratios and alleviate the status of girls, the Government of India launched the Dhan Lakshmi financial incentive scheme in 2008 in select districts of seven states. The program offers financial benefits to parents for raising daughters. Using district-level data from a large household survey, we analyze the program’s effect on sex ratios in the state of Punjab, which reports one of the most skewed sex ratios in the country. Results indicate a positive impact ...


Gis Application In Economic Analyses: Using Aid Effectiveness In Sub-Saharan Africa As An Example, Yi Duan Nov 2018

Gis Application In Economic Analyses: Using Aid Effectiveness In Sub-Saharan Africa As An Example, Yi Duan

Faculty Research Day

Geographic Information Systems (GIS) techniques provide invaluable tools in analyzing spatial patterns in economics. Different selections of spatial data layers enable spatial analyses for specific projects or tasks. Using a project on foreign aid effectiveness in sub-Saharan Africa as an example, this presentation shows that detailed aid effectiveness patterns at local level can be revealed using the cutting-edge GIS techniques and spatial analytic skills, which were largely neglected by the previous literature of aid effectiveness at country level. Overcoming the “aggregation bias”, this project finds that aid targeted at local level tends to promote local economic growth, while aid targeted ...


Using Omnichannel Sales Data Analytics To Decide Between Store And Distribution Center Fulfillment Options, Jingran Zhang, Sanchoy Das Nov 2018

Using Omnichannel Sales Data Analytics To Decide Between Store And Distribution Center Fulfillment Options, Jingran Zhang, Sanchoy Das

Faculty Research Day

A brick-and-mortar retailer can fulfill online customer orders in two ways (i) Buy Online Fulfill from Store (BOFS) - Picked from store inventory, and (ii) Fulfill from Distribution Center (FDC) - Picked from DC or warehouse inventory. The fulfillment decision is made in real time for each order, with the primary goal of maximizing the revenue value of the store inventory. Analysis of sales data in both online and store channels is used to forecast the value of the dispersed inventory, and then develop a prescriptive model for making a fulfillment decision.


Changes In Business Core & Accounting Course Requirements: Aacsb Influences, Marie Archambault, Jeffrey Archambault, Jean Price Nov 2018

Changes In Business Core & Accounting Course Requirements: Aacsb Influences, Marie Archambault, Jeffrey Archambault, Jean Price

Faculty Research Day

This study explores the business core requirements and accounting program requirements of universities accredited by the Association to Advance Collegiate Schools of Business International (AACSB) and those without such accreditation during both 1996/97 and 2012/13 academic years. The sample of 50 universities consists of 25 with AACSB accreditation and 25 without AACSB accreditation during the 1996/97 academic year. Differences are examined in the courses and credit hours required in various courses between the two types of universities as well as changes in these programs between the two time periods. The changes that have occurred between 1996/97 ...


Does An Information Technology Investment Contribute To Company Performance: A Further Examination Of The Productivity Paradox, Marc Sollosy, Rick Weible Nov 2018

Does An Information Technology Investment Contribute To Company Performance: A Further Examination Of The Productivity Paradox, Marc Sollosy, Rick Weible

Faculty Research Day

This article continues the discussion examining IT’s contribution on firm performance. Byrnjolfsson (1993) identified what is known as the “productivity paradox” and posited a number of reasons for it. Carr (2003) added fuel by suggesting IT is ubiquitous and provides no significant firm advantage. This study does identify that industry type and size matters. Utilizing the position of CIO, or similar, as a proxy for IT emphasis, the study finds that non-IT intensive organizations, with annual sales less than $101 million do achieve performance advantages over firms without an IT emphasis. The implication being that the debate is far ...


Implications Of Upcoding On Medicare Fraud, Alberto Coustasse, Katrina Cremeans, Carli Followay, Jessica Oldaker Nov 2018

Implications Of Upcoding On Medicare Fraud, Alberto Coustasse, Katrina Cremeans, Carli Followay, Jessica Oldaker

Faculty Research Day

The complexity of and quantity of funds involved in Medicare reimbursements have led to a significant increase in the number of Medicare fraud. A particular kind of Medicare fraud, upcoding, has contributed to excessive and avoidable health care spending. Upcoding has been an illegal tactic that some providers have used to increase their Medicare reimbursement for specific medical conditions. This is accomplished by coding a provided service as a more expensive service than what was performed. With the proliferation of upcoding, there has been an unprecedented $12.5 billion in fraudulent Medicare charges. While solving the problem of upcoding will ...


Are Critical Audit Matters Useful To Investors? The Group Lease Example, Parporn Akathaporn, Nancy K. Lankton, Charles Stivason Nov 2018

Are Critical Audit Matters Useful To Investors? The Group Lease Example, Parporn Akathaporn, Nancy K. Lankton, Charles Stivason

Faculty Research Day

Critical Audit Matters (CAMs) are a part of the new auditor’s report required by the PCAOB under Auditing Standard (AS) 3101: The Auditor’s Report on an Audit of Financial Statements When the Auditor Expresses an Unqualified Opinion. AS 3101 was issued in 2017 and becomes effective for certain public companies in 2019. Under AS 3101, CAMs are any matter arising from the audit of the financial statements that was communicated to the audit committee, and that are of material significance and involve subjective or complex auditor judgment. CAMs are expected to improve transparency to investors and those charged ...


Cryptocurrencies: Myth Vs. Reality, Sarina Baldoni Nov 2018

Cryptocurrencies: Myth Vs. Reality, Sarina Baldoni

Shared Knowledge Conference

Valuing the market of cryptocurrencies has raised both excitement and fear in popular discussion, with concerns about its legitimacy heatedly debated across the financial world. The cryptocurrency market has grown to 2,042 separate currencies, and despite rampant speculation about the future, current research provides little insight to a market approaching $217 billion in market capitalization. The purpose of this research is to examine how the 67 largest cryptocurrencies by market capitalization respond to events, determine if cryptocurrencies behave individually or as a collective asset class, and what factors influence cryptocurrency valuation. On January 16, 2018, the price of Bitcoin ...


Viability Of Zero-Based Budgeting Methods In The City Of Albuquerque, Justin P. O'Shea Nov 2018

Viability Of Zero-Based Budgeting Methods In The City Of Albuquerque, Justin P. O'Shea

Shared Knowledge Conference

This project’s objective is to study and propose an alternative budgeting method for use by the City of Albuquerque’s municipal government. Zero-base budgeting (ZBB) is a modern government budgeting process that allocates funds starting from a base of zero for operating units and requires annual justification of all resource and service items in the budget. Although traditional ZBB is rare in practice, local and state governments in the United States are starting to utilize elements of ZBB and are incorporating ZBB methods into their current budgeting process. Interannual variability in economic standing and resultant municipal revenues has prompted ...


Of Expectations And Experiences: 
The Moderating Effect Of Valenced Expectations On Enjoyment Of A Positive Vs. Negative Experience, Molly C. Mcgehee Nov 2018

Of Expectations And Experiences: 
The Moderating Effect Of Valenced Expectations On Enjoyment Of A Positive Vs. Negative Experience, Molly C. Mcgehee

Shared Knowledge Conference

Some extant literature argues that expectations drive enjoyment of experiences, while other literature argues that expectations only comparatively influence enjoyment. The current work addresses this discrepancy and demonstrates that while positive expectations do result in favorable enjoyment of experiences, negative expectations result in the comparative process suggested by others.


Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport Nov 2018

Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport

Shared Knowledge Conference

This research project identifies a plan to study best practices addressing unlawful workplace harassment and discrimination in New Mexico-based hospital healthcare systems. Initially, this project focusses on Presbyterian Healthcare Services and the University of New Mexico Hospital, with the possibility of including other local healthcare systems. In light of recent developments from “#MeToo” and “Time’s Up” movements, the issues of unlawful sexual harassment and discrimination are hot topics in today’s society and need to be more openly addressed by all levels of an organization, in order to identify these issues head-on and hopefully prevent them from continuing to ...


The Impact Of Terrorism On Consumer Sentiment: Evidence From Twitter Data, Kyla Scanlon Nov 2018

The Impact Of Terrorism On Consumer Sentiment: Evidence From Twitter Data, Kyla Scanlon

Posters-at-the-Capitol

This paper investigates the effects that 12 different terrorist attacks had on consumer sentiment, using data scraped from Twitter to determine a broad based emotional stance. This was inspired by my previous research that worked to determine the impact that terrorism had on the stock market. The goal of this research is to determine a more qualitative impact of terrorist attacks. I utilized Rapid Miner for data processing, and the Global Terrorism Database as my data source. The project began by examining the rise and fall of keywords and hashtags through sentiment analysis to measure reaction over time. The text ...


Strategies For Small U.S. Manufacturers To Defend Home Markets From International Competition, Gabrielle Chan Nov 2018

Strategies For Small U.S. Manufacturers To Defend Home Markets From International Competition, Gabrielle Chan

Georgia Undergraduate Research Conference (GURC)

The existing research on small U.S. manufacturing firms is limited to strategies to grow internally with focus on human resource and financial strategies, but there is little information regarding how the firms can defend themselves from competition. With the rise of globalization, firms have to compete on an international level while trying to protect their home market. Large firms have more resources such as wealth and capital to conduct international research and strategize to compete with global competition, but small domestic firms have less resources to dedicate to protection of their business.This research focuses on providing managers of ...


The State Of The Video Game Industry And Potential Implications Of Current Business Practices, Stephen Friend Nov 2018

The State Of The Video Game Industry And Potential Implications Of Current Business Practices, Stephen Friend

Georgia Undergraduate Research Conference (GURC)

The State of the Video Game Industry and Potential Implications of Current Business Practices

Stephen J. Friend - Stephenfri89@gmail.com

  • Student at South Georgia State University

Abstract

This study aims to highlight the state of the video game industry by examining “AAA” (triple A) development studios and publishing companies and their business structure along with their implementation of microtransactions and other monetary schemes. The fiscal returnings and statistic quarterly updates provided by GameIndustry.biz, GameRant, and Newzoo show companies such as Ubisoft and Electronic Arts(EA) are making more than 51% of their annual income from microtransactions. In conjunction, the ...


Training Employees To Stay: T&D In Retaining Talent, Megan M. Waite, Troi N. Robinson-Moss, Sydney M. Kopelic, Shawn Bergman Oct 2018

Training Employees To Stay: T&D In Retaining Talent, Megan M. Waite, Troi N. Robinson-Moss, Sydney M. Kopelic, Shawn Bergman

River Cities Industrial and Organizational Psychology Conference

The employee-driven market and “war for talent” demand organizations be increasingly competitive in maintaining the best workforce possible. Furthermore, factors such as millennial “job hopping,” employees leaving because of fears of layoffs and downsizing, and exiting the company without documenting valuable knowledge are all reasons to seek methods to decrease turnover. Organizations can use strategic and evidence-based training and development (T&D) practices to retain talent and prevent the loss of institutional knowledge. This session will discuss how T&D can be used to reduce involuntary turnover in organizations and cover how self-paced training, error management training (EMT), and the ...


Organizational Alignment Through Leadership Proficiency And Human System Interventions, Kristin Weger, Raeshaun Jones, Lisa Matsuyama, Michael Buford, Jarielle Prince, Sarah Rose Stough Oct 2018

Organizational Alignment Through Leadership Proficiency And Human System Interventions, Kristin Weger, Raeshaun Jones, Lisa Matsuyama, Michael Buford, Jarielle Prince, Sarah Rose Stough

River Cities Industrial and Organizational Psychology Conference

Across many organizations, agencies and programs have been tasked with building, training, and retaining the workforce needed. Yet, only few organizations have succeeded in their efforts by creating a culture in which workforce preferences align and overarching leadership support is provided. Such a cultural transformation requires not only a behavioral shift from employees, but especially from those in leadership positions, in order to break from the typical way that organizations have long encouraged them to behave. Although the importance of leadership has been emphasized in previous literature, no consistent description of leadership attributes or promising application of human system interventions ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...