Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (31)
- Kennesaw State University (14)
- University of Nebraska - Lincoln (10)
- Illinois State University (8)
- University of Arkansas, Fayetteville (3)
-
- University of South Florida (2)
- Abilene Christian University (1)
- Bucknell University (1)
- Florida International University (1)
- Singapore Management University (1)
- Technological University Dublin (1)
- The University of Akron (1)
- The University of San Francisco (1)
- University of Central Florida (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Keyword
-
- Cybersecurity (7)
- Bibliometric (3)
- Information (3)
- Innovation (3)
- Social media (3)
-
- Technology (3)
- ToC (3)
- Analysis (2)
- Blockchain (2)
- Covid-19 (2)
- Digital Transformation (2)
- Experiential learning (2)
- GLOBE Conference (2)
- GLOCER Conference (2)
- GLOSEARCH Conference (2)
- GLOSERV Conference (2)
- GRAD Conference (2)
- HOTEL Conference (2)
- IIBA Conference (2)
- Information Technology (2)
- Internships (2)
- MTCON (2)
- Performance (2)
- Phishing (2)
- Scopus (2)
- Technology Enabler (2)
- Trust (2)
- AHP (1)
- AI (1)
- ANNs (1)
- Publication
-
- Journal of International Technology and Information Management (26)
- Library Philosophy and Practice (e-journal) (9)
- International Journal for Business Education (8)
- Journal of Cybersecurity Education, Research and Practice (8)
- Electronic Theses, Projects, and Dissertations (5)
-
- KSU Proceedings on Cybersecurity Education, Research and Practice (5)
- Graduate Theses and Dissertations (2)
- University of South Florida (USF) M3 Publishing (2)
- Business Analytics and Information Systems (1)
- Department of Supply Chain Management and Analytics: Faculty and Staff Publications (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Journal Articles (1)
- Human-Machine Communication (1)
- Information Systems Undergraduate Honors Theses (1)
- International Journal of Islands Research (1)
- Perspectives@SMU (1)
- Proceedings from the Document Academy (1)
- The African Journal of Information Systems (1)
- Theses and Dissertations (1)
- Publication Type
Articles 1 - 30 of 78
Full-Text Articles in Technology and Innovation
Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie
Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie
International Journal of Islands Research
Islands are fragile territories because of their geographical position. As a result, climate impacts can have serious consequences, of which some are irreversible. Therefore, it is necessary to allow insular territories to benefit from the latest scientific and technological advances in combating climate effects. The current article shows how to deal with automatic analysis of scientific information on the one hand, but also its applications via patents. We will analyse the latest scientific results as well as their possible applications using patent analysis. We will also focus on experts, laboratories, and leading companies, that are active on the field. The …
A Nation In Crisis... In Three Acts, William D. Senn
A Nation In Crisis... In Three Acts, William D. Senn
Proceedings from the Document Academy
A dramatic, spoken-word performance based on a detailed examination of the text of more than 1.7 million tweets concerning coronavirus and covid that were sent during the hours surrounding the president's declaration of emergency on March 13, 2020 including the transcript of the remarks made at the Rose Garden press conference. The researcher used the Twitter JSON API to retrieve all of the tweets containing the search terms "covid" and "corona" occurring during the timeframe. A text analysis was performed to identify the most frequently occurring n-grams present in the corpus of tweets. Thematic analysis and sentiment analysis were used …
Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng
Government Workspace Digitalization And Socioeconomic Development Outcomes In Ghana, Winfred Ofoe Larkotey, John Effah, Richard Boateng
The African Journal of Information Systems
The study sought to understand how the structurational environment shapes socioeconomic outcomes of government workspace digitalization in Ghana based on a qualitative, interpretive case study and the structurational model of technology as a theoretical lens. The findings show how the availability of electronic transactions law, government borrowing, and extendable system design can positively influence socioeconomic outcomes of government workspace digitalization. However, use of multiple system development environments, bureaucracy, a within-country digital divide, and a persistent physical signature and letterhead culture can negatively influence the socioeconomic development goals of government workspace digitalization.
Practice Enterprises In Times Of Distance Learning: The Impact And Consequences Of The Covid-19 Pandemic To The Collaboration Of Practice Enterprises, Theresa Feuchter, Gernot Dreisiebner, Elisabeth Riebenbauer, Ph.D., Michaela Stock
Practice Enterprises In Times Of Distance Learning: The Impact And Consequences Of The Covid-19 Pandemic To The Collaboration Of Practice Enterprises, Theresa Feuchter, Gernot Dreisiebner, Elisabeth Riebenbauer, Ph.D., Michaela Stock
International Journal for Business Education
The aim of this paper is to outline the consequences which arise from the digital transformation of the multidimensional teaching and learning setting of practice enterprises and to discuss how digital collaboration of students can be supported during the COVID-19 pandemic. As an evolutionary moment also in the field of education, one can consider the experiences of COVID-19 as a catalyst for digital transformation and distance learning in education. How digital collaboration can be fostered in times of distance learning is shown by using the example of business simulations such as practice enterprises (PE). While previously this multidimensional teaching and …
Project-Based Pedagogy: The Client's Perspective, Wayne Aho, Wendy Cagle, Jon Marvel, Michael Smith, Edward Wright
Project-Based Pedagogy: The Client's Perspective, Wayne Aho, Wendy Cagle, Jon Marvel, Michael Smith, Edward Wright
International Journal for Business Education
Project-based experiential business education seeks to provide students with lessons that are meaningful, practical, and enduring. While previous research has sought to understand how students and faculty members react to such educational experiences, it is also important to understand the perceptions of the business clients who engage with programs employing project-based education. The aim of this study was to better understand the experiences of business clients with whom students engaged as part of an undergraduate business capstone course. Two hundred fifty-three previous clients were surveyed with a 22.4% response rate. Responses were subjected to content analysis to cluster replies into …
Promoting Employer Desired Competencies Through A Multiphased "Workgroup" Project, Ashly Smith
Promoting Employer Desired Competencies Through A Multiphased "Workgroup" Project, Ashly Smith
International Journal for Business Education
Employers and business leaders have long been advocating for the importance of career readiness skills like critical thinking/problem solving, information literacy, teamwork/collaboration, professionalism/work ethic, and oral/written communication (NACE, 2019; Partnership, 2008). While faculty and students see value in projects that develop these skills, such projects can be some of the most challenging to incorporate effectively into business courses (Chapman et al., 2010; Detmering & Johnson, 2012; Lee et al., 2016; Marks & O’Connor, 2013). This article reports on a multi-phase group project that aims to strengthen a selection of these employer-desired skills while ameliorating student concerns about the research process …
Cultivating Financial Literacy Through Secondary School Economics Education: Access To Powerful Knowledge, Emanuel Mizzi
Cultivating Financial Literacy Through Secondary School Economics Education: Access To Powerful Knowledge, Emanuel Mizzi
International Journal for Business Education
‘Powerful knowledge’ is disciplinary knowledge that when learned, empowers students to make decisions in a way that will influence their lives in a positive way (Young, 2008). In this paper, the researcher employs this construct to explore the financial literacy education arising from studying secondary school economics. It emerges from the author’s research aimed at exploring teaching and learning in secondary school Maltese economics classrooms. The underlying conceptual framework for this study is critical realism. The study design consisted of interviewing and observing 14 economics teachers, together with four focus groups interviews with students. Data were analyzed by employing thematic …
Internships As Clinical Rotations In Business: Enhancing Access And Options, Faye W. Gilbert, Jason Harkins, Pankaj Agrrawal, Taylor Ashley
Internships As Clinical Rotations In Business: Enhancing Access And Options, Faye W. Gilbert, Jason Harkins, Pankaj Agrrawal, Taylor Ashley
International Journal for Business Education
Internships are high impact practices that offer work experiences and provide advantages for participating undergraduate students and for the talent acquisition efforts of firms. While research consistently documents the benefits of internships as a transformative experience, access and outcomes may vary for students and for underserved populations. Limitations of internships can include lack of access to enough positions as well as inadequate interactions between undergraduate students, firms, and faculty members in business programs. The purpose of this article is to describe an approach to enhancing access to internships on a larger scale with greater variety. Protocols found in clinical rotations …
Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie
Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie
Electronic Theses, Projects, and Dissertations
With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.
This project …
Phishing For All Ages, Rachana Vann
Phishing For All Ages, Rachana Vann
Electronic Theses, Projects, and Dissertations
Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Stimulating Intrapreneurial Intentions With Digital Business Training In The Vet Sector: The Potential Of Massive Open Online Courses, Christian Friedl
Stimulating Intrapreneurial Intentions With Digital Business Training In The Vet Sector: The Potential Of Massive Open Online Courses, Christian Friedl
International Journal for Business Education
It has become imperative to stimulate and support employees to behave entrepreneurially within organizations (intrapreneurship). However, little is known about how digital, massive, and scalable business education and training formats such as massive open online course (MOOCs) can contribute to vocational and educational training (VET) in general, and to nurture intrapreneurial behavior and corresponding intentions in specific. Therefore, the purpose of this paper is to explore the potential effect of a MOOC on intrapreneurial intentions of learners.
Data were acquired from 412 employees taking a MOOC on intrapreneurship for constructs embedded in the theory of planned behavior, tailored to the …
Signature Pedagogy For Entrepreneurship Education: An Emerging Perspective, Ashley Gess, Eleonora Brivio, Gianluca De Leo
Signature Pedagogy For Entrepreneurship Education: An Emerging Perspective, Ashley Gess, Eleonora Brivio, Gianluca De Leo
International Journal for Business Education
Entrepreneurial ways of thinking and doing intersect with the knowledge and skills that a global citizen needs to thrive. There is a robust body of scholarship that identifies core entrepreneurial skills however there is a dearth of evidence addressing how to successfully teach entrepreneurship. Using the lens of experiential learning, this qualitative study examines the surface, deep, and implicit structures of professional entrepreneurial culture toward revealing a meaningful, authentic pedagogical approach for entrepreneurship education. In order to achieve this outcome, researchers utilized a semi-structured comparable multiple-case study design to engage 19 incubated entrepreneurs in focus group interviews. A replication strategy …
Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina
Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina
Library Philosophy and Practice (e-journal)
This study was conducted with the aim of determining various bibliometric characteristics of documents published in the Scopus database. The information starts from the type of access, year, author, subject area, document type, publication stage, source title, keyword, affiliation, funding sponsor, country, source type, and language. Capabilities Information Technology and Knowledge Sharing are defined as the use of information technology capabilities and information technology management processes between business units by using the capabilities of resources together. Research on Information Technology Capabilities and Knowledge Sharing by providing a big picture that is visualized from year to year. This study aims to …
Social Media And Public Discourse Participation In Restrictive Environments, Jobany J. Rico
Social Media And Public Discourse Participation In Restrictive Environments, Jobany J. Rico
FIU Electronic Theses and Dissertations
This dissertation investigates citizens' use of social media to participate in public discourse (i.e., access, share, and comment on socio-political content) in restrictive environments: societies ruled by a hegemonic government where users face economic and infrastructure barriers to using digital technologies. Theoretical propositions are built inductively from an interpretive case study of how Cuban citizens use Twitter to participate in socio-political conversations. The case study resulted in the identification of nine affordances (i.e., action potentials) for participating in public discourse that Cubans perceive on Twitter. The findings also showed that the identified affordances enabled Cubans to achieve citizen goals: positive …
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
KSU Proceedings on Cybersecurity Education, Research and Practice
The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.
This paper will describe and explain the concept of cyber resiliency. It will then evaluate …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
KSU Proceedings on Cybersecurity Education, Research and Practice
Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].
However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …
Medication Bottle With Anti - Tampering Features, Bahar Aliakbarian, Muhammad Rabnawaz, Susan E. Selke, Krystal Cheng, Arun Ross, Austin Cozzo, Anurag Chowdhury, Ali Tamayol, Carina Russell, Prem Chahal
Medication Bottle With Anti - Tampering Features, Bahar Aliakbarian, Muhammad Rabnawaz, Susan E. Selke, Krystal Cheng, Arun Ross, Austin Cozzo, Anurag Chowdhury, Ali Tamayol, Carina Russell, Prem Chahal
Department of Supply Chain Management and Analytics: Faculty and Staff Publications
A medication bottle includes an outer container wall, an inner container wall and a fluid, such as an aversive liquid, located between the walls. In another aspect, the fluid is located within separate compartments or channels located between the walls where the walls contact or are secured to each other. A further aspect provides a removeable cap including multiple sensors, at least one of which is a biometric sensor.
Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame
Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame
Electronic Theses, Projects, and Dissertations
This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …
Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte
Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte
University of South Florida (USF) M3 Publishing
This is the second volume of the Advances in Global Services and Retail Management Book Series. This volume has the following parts:
- Part 1: Hospitality and Tourism
- Part 2: Marketing, E-marketing, and Consumer Behavior
- Part 3: Management
- Part 4: Human Resources Management
- Part 5: Retail Management
- Part 6: Economics
- Part 7: Accounting and Finance
- Part 8: Sustainability and Environmental Issues
- Part 9: Information Technology
ISBN: 978-1-955833-03-5
Hospitality and Tourism
- Significance of VR in the spa: A spatial analysis
- Irini Lai Fun Tang, Schultz Zhi Bin Xu, and Eric Chan
- Social media marketing in rural hospitality and tourism destination research
- Samuel …
Proceedings Of The Global Conference On Services Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte
Proceedings Of The Global Conference On Services Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte
University of South Florida (USF) M3 Publishing
This is the second volume of the Global Conference on Services Management Proceedings Series.
ISSN: 2641-5062
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin
Journal of Cybersecurity Education, Research and Practice
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …
Secure Coding In Five Steps, Mini Zeng, Feng Zhu
Secure Coding In Five Steps, Mini Zeng, Feng Zhu
Journal of Cybersecurity Education, Research and Practice
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that …
Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford
Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford
Journal of Cybersecurity Education, Research and Practice
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for producing more usable and effective cybersecurity educational resources by investigating and examining several projects, we examined DETERLab as a prospective platform to use in the classroom. Throughout our experimentation, we faced challenges that we decided to document in order to help other educators use the …
Contingency Planning Amidst A Pandemic, Natalie C. Belford
Contingency Planning Amidst A Pandemic, Natalie C. Belford
Journal of Cybersecurity Education, Research and Practice
Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and business continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the novel coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the coronavirus pandemic will be determined and evaluated in detail.
An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello
An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello
Electronic Theses and Dissertations
The problem addressed in this study was the literature gap regarding how internal organizational knowledge can be increased effectively within outsourcing projects. The study was a qualitative social constructionist case study composed of senior technology leaders. The purpose this study addressed was to understand the current structure of technical outsourcing contracts and how future contracts could be structured to address the problem of this study. The research incorporated how a reconceptualized absorptive capacity model, sociocognitive theory, and digital leadership mindsets could improve knowledge transfer outcomes between a vendor and client. Research shows that increasing an organization’s knowledge during an outsourcing …
Detecting Dirty Data Using Sql: Rigorous House Insurance Case, Daniel Street, James G. Lawson
Detecting Dirty Data Using Sql: Rigorous House Insurance Case, Daniel Street, James G. Lawson
Faculty Journal Articles
Proficiency with data analytics is an increasingly important skill within in the accounting profession. However, successful data analysis requires clean source data (i.e., source data without errors) in order to draw reliable conclusions. Although users often assume clean source data, this assumption is frequently incorrect. Therefore, identifying and remediating “dirty data” is a prerequisite to effective data analysis. You, an accountant working at a firm that specializes in data analytics, have been hired by Rigorous House Insurance to analyze the company’s claim insurance data. In addition to investigating specific issues mentioned by the company’s controller, you are tasked with identifying …