Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Business

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil Jan 2021

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil

Engineering Management & Systems Engineering Faculty Publications

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …


Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver Jan 2019

Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver

Walden Dissertations and Doctoral Studies

Small business owners in a range of industries continually adapt to take advantage of technological developments in accounting, marketing, and communication. The purpose of this multiple case study was to explore strategies that small business owners operating in the central region of North Carolina used to implement information and communication technology (ICT). Roger's diffusion of innovation theory grounded the study. Data collection included face-to-face semistructured interviews with 6 owners of small businesses who successfully implemented ICT, field notes from site observations, and reviews of participant websites. Interviews were transcribed and participants were engaged in member checking. Data were analyzed using …


Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier Jan 2017

Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier

Walden Dissertations and Doctoral Studies

The need for clear and organizationally effective communications is necessary to maintain sustainability as competition increases. Current research has not addressed problems associated with senior managers' clarity and intent and the misinterpretation by midlevel managers of that intent, causing division managers to misinterpret the company plans. Unresolved miscommunications may lead to destructive subculture development. This mixed methods design focused on how to minimize the confusion that manifests between senior and midlevel management within diverse and decentralized decision support structures. The secondary purpose was to advocate for the identification of divisional misalignment and provide information for a tool to help senior …


Statistics-Bierce Library Study, Tyler J. Hushour Jan 2017

Statistics-Bierce Library Study, Tyler J. Hushour

Williams Honors College, Honors Research Projects

This is a report from two surveys that I created and administered to students and faculty at Bierce library who came to the Circulation Desk or the Tech Desk, as well as some of my other findings when periodically looking around the library to see where students like to study or hang-out. There was a written survey given at the Circulation Desk, and a different survey given at the Tech Check-Out Desk. The project is for Melanie Smith-Farrell, the head of Access Services, and is based on a similar study Ian McCullough did in the science library. While this is …


Slides: Gwc Review Report, Larry Macdonnell Jun 2015

Slides: Gwc Review Report, Larry Macdonnell

Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)

Presenter: Larry MacDonnell, University of Colorado Law School

12 slides


Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp Jun 2014

Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp

All Faculty Scholarship

When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.

My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …


Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg Jan 2014

Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg

Book Chapters

“Knowledge commons” describes the institutionalized community governance of the sharing and, in some cases, creation, of information, science, knowledge, data, and other types of intellectual and cultural resources. It is the subject of enormous recent interest and enthusiasm with respect to policymaking about innovation, creative production, and intellectual property. Taking that enthusiasm as its starting point, Governing Knowledge Commons argues that policymaking should be based on evidence and a deeper understanding of what makes commons institutions work. It offers a systematic way to study knowledge commons, borrowing and building on Elinor Ostrom’s Nobel Prize-winning research on natural resource commons. It …


Neutrosophic Emergencies And Incidences, Florentin Smarandache, Stefan Vladutescu Jan 2013

Neutrosophic Emergencies And Incidences, Florentin Smarandache, Stefan Vladutescu

Branch Mathematics and Statistics Faculty and Staff Publications

No abstract provided.


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Oct 2012

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk Jan 2011

The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk

Manoj Maharaj

No abstract provided.


The Influence Of Organizational And Information Systems Factors On The Effectiveness Of Post-Merger Technology Integration, Gianilda A. Morsell May 2009

The Influence Of Organizational And Information Systems Factors On The Effectiveness Of Post-Merger Technology Integration, Gianilda A. Morsell

Dissertations

This dissertation explores how ten specific organizational and information systems factors influence post-merger IS integration success, and the role that degree of IS integration plays in moderating the influence these factors may have on IS integration success. Data were gathered, using a self-administered survey instrument, from senior IS executives at firms that experienced a U.S. public merger greater than $25 million between 2004 and 2007. Support is found for the study's Conceptual Model, indicating that all ten factors in unison influence post-merger IS integration success. The data support the hypotheses that quality of merger planning, quality of communication of merger …


The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender Jan 2005

The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender

Manoj Maharaj

No abstract provided.


Using Dynamic Information In The Supply Network, Jeffrey Barker Dec 2003

Using Dynamic Information In The Supply Network, Jeffrey Barker

Jeffrey Barker

No abstract provided.