Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (24)
- Technology and Innovation (20)
- Social and Behavioral Sciences (17)
- Computer Engineering (14)
- Engineering (14)
-
- Business Intelligence (13)
- Science and Technology Studies (13)
- Communication (12)
- Computer and Systems Architecture (12)
- Communication Technology and New Media (11)
- Digital Communications and Networking (11)
- Management Sciences and Quantitative Methods (10)
- Data Storage Systems (9)
- Information Literacy (9)
- Library and Information Science (9)
- Business Administration, Management, and Operations (8)
- E-Commerce (8)
- Operational Research (8)
- Operations Research, Systems Engineering and Industrial Engineering (8)
- Business Analytics (7)
- Social Media (7)
- Education (4)
- Business and Corporate Communications (3)
- Human Resources Management (3)
- Medicine and Health Sciences (3)
- Physical Sciences and Mathematics (3)
- Computer Sciences (2)
- Entrepreneurial and Small Business Operations (2)
- Finance and Financial Management (2)
- Keyword
-
- Blockchain (3)
- ToC (3)
- Financial (2)
- Q2S (2)
- 3D Food Printing (1)
-
- 3D printing (1)
- ACUE (1)
- AI (1)
- Academic integrity (1)
- Accidents (1)
- Accountability (1)
- Active Listening (1)
- Additive Manufacturing (1)
- Adoption factor (1)
- Adoption model. (1)
- Agenda (1)
- Agility (1)
- American cultural style (1)
- And VFT (1)
- Appreciative Inquiry (1)
- Artificial neural network (1)
- Attributional ambiguity (1)
- Attributions (1)
- Authentication (1)
- Authorization (1)
- BPM maturity (1)
- Baldrige (1)
- Banking (1)
- Benevolent sexism (1)
- Bias (1)
- Publication
- Publication Type
Articles 1 - 30 of 44
Full-Text Articles in Business
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Electronic Theses, Projects, and Dissertations
With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.
The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …
Online Strategies For Small Businesses Affected By Covid-19: A Social Media And Social Commerce Approach, Julianne Itliong
Online Strategies For Small Businesses Affected By Covid-19: A Social Media And Social Commerce Approach, Julianne Itliong
Electronic Theses, Projects, and Dissertations
The Covid-19 pandemic has altered the way many US citizens work, live, and interact with one another. Many rules and regulations have been put in place by government officials to slow the spread of the virus because of how contagious it is in social settings. Because of these rules and regulations, many small businesses were forced to temporarily close their doors to the public in order to comply with the rules of social distancing and the ban on large gatherings. For some businesses, this shift from physical sales to digital sales has always been a part of their business models, …
Bpm Maturity And Digital Leadership: An Exploratory Study, Joyce Van Ee, Ibtissam El Attoti, Pascal Ravesteyn, Benny M.E. De Waal
Bpm Maturity And Digital Leadership: An Exploratory Study, Joyce Van Ee, Ibtissam El Attoti, Pascal Ravesteyn, Benny M.E. De Waal
Communications of the IIMA
When organizations start to digitize, this often means that processes will be changed. The management paradigm that is centered on the continues review and improvement of organizational processes is Business Process Management (BPM). To digitize processes, an organization should have the right competences to deal with both technological and process changes. However, currently, it is not known which competences are needed by leaders to guide an organization with digital process transformation initiatives. Hence, this paper consists of an explorative study based on interviews with five experts to find out if and how the competences related to digital leadership can guide …
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar
Electronic Theses, Projects, and Dissertations
Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …
Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi
Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi
Electronic Theses, Projects, and Dissertations
Suicide is one of the leading health concerns in United States among adolescents and the presence of suicidal ideation (SI) is quite high, with ~20-30% of adolescents reporting it at some point. Though we have seen growth and development in the prevention of suicide, there is limited research on the ability to identify the adolescents which might be at risk for SI. The objective behind the project is to identify adolescents with SI using machine learning.
The project shows statistics from different articles on adolescents in the U.S. For this study, adolescent data was taken from NSDUH 2018. Moreover, detailed …
Working Women’S Cognitive Attributions And Self-Perceptions After Experiences Of Subtle Sexism And Internalized Sexism, Amanda Bain
Electronic Theses, Projects, and Dissertations
Subtle sexism is a pervasive problem for working women due to the normative, unequal and ambiguous treatment they experience. The ambiguous nature further exacerbates the experience because women are unsure where to place causal attribution and often times are left blaming themselves. Similarly, internalized sexism is rooted in the same limiting beliefs of traditional female stereotypes as subtle sexism. Both experiences and internalized sexism hinder working women’s cognitive internal attributions and their self-perceptions of value and competence. Subtle sexism and internalized sexism can be particularly damaging because they are hard to recognize as negative and thus, when never remedied, can …
Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon
Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon
Electronic Theses, Projects, and Dissertations
Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …
Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams
Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams
Electronic Theses, Projects, and Dissertations
This culminating experience project explores geofencing as a potential risk and advantageous tool within the field of cybersecurity. Geofencing is defined here as a software program feature that allows its users to collect and deliver data within a specific targeted geographical area. Currently used applications are addressed from a cybersecurity mindset by applying the hacker methodology to demonstrate the potential threat. Additionally, geofencing is applied to the NIST Cybersecurity Framework to demonstrate potential benefits for cyber defence. Finally, vulnerabilities associated with applying geofencing to cyber defense, and its potential implications on privacy and cybersecurity laws is discussed and recommendations for …
Preventing Ransomware Within Local Government Agencies: A Public Policy Analysis Perspective, Bruce Cole
Preventing Ransomware Within Local Government Agencies: A Public Policy Analysis Perspective, Bruce Cole
Electronic Theses, Projects, and Dissertations
Cases of ransomware within local government agencies have become prevalent over the last decade. While solutions to ransomware are available, local government agencies are slow to implement such measures. As a result, local government agencies are among the most famous victims of ransomware. This project attempts to provide an answer for ransomware prevention within these agencies from a public policy perspective. To formulate this answer, the issues local governments face in combating ransomware are compared to the solutions implemented in the private sector. This project then analyzes the mechanisms local governments have at their disposal to implement such solutions through …
Getting To The Heart Of Professional Development And Employee Engagement Among Non-Teaching Personnel In Higher Education: An Appreciative Inquiry Into The Influential Role Of A Staff Development Center, Rowena Casis-Woidyla
Electronic Theses, Projects, and Dissertations
Despite the importance and incorporation of staff development in higher education, there is limited research on the availability and use of learning opportunities for non-teaching personnel (NTP) in the form of professional development. Work performed by NTP in higher education is critical to university operations. Without professional development and engagement opportunities, NTP lack visibility, disengage and ultimately may separate from institutions of higher education. Deliberate organizational efforts to provide access to new learning opportunities and promote personal growth among NTP is the development and institutionalization of centers for professional development, also called staff development centers and staff training and professional …
Investigating Work Engagement And Affective Commitment Through A Multi-Dimensional Work Underload Scale, Mediated By Work-Related Boredom, Jessica Clemons
Investigating Work Engagement And Affective Commitment Through A Multi-Dimensional Work Underload Scale, Mediated By Work-Related Boredom, Jessica Clemons
Electronic Theses, Projects, and Dissertations
Previous research on workload has primarily approached work underload as unidimensional focusing on either repetitive monotonous tasks or the employee’s perception of their current workload. Researchers have focused on work related outcomes, such as job engagement and organizational commitment, as consequences of those perceptions. Recently, work related boredom has been measured alongside work underload as precursors to aforementioned outcomes. In the current study we investigated if a recently developed, more complex, multidimensional scale of work underload, including desire for more work and expectation of more work, would better explain the relationship between perceived work underload, and work-related boredom, job engagement, …
Communication Competence Training Within Minority-Owned Small Businesses, Shirleena Racine Baggett
Communication Competence Training Within Minority-Owned Small Businesses, Shirleena Racine Baggett
Electronic Theses, Projects, and Dissertations
Business ownership is imperative in correcting economic issues for demographic groups subjugated to discrimination, inequality, poverty, and other harmful disadvantages. This project supports the idea that building communication competence within minority-owned small businesses and nonprofit organizations, will significantly increase achievement of long-term sustainability and success. The solution is not only creating communication training tailored for minority entrepreneurs, but to allow access in feasible and tangible ways. This study begins by defining communication and explaining its function to assist in moving past the narrative of communication interaction as “talking and listening,” but instead a concept rooted in logic, theoretical analysis, and …
The Implementation Of Eportfolios As A High Impact Practice In The Real Estate Practice Class, Yu Liu
The Implementation Of Eportfolios As A High Impact Practice In The Real Estate Practice Class, Yu Liu
Q2S Enhancing Pedagogy
I would like to implement the ePortfolio to my Fin 481 Real Estate Practice course. Real Estate Practice course introduces students to a broad spectrum of practical issues and activities in real estate markets. It provides the opportunity for the students to get an in-depth understanding of the real estate business. Subjects include Understand Real Estate Market; Math for Real Estate; Buying Real Estate, Mortgage, Escrow, Title Company, Inspection, Home Insurance Company; Selling Real Estate, Repairing, Brokerage, Staging; Comparative Market Analysis; Brokerage and Marketing Strategies; Investing in Real Estate Market, Debt Utilization; Flipping and Wholesaling; Construction Fundamentals; Legal Protection and …
Q2s Enhanced Pedagogy: Developing Critical Listening Skills In Business School Students To Enhance On-The-Job Performance, Matthew Habich
Q2s Enhanced Pedagogy: Developing Critical Listening Skills In Business School Students To Enhance On-The-Job Performance, Matthew Habich
Q2S Enhancing Pedagogy
A common complaint heard from many business managers and executives is that while recent business school graduates are relatively well-equipped for the technical aspects of their jobs, they often lack critical communication-related skills, thus limiting their organizational effectiveness. This article describes feedback received from a group of Southern California business executives indicating that "active listening" is one of the most important of these communication skills - and one often lacking in recent business school graduates - and offers one classroom exercise that can be used to help students practice this critical communication skill.
Unintentional Bias In Management Based On Perception, Liliana Monteil-Doucette, Liliana Monteil-Doucette
Unintentional Bias In Management Based On Perception, Liliana Monteil-Doucette, Liliana Monteil-Doucette
University Diversity Committee records
Students in the College of Business are taught to be effective managers, by challenging coursework. Yet part of being a strong leader is being aware of intentional or unintentional biases based on stereotypes.
- The goal of this project was to raise student awareness that negative perception of groups of individuals within an organization affects that group’s ability to succeed, and also impacts businesses negatively. By writing a business proposal to address a diversity, equity or inclusion issue at a business, students demonstrated that they understood the effects of negative unconscious perception. The proposal was intended to enlighten students and help …
Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez
Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez
Communications of the IIMA
The increasing complexity of information technology, attacks on confidential information, and the passing of new laws and regulations have shifted the focus around internal controls in organizations. Particularly, general information technology controls related to change management (i.e., system change controls) are critical in ensuring the integrity, completeness, and reliability of financial information. The literature points to various evaluation methods for these controls to determine which ones to implement. However, these methods do not necessarily consider relevant organization constraints, preventing the inclusion of required controls or the exclusion of unnecessary controls. This paper proposes a novel approach, using Desirability Functions, for …
Q2s Enhancing Pedagogy: Acue Module Reflections, Sharon Pierce
Q2s Enhancing Pedagogy: Acue Module Reflections, Sharon Pierce
Q2S Enhancing Pedagogy
The Teaching Resource Center (TRC) collaborated with Association of Colleges and University Educators (ACUE) to deliver a course in effective teaching practices at California State University, San Bernardino (CSUSB). The course provided a framework that covered five units that included designing an effective course and class and establishing a productive learning environment. The is a collection of ACUE implementation and reflection assignments.
2A: Leading the First Day of Class
2C: Connecting with Your Students
1E – Planning and Effective Class Session
A Framework Of Blockchain Technology, Frank Lin, Danny Chung, Conrad Shayo, Francisca Beer
A Framework Of Blockchain Technology, Frank Lin, Danny Chung, Conrad Shayo, Francisca Beer
Communications of the IIMA
With the introduction of Bitcoin by Nakamoto (2008), came a key underlying technology that holds great disruptive promise to many crucial industries: Blockchain. The nature of a decentralized, distributed ledger will truly change the way we currently trade and interact through its clear transparency and high integrity (Casey & Vigna, 2018; Sullivan, 2015). Based on trust, Blockchain allows various parties to be involved in transacting with each other without the need to know each other (Botsman, 2017; Deloitte, 2016; Drescher, 2017; Mauri, 2017). The purpose of this paper is to provide a framework for Blockchain by focusing on how Blockchain …
Global Project Management - Chinese And American Cultural Differences, Kosin Chen, Gerhard Steinke
Global Project Management - Chinese And American Cultural Differences, Kosin Chen, Gerhard Steinke
Communications of the IIMA
This paper investigates cultural differences between Chinese and American project managers in the IT industry through a pilot study of interviewing six professional project managers with qualitative and quantitative questions. The interview questions were developed to compare core Chinese values and cultural styles with American cultural styles. Initial results found that Chinese and American project managers in the IT industry have similar ideas regarding resistance to corruption but have differences toward the idea of trustworthiness, harmony, avoiding confrontation, and non- competition.
Opioid Adjunct Drug Therapy: Evaluating Effectiveness Using Text Analytics Of Real World Data, Michael Veronin, Robert P. Schumaker
Opioid Adjunct Drug Therapy: Evaluating Effectiveness Using Text Analytics Of Real World Data, Michael Veronin, Robert P. Schumaker
Communications of the IIMA
Opioid analgesics continue to be the mainstay of pharmacologic treatment of moderate to severe pain. An adjunct is a drug that in its pharmacological characteristic is not identified primarily as an analgesic, but that has been found in clinical practice to have either an independent analgesic effect or additive analgesic properties when used with opioids. By using an adjunct to maximize the level of analgesia, the required opioid dosage may be reduced, together with concomitant adverse effects. BACKGROUND Real World Data (RWD) refers to data that describe observations in normal clinical practice obtained by any non- interventional methodology, such as …
The Impact Of College And University Advertising Expenditures On Key Performance Indicators Using Business Analytics Modeling, Alison Munsch, Jason Diffenderfer, Charles Cante
The Impact Of College And University Advertising Expenditures On Key Performance Indicators Using Business Analytics Modeling, Alison Munsch, Jason Diffenderfer, Charles Cante
Communications of the IIMA
Marketers in the 21st century now more than ever face a competitive business environment. The battle for marketers to to capture value from customers across a variety of verticals in the form of brand equity and sales is as fierce as it has ever been. This is because customers have numerous choices partially driven by the access and information provided by the internet (Solomon, 2017). As such, consumers are exposed to a plethora of alternative products and services more than ever as compared to the past. As such, consumers apply a high level of effect in the market about several …
Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar
Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar
Electronic Theses, Projects, and Dissertations
Having a solid enterprise architecture foundation is critical to the success and growth of a business. Considering the volatility of many industries, businesses must consistently grow, innovate, and advance their technology to ensure high availability of their products and systems. Seeing that projects fail more than they succeed, it stresses the importance of having a strong enterprise architecture (Schneider, 2020). With this said, it is imperative that a business creates a proper collaborative environment to ensure that all future implementations and developments within their environments are successful. Without these foundations, an enterprise will fail to grow.
This project provides an …
Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray
Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray
Electronic Theses, Projects, and Dissertations
The Malcolm Baldrige Framework for Performance Excellence outlines best practices for strategic and operational processes. Enterprises that achieve the award do so not for the award itself – but for the transformation that takes place along the way. Although the fifty-page summaries of Malcolm Baldrige award winning organizations are posted on the National Institute of Science and Technology (NIST) (https://www.nist.gov/baldrige/award-recipients), the process and effort used to create such applications has not been documented. This project documents and provides an internal perspective and lessons learned from the early stages of the Malcolm Baldrige journey for a medium size financial institution. The …
Analysis Of Us Accidents And Solutions, Swapnil Kisan Nikam
Analysis Of Us Accidents And Solutions, Swapnil Kisan Nikam
Electronic Theses, Projects, and Dissertations
Reducing traffic accidents is an essential public safety challenge all over the world; therefore, accident analysis has been a subject of much research in recent decades.
The objective of the project is to analyze the US accident data from 50 states to inform the US government agencies and the general public on trends and possible causes of traffic accidents and what could be done to reduce them. The analysis include number of accidents by year, number of accidents by state, best time to travel by month, day and hour, accident-prone area in each state, factors responsible of the accidents like …
Workplace Communication: Examining Leader-Member Exchange Theory, Uncertainty Avoidance, And Social Styles, Guy Robinson
Workplace Communication: Examining Leader-Member Exchange Theory, Uncertainty Avoidance, And Social Styles, Guy Robinson
Electronic Theses, Projects, and Dissertations
There are numerous books, articles, and papers written about communicating in the work environment; especially how to communicate to the work force at large. However, not much is written or studied concerning the dyadic communication between supervisor and subordinate. The paper will use leader-member exchange theory (LMX) as a basis for communication between supervisor and subordinate. LMX gives steps to aid in the communication process and helps guide the relationship between a supervisor and subordinate; however, there are two other elements in need of attention. In order to communicate effectively with their subordinates, supervisors need an understanding of the subordinates’ …
Conducting Meetings, Writing Agendas, Drafting Minutes, Liliana Monteil-Doucette
Conducting Meetings, Writing Agendas, Drafting Minutes, Liliana Monteil-Doucette
Q2S Enhancing Pedagogy
This is a two-day assignment which encourages students to consider a situation at work where employees are not following proper telephone answering etiquette. The situation could cause the business to lose customers. Therefore, students are instructed to research proper phone etiquette, then prepare an agenda to address the issues and provide guidelines on the correct way to answer phones.
On day two, students will hold a meeting discussing the points on their agenda, take notes, then write the minutes of the meeting.
The assignment walks them through the full process of problem solving, communicating with employees, and producing proper business …
Student Opinion On Faculty Diversity, Krystal Rawls
Student Opinion On Faculty Diversity, Krystal Rawls
University Diversity Committee records
This project was designed to investigate student opinions on the importance of faculty diversity. Results from the faculty investigation indicated that 27% of the respondents were not ‘did not know’ if faculty diversity initiatives would benefit student outcomes (Rawls, 2020). In analyzing stakeholder power and influence, the natural next step was to identify student thoughts on the subject.
A preliminary 16-item survey was distributed to undergraduate students in an Organizational Behavior and Management Theory course group. Three sections of this course with approximately 75 students enrolled were asked to take the survey and offer feedback on the items in development …
The Effect Of Incentive Hierarchy System Of Social Media In The Delivery Of Quality Information, Peng Xie, Peng Xie
The Effect Of Incentive Hierarchy System Of Social Media In The Delivery Of Quality Information, Peng Xie, Peng Xie
Journal of International Technology and Information Management
This paper investigates the effect of social media incentive hierarchy system on the quality of the shared information and the spillover effect using data from 67 cryptocurrency markets along with the corresponding social media discussions. We show empirical evidence that high-rank social media users displaying high-level badges earned from the social media tend to provide low-quality information due to reduced incentives after obtaining the badge and increased tendency to engage in less informative socialization activities. In contrast, low-rank social media users with low-level badges tend to provide high-quality information. However, messages shared by high-rank social media users spill over to …
Food Printing: Evolving Technologies, Challenges, Opportunities, And Best Adoption Strategies, Sharmin Attarin, Mohsen Attaran
Food Printing: Evolving Technologies, Challenges, Opportunities, And Best Adoption Strategies, Sharmin Attarin, Mohsen Attaran
Journal of International Technology and Information Management
3D printing is a process of making three-dimensional objects using additive processes where layers are laid down in succession to create a complete object. Companies across the globe are actively piloting and leveraging the inherent benefits of 3D printing technology. Today, 3D printing can revolutionize food innovation and production through better creativity, customizability, and sustainability. This article highlights 3D printing evolving technologies and trends and identifies its applications and implementation challenges. In this paper, we conducted a literature review to explore 3D printing's current technologies and applications in the food industry, including its advantages, its potential implications, and its obstacles …
Table Of Contents Jitim Vol 29 Issue 1, 2020
Table Of Contents Jitim Vol 29 Issue 1, 2020
Journal of International Technology and Information Management
Table of contents