Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 222

Full-Text Articles in Business

Power Dressing And Its Importance In Modern Democracy, Mansiben R. Patel, Dr. Catherine Amoroso Leslie Mar 2023

Power Dressing And Its Importance In Modern Democracy, Mansiben R. Patel, Dr. Catherine Amoroso Leslie

Undergraduate Research Journal for the Human Sciences

This research aimed to study the significance of Power Dressing in a modern democracy, by exploring the dynamics of clothing concerning the power it portrays for women holding influential positions in public office in a variety of countries throughout the world. This research accomplished its motive by collecting, reviewing, and analyzing scholarly articles, academic journals, newspapers, and current events which formed the foundation for data collection using a survey developed by the researchers. The analysis provided a platform for procuring knowledge of the association between Fashion and Politics, the concept of Women’s Power Dressing, and its significance in a modern …


Power Dressing And Its Importance In Modern Democracy, Mansiben R. Patel, Dr. Catherine Amoroso Leslie Mar 2023

Power Dressing And Its Importance In Modern Democracy, Mansiben R. Patel, Dr. Catherine Amoroso Leslie

Undergraduate Research Journal for the Human Sciences

This research aimed to study the significance of Power Dressing in a modern democracy, by exploring the dynamics of clothing concerning the power it portrays for women holding influential positions in public office in a variety of countries throughout the world. This research accomplished its motive by collecting, reviewing, and analyzing scholarly articles, academic journals, newspapers, and current events which formed the foundation for data collection using a survey developed by the researchers. The analysis provided a platform for procuring knowledge of the association between Fashion and Politics, the concept of Women’s Power Dressing, and its significance in a modern …


The Understanding Of Mycorrhizae Networks: A Historical Approach, Jake Sun May 2022

The Understanding Of Mycorrhizae Networks: A Historical Approach, Jake Sun

The Confluence

The growth of mycorrhizal fungi into plant roots used to be viewed as a parasitic relationship between plants and fungi, where the fungal symbiont benefits and the plant host is harmed. Current research elucidates a mutualistic relationship. The mycorrhizae network assists the plants by increasing the capabilities for nutrient absorption in the soil. In exchange, the fungi receive carbon supply from the photosynthetic plants for growth. Our scientific understanding of other topics like species specificity, seed germination, and co-evolutionary influence of mycorrhizae and plants has also progressed. Additionally, we now understand that the mycorrhizal mutualism is not limited to the …


Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga Aug 2021

Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga

The African Journal of Information Systems

This paper contemporizes evolving information security (IS) governance practices during the coronavirus pandemic (Covid-19) in South Africa. Using post-structuralism as a lens, we offer distinct insights regarding how information systems and technologies are evolving and the impact they present to the governance of IS systems during intermittent lockdowns. An online self-administered questionnaire was designed and distributed using Google forms to elicit data around evolution. A link was emailed to 160 respondents fitting pre-defined criteria. Data was exported to a statistical analysis software for analysis. Our results present an important relationship between technology evolutions and IS threats and that changes in …


The History And Evolution Of The Market For ‘Delebs’ (Dead Celebrities), Denver D'Rozario, Guang Yang Dec 2019

The History And Evolution Of The Market For ‘Delebs’ (Dead Celebrities), Denver D'Rozario, Guang Yang

Atlantic Marketing Journal

In this paper, we survey the history behind the growing market for dead celebrities (‘Delebs’) in their role of creating secondary brand associations. According to some estimates, this market is now worth $2.25 billion in annual licensing and royalty revenues (CBC 2013). We begin, by defining key terms that are used in this market. Next, we do a survey and analysis of the major events that have given rise (intentionally or unintentionally) to this market. For ease of discussion, we discuss these historical events grouped by era. We follow this with a summary of the major events and trends that …


Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii Jan 2015

Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii

Communications of the IIMA

Union membership has undergone a dramatic decline and some have hailed the internet as a means for unions to reverse their membership declines. This study examines the usability of union websites. The content of union websites has been analyzed, but the usefulness of that content, and the overall usability of the websites, has not been assessed. In order for unions to fully utilize the internet and realize the potential benefits of cyberspace usage, they must provide websites that users find easy to use and that provide useful content. This study employs Hassan and Li's (2005) benchmarking approach in order to …


Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau Jan 2015

Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau

Communications of the IIMA

The establishment of an organizational help desk (HD) is to provide technical support to users when they encounter technical problems related to hardware, software and network connections. Due to the lack of resources, users often have to wait for a considerably long time before their enquiries and problems are answered and solved. This paper discusses the background of HD and its existing challenges. The application of Knowledge Management (KM) techniques and Knowledge Management System (KMS) enables HD to manage its knowledge effectively. In addition, the combination is capable of relieving the overloaded HD by shifting some of the troubleshooting responsibilities …


Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart Jan 2015

Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart

Communications of the IIMA

The rapid evolution of information technology over the past several decades has opened many new and unique modes of communication. Clearly, the web is one such technology. However, it is quite possible that a fascination with the technology per se can hinder participants from one of its main functions— effective communication. The following essay explores a return to the basics of designing an effective web-based communication strategy. The key components of this strategy are: 1) consistent look and feel, 2) conceptual consistency, and 3) positive attention.


Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas Jan 2015

Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas

Communications of the IIMA

Suppose that a project consists of n separate tasks and one and only one task can be completed in one time period. However, since some tasks can be started only before others have been completed, only feasible task schedules are considered. There is a cost associated with the time at which a task is completed and the project cost is equal to the sum of all the task costs. How can a feasible task schedule with minimum project cost be found for completing the entire project? This research proposes using a genetic algorithm to solve this problem efficiently.


Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre Jan 2015

Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre

Communications of the IIMA

As online security threats continue to spread, protecting valuable data becomes one of the security challenges businesses face in today's business-to-customer (B2C) and business-to-business (B2B) ecommerce. Biometrics technology shows increased promise in enterprise network security. It will play a vital role as system developers fortify the security apparatus of its organization. In this paper, we analyze biometrics technologies and describe techniques that can be utilized to decrease the probabilities of online attacks.


Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette Jan 2015

Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette

Communications of the IIMA

The purpose of this paper is to detail the barriers to the integration of technology in US school systems. The harriers experienced by both individual teachers and to school systems as a whole are discussed. Student barriers, such as computer skill levels or poverty, are also discussed. In addition, this paper explains how technology should be used and the measurable benefits of doing so. Measurable benefits reported in the literature include increased performance on measures of reading comprehension, writing, components of IQ, transfer to novel tasks, and grade point average. Closing comments focus on how technology integration must be an …


Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan Jan 2015

Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan

Communications of the IIMA

VoIP is a relatively new technology. Current research suggests that firms are using VoIP technology to cut costs, to improve productivity, and the firm's strategic position. The literature is rich with "how to " articles and a discussion ofpossible benefits, costs, and implementation barriers. But, very few academic studies exist. The purpose of this study is to identify and present the issues related to VoIP adoption and implementation.


An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young Jan 2015

An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young

Communications of the IIMA

The Web is becoming more important for communication andfor data access. Unfortunately, not all Web sites are accessible for all users. Web accessibility is concerned with overcoming the barriers that users with disabilities face when they try to access information on Web sites. Currently, for disabled users, the Web presents many barriers that make it dijfiult to use. These barriers can be addressed by organizational commitment and by improved development techniques. This paper examines how Web accessibility standards and legal mandates are affecting the design of corporate and governmental Web sites, and how the rate of adoption can be improved …


Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom Jan 2015

Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom

Communications of the IIMA

Much has been written about the failure of software development projects. The importance of good software to business cannot be underestimated. A major issue is quality of the software being written and produced. Over the years, the emphasis for improvement in software development has been to change the process. Unified Modeling Language is but one of a long line of changes in software development process starting with structured programming introduced in the seventies to object oriented programming in nineties. However, several software development experts have begun to assert that the problem may not be with the process employed but rather …


To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson Jan 2015

To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson

Communications of the IIMA

The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum.


Competing Next Generation Wireless Technologies, Warren Adis Jan 2015

Competing Next Generation Wireless Technologies, Warren Adis

Communications of the IIMA

Wireless computing is facing a choice concerning the next telecommunication standard. Two of the new and competing protocol standards for local area and personal networking are 802.1 In and Ultra Wide Band. Each one has its own strengths and weaknesses and both will change wireless networking by dramatically increasing the transmission speed, the QoS and the security of the broadcast. Yet decisions have to be made about which protocol to adopt. The choice rests on a deeper understanding of each protocol, its evolution, compatibility and future direction. This paper analyzes these two competing protocols, discussing their performance and probability for …


Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson Jan 2015

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson

Communications of the IIMA

Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.


The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris Jan 2015

The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris

Communications of the IIMA

This manuscript examines the evolution of internet value systems in the motion control industry. We believe the primary reason behind the inconsistent performance of that industry's adoption of the internet in the supply channel was largely due to poor strategy. Using a the concepts of bias exchanges and game theory it is suggested that intemet strategies such as disintermediation and first-mover advantage were elusive because firms focused too much on technology and not enough on customer value. Lessons for managers and future decisions are offered.


The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen Jan 2015

The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen

Communications of the IIMA

A company named Syscom was recently acquired by another company, Matcom. Both companies were focused on software development in similar markets, however, the Management Information Systems (MIS) decisions made by each company have resulted in significant differences as to how employees go about the business of developing, selling and supporting software. This paper highlights how Information Systems (IS) decisions made at these two companies enabled different ways for people to work together along with affecting various aspects of business operations and team communications. In addition, this paper presents issues with the integration of Syscom with the Matcom IS structure as …


The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan Jan 2015

The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan

Communications of the IIMA

This pilot project was designed to evaluate study abroad participants' degree of homesickness and use of communication channels, specifically telephone and email. A questionnaire was developed to assess several dimensions involved with studying abroad, including degree of culture shock and homesickness, and frequency and methods of communicating home. Respondents were 14 study abroad participants from a medium-sized southern university, including 4 males and 10 females. Based on the findings of this study, homesickness and degree of culture shock were related as measured by the items of strain, helpless, missing, accepted, escape, and shock. As hypothesized, students who reported being homesick …


The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia Jan 2015

The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia

Communications of the IIMA

With the recent advances in telecommunications networking and teleconferencing software, small companies can become more cost competitive by outsourcing appropriate functions to lower wage countries. Ad-Station Systems is a startup media advertising company that provides a number of online and off-line advertising services. The online product offering requires support and programming. It was decided to evaluate whether these functions could be provided from a foreign location. An industrial dynamics model indicated that this is a viable option. The processes were designed and documented, and are described here.


A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke Jan 2015

A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke

Communications of the IIMA

There are a variety of models, methods and tools to help organizations manage defects found in the development of software. Defect tracking and processing must be integrated in the project life cycle and the testing process for software. This paper reviews a number of defect models and proposes the Full Life Cycle Defect Process model to manage defects that supports defect, project, and test processes. We describe the various states in our model and provide examples of various scenarios and paths through the model.


Leaders And Leadership: A Corpus-Based Approach For Evaluating The Evolution Of Leadership, William S. Lightfoot, Mounir Kehal Jan 2015

Leaders And Leadership: A Corpus-Based Approach For Evaluating The Evolution Of Leadership, William S. Lightfoot, Mounir Kehal

Communications of the IIMA

Much has been written about leaders and leadership, managers and management. The terms are often used interchangeably, (see http://thesaurus.reference.com). With rapid changes in technology, and the spread of capitalism, networks which use English as the common language are flourishing. Many authors have written about the affects this has had on management and leadership and the differences between the two. This paper reviews common definitions of leadership, explores some of the key concepts associated with the transition from the industrial to the information age, and the evolution of the terminology of leadership, and then reviews the results of a preliminary research …


Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr. Dec 2014

Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr.

Communications of the IIMA

In an effort to understand content, its taxonomy and management, we define content management as the process of managing the creation, categorization, delivery and archiving of content in which workflow and business processes are maximized. Built upon what industry experts have to offer about enterprise content taxonomy, we have enacted a framework to better understand, create and manage enterprise taxonomies. This framework will be able to integrate rich content, modern computing technology, advanced analytics, automated worlflow, business requirements and human resources into a process where companies can easily manage their information for decision making and gaining competitive advantages.


An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot Dec 2014

An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot

Communications of the IIMA

Technology has improved to the point where web-sites for every course taught by an instructor are possible. This has produced many instructional benefits; however, it has also created a new set of problems. The problem addressed by this paper is the question of which web-site components to include in the class web-site. This is important because different web components support different student learning styles. Because it is not feasible to include all known webcomponents, the instructor must select those components that are most useful and support the broadest group of students. To address this question, a survey instrument was developed …


Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez Dec 2014

Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez

Communications of the IIMA

The explosion in information technology in the last 20 years, and in particular, data communications networks, has had a major impact on ethical thinking and ethical issues. This has been manifested in the recent accounting and business scandals, as it is becoming apparent that the ethical dimensions of information systems-related business decisions cannot be safely ignored. It is important for business educators to introduce students to relevant ethical situations that they may face in the business world. This paper discusses the Information Systems ethical environment and students performance on business ethics cases in a telecommunications course. The results of this …


Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno Dec 2014

Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno

Communications of the IIMA

On-line courses have become an important component of the delivery of courses in all areas of education. The validity of online delivery is challenged if Web students perform poorly in subsequent major courses. This paper investigates the effect of mode of delivery and other factors on the level of success, failure, potential, and limitations of web delivery in course sequences. This study was conducted on a two-course sequence in the Computer Information Systems Department at Metropolitan State College of Denver. The result of this research identifies important factors impacting student success in this two course sequence.


A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken Dec 2014

A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken

Communications of the IIMA

This paper reports on a longitudinal pedagogical study of performance and perceptions of 1021 students in 39 online and 25 face-to-face sections of seven different courses taught by six different professors. The differences between the students' perceptions of the quality of the instructors and student performance are statistically significant based on the mode of course delivery. Students rated the quality of instructors in the online courses higher for the duration of the study. Student grade averages are slightly lower in the online courses. For all of the other survey questions dealing with the evaluation of the courses and the instructors, …


The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl Dec 2014

The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl

Communications of the IIMA

One of the most pressing questions that governments and societies have to answer is how to develop the infrastructure of the expected information society. In this paper I will take a look at two archetypical positions: at a state-oriented and a market-oriented view. I will recount the arguments for both sides in order to then demonstrate that all of these arguments are in fact derivatives of the older discussion about state versus market that has been with us at least since Marx. I will then try to show that these arguments are based on metaphysical assumptions about the nature of …


An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery Dec 2014

An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery

Communications of the IIMA

This study is an exploratory investigation into whether different leaning styles predict performance in an online course. Students enrolled in several cohorts of an accredited MBA program were surveyed with regard to their learning styles and those styles were correlated with the grades earned in the course. The program is unique in that the entire program could be completed online.