Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Physical Sciences and Mathematics

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 264

Full-Text Articles in Business

Obat Aborsi Cytotec Asli Wa 085875427775, Nia Diana Dec 2017

Obat Aborsi Cytotec Asli Wa 085875427775, Nia Diana

nia diana

READY STOCK !!! 
INFO PEMESANAN 
CALL / SMS /WA 
085875427775

Kami Menyediakan Macam - Macam Obat Haid Yang Sangat Ampuh Dan Terpercaya Tuntas. 

- Paket A ( Untuk Usia Maksimal 0-1Bulan ) 
Harga : Rp.500.000, - 
- Paket B ( Untuk Usia Maksimal 1-2Bulan ) 
Harga : Rp.800.000, - 
- Paket C ( Untuk Usia Maksimal 2-3 Bulan ) 
Harga : Rp.1.000.000, - 
- Paket D ( Untuk Usia maksimal 4-5 Bulan ) 
Harga : Rp.1.500.000 

DAPATKAN PRODUCT - PRODUCT ORIGINAL HANYA DI TOKO ONLINE KAMI PERCAYAKAN HANYA KAMI YANG TAU SOLUSI TEPAT UNTUK ANDA...!!!


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Getting Girls In Stem & The Dangers Of Forgetting That Science Is Art - Someone Made It Up, Heidi Therese Dangelmaier, Camilla Hermann Dec 2017

Getting Girls In Stem & The Dangers Of Forgetting That Science Is Art - Someone Made It Up, Heidi Therese Dangelmaier, Camilla Hermann

The STEAM Journal

Encouraging girls to participate in STEM is a hot topic that has captured the concern of the world’s academic, business and scientific communities. The intention is noble, however the strategies being deployed are reinforcing the very bias society seeks to eliminate. If we wish to advance our evolutionary journey as a species, a shift from “feeling sorry for disadvantaged girls” to “fearing STEM without girls’ reformation” is imperative. This piece discusses the rise to an initiative to redesign culture: Girlapproved.


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté Dec 2017

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf Dec 2017

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


Minerva 2017, The Honors College Dec 2017

Minerva 2017, The Honors College

Minerva

This issue of Minerva includes a feature on Honors College research collaboratives; an article on Honors students studying abroad in Singapore and Chile; an article reflecting upon the 15-year anniversary of the Honors College and the importance of mentorship; and articles on Honors students Isaiah Mansour and Aliya Uteova.


Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang Dec 2017

Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang

School of Professional Studies

Canines for Disabled Kids have been working on behalf of children and their families to educate communities and promote service dog partnerships for almost twenty years. Their advocacy with local legislatures, business owners, and community leaders highlighted the difficulties encountered when differentiating service dogs from emotional support/comfort dogs. Service dogs are entitled to access by the Americans with Disabilities Act (ADA), while emotional support/comfort dogs are not protected under the federal statute or to the same rights. Canines for Disabled Kids proposed a study to obtain a current count of licensed service dogs in the Commonwealth and investigate the feasibility …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Enterprise Social Media Use And Impact On Performance: The Role Of Workplace Integration And Positive Emotions, Murad Moqbel, Fiona Fui-Hoon Nah Dec 2017

Enterprise Social Media Use And Impact On Performance: The Role Of Workplace Integration And Positive Emotions, Murad Moqbel, Fiona Fui-Hoon Nah

Information Systems Faculty Publications and Presentations

Organizations struggle to find ways to improve employees’ performance. To date, little research has empirically examined the relationship between enterprise social media use and knowledge workers’ performance. Using social capital theory and the broaden-and-build theory of positive emotions as our theoretical framework, we investigate the relationship between enterprise social media use and knowledge workers’ performance. We tested our research model by collecting data from employees working for a large information technology firm in the Midwestern United States and analyzing the data using a structural equation modeling approach. The results suggest that enterprise social media use can increase workplace integration, which …


Base Faith, Stefano Harney, Fred Moten Dec 2017

Base Faith, Stefano Harney, Fred Moten

Research Collection Lee Kong Chian School Of Business

The earth moves against the world. And today the response of the world is clear. The world answers in fire and flood. The more the earth churns the more vicious the world’s response. But the earth still moves. Tonika Sealy Thompson might call it a procession. The earth’s procession is not on the world’s calendar. It is not a parade on a parade ground. It is not in the world’s teleology. Nor is the procession exactly a carnival played to mock or overturn this parade, to take over its grounds. A procession moves unmoved by the world. The earth’s procession …


High Consequence Scenarios For North Korean Atmospheric Nuclear Tests With Policy Recommendations For The U.S. Government, Thomas S. Popik, Jordan T. Kearns, George H. Baker Iii, Henry F. Cooper, William R. Harris Nov 2017

High Consequence Scenarios For North Korean Atmospheric Nuclear Tests With Policy Recommendations For The U.S. Government, Thomas S. Popik, Jordan T. Kearns, George H. Baker Iii, Henry F. Cooper, William R. Harris

Department of Integrated Science and Technology - Faculty Scholarship

The government of North Korea has declared high-altitude EMP-capability to be a “strategic goal” and has also threatened an atmospheric test of a hydrogen bomb. Atmospheric nuclear tests have the potential to cripple satellites and the undersea cable networks critical to communication, and navigation necessary for trans-Pacific trade among the U.S., China, and other nations. When a nuclear warhead is detonated at high altitude, a series of electromagnetic pulses radiate downward within the line of sight of the blast. These pulses can disable equipment with miniature electronics and long conductors. Electric grid controls and transmission systems are especially vulnerable. Intense …


Implementation Guidelines For Green Data Centres, Abdallah Tubaishat, Sara Sumaidaa Nov 2017

Implementation Guidelines For Green Data Centres, Abdallah Tubaishat, Sara Sumaidaa

All Works

Increased reliance on technology and online transactions has increased the heat generated in data centres, due to greater access, storage, aggregation and analysis of such data. This paper discusses the downsides of traditional data centres and highlights the importance of applying green IT practices. It explores the benefits and proposes guidelines on shifting to green data centres. The recommendations to go green are to: a) reduce energy by applying green IT practices, b) eliminate redundancies in server systems and cooling modules, c) turn on power management tools on servers and terminals when applicable, d) utilise newer technologies of power consumption …


Interpreting Main Effect With Moderation ‐‐ A View Through The Prism Of Causal Dissection, Xinshu Zhao Nov 2017

Interpreting Main Effect With Moderation ‐‐ A View Through The Prism Of Causal Dissection, Xinshu Zhao

Professor Xinshu ZHAO

In many disciplines of social sciences, it’s widely believed that main effect is uninterpretable when moderation exists. This research starts with an observation that four popular mode of data analysis, mediation, moderation,
curvilinearity, and confounding, all attempt to dissect an XY simple linear effect into various components.
Through this prism of theory, this research uncovers an important interpretation for the main effect, with or without moderation. The main effect, according to the theory of causal dissection, is a combination of two effects, namely on‐group effect and in‐group effect, while the in‐group effect is a weighted average of the XY effects …


The Santa Clara, 2017-11-16, Santa Clara University Nov 2017

The Santa Clara, 2017-11-16, Santa Clara University

The Santa Clara

No abstract provided.


Identifying Worldviews On Corporate Sustainability: A Content Analysis Of Corporate Sustainability Reports, Nancy E. Landrum, Brian M. Ohsowski Nov 2017

Identifying Worldviews On Corporate Sustainability: A Content Analysis Of Corporate Sustainability Reports, Nancy E. Landrum, Brian M. Ohsowski

School of Environmental Sustainability: Faculty Publications and Other Works

Companies commonly issue sustainability or corporate social responsibility (CSR) reports. This study seeks to understand worldviews of corporate sustainability, or the corporate message conveyed regarding what sustainability or CSR is and how to enact it. Content analysis of corporate sustainability reports is used to position each company report within stages of corporate sustainability. Results reveal that there are multiple coexisting worldviews of corporate sustainability, but the most dominant worldview is focused on the business case for sustainability, a position anchored in the weak sustainability paradigm. We contend that the business case and weak sustainability advanced in corporate sustainability reports and …


Evolution And Rationale For United States Department Of Defense Electromagnetic Pulse Protection Standard, George H. Baker Iii Nov 2017

Evolution And Rationale For United States Department Of Defense Electromagnetic Pulse Protection Standard, George H. Baker Iii

George H Baker

The United States (US) Department of Defense (DoD) Electromagnetic Pulse (EMP) protection standard offers a solid basis for protecting commercial communication, data, and control facilities. Because of the standard’s shielded barrier and test requirements, it is not surprising that there is a strong temptation within industry and government to dismiss the MIL-STD 188-125 approach in favor of less rigorous protection methods. It is important to understand that US DoD EMP protection standard for fixed facilities, MIL-STD-188-125, reflects an evolution by trial and error that spanned a period of decades beginning with the acquisition of the Minuteman Missile System in the …


Proposal For A Dod Combined Battlefield Electromagnetic Environmental Effects (E3) Initiative, George H. Baker Iii Nov 2017

Proposal For A Dod Combined Battlefield Electromagnetic Environmental Effects (E3) Initiative, George H. Baker Iii

George H Baker

The presentation emphasizes the growing importance of electromagnetic survivability and compatibility. Operation Desert Storm demonstrated the clear military advantage provided by sophisticated electronic weapon and communication systems. In addition, the offensive tactic of taking out the enemy's eyes and ears during the air war paid off, giving our military decisive air superiority. The lessons for the future are clear. High-tech electronics now so dominates the battlefield that the outcome of future conflicts could well be decided by electronics attrition rather than human casualties. Our Desert Storm experience thus accentuates the importance of guaranteeing that our electronic systems will not be …


The Santa Clara, 2017-11-09, Santa Clara University Nov 2017

The Santa Clara, 2017-11-09, Santa Clara University

The Santa Clara

No abstract provided.


Multi-Step Tokenization Of Automated Clearing House Payment Transactions, Privin Alexander Nov 2017

Multi-Step Tokenization Of Automated Clearing House Payment Transactions, Privin Alexander

USF Tampa Graduate Theses and Dissertations

Since its beginnings in 1974, the Automated Clearing House (ACH) network has grown into one of the largest, safest, and most efficient payment systems in the world. An ACH transaction is an electronic funds transfer between bank accounts using a batch processing system.

Currently, the ACH Network moves almost $43 trillion and 25 billion electronic financial transactions each year. With the increasing movement toward an electronic, interconnected and mobile infrastructure, it is critical that electronic payments work safely and efficiently for all users. ACH transactions carry sensitive data, such as a consumer's name, account number, tax identification number, account holder …


Testimony Of Dr. George H. Baker, Senior Advisor To The Congressional Emp Commission, George H. Baker Iii Nov 2017

Testimony Of Dr. George H. Baker, Senior Advisor To The Congressional Emp Commission, George H. Baker Iii

George H Baker

This is the script of testimony before the Federal Energy Regulatory Commission. It offers a vision for a future in which our electric power systems will be able to operate through or quickly recover from catastrophic failure due to electromagnetic pulse (EMP), cyber, and physical attacks. The scope of the term ‘EMP’ used in this testimony includes both naturally occurring solar storms and the more energetic man-made EMP hazards. The vision has been discussed with members of the electric power industry, and prominent EMP/cyber/physical protection advocates who find it to be supportable and actionable. The nature of EMP, cyber, and …


Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju Nov 2017

Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju

Patient Experience Journal

This research explores why patients give perfect domain scores yet provide negative comments on surveys. In order to explore this phenomenon, vendor-supplied in-patient survey data from eleven different hospitals of a major U.S. health care system were utilized. The dataset included survey scores and comments from 56,900 patients, collected from January 2015 through October 2016. Of the total number of responses, 30,485 (54%) contained at least one comment. For our analysis, we use a two-step approach: a quantitative analysis on the domain scores augmented by a qualitative text analysis of patients’ comments. To focus the research, we start by building …


The Santa Clara, 2017-11-02, Santa Clara University Nov 2017

The Santa Clara, 2017-11-02, Santa Clara University

The Santa Clara

No abstract provided.


Informing Responders Using Gis And Gps, Deidre Mccarthy Oct 2017

Informing Responders Using Gis And Gps, Deidre Mccarthy

CHAR

Hurricane Katrina devastated the Gulf Coast in August 2005 and created the single largest disaster for cultural resources that the United States has witnessed since the inception of the National Historic Preservation Act (NHPA) in 1966. Notably, the NHPA created the National Register of Historic Places, our nation’s catalog of important cultural resources. The NHPA also stipulates that any federal undertaking which may adversely affect National Register eligible resources be mitigated. For the Federal Emergency Management Agency (FEMA), Katrina created the largest compliance project ever under Section 106 of the NHPA.

Although causing a great deal of damage, Katrina also …


Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft Oct 2017

Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft

CHAR

This talk is concerned with the science and impacts of climate change from global to New York scales. It will provide an assessment of how the climate has changed over the past Century based on a purely observational perspective. The scientific basis for anthroprogenic climate change will be explained and discussed including a description of the “greenhouse effect” and why it is important for life on this planet. We will briefly discuss global and local consequences of a warmer climate and what we need to be prepared for going forward in the coming decades.