Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

2005

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 88

Full-Text Articles in Physical Sciences and Mathematics

Take Pride In America In Southern Nevada: Quarterly Progress Report, Period Ending December 31, 2005, Margaret N. Rees Dec 2005

Take Pride In America In Southern Nevada: Quarterly Progress Report, Period Ending December 31, 2005, Margaret N. Rees

Anti-littering Programs

  • Messaging campaign proposal approved by the federal Land Managers.
  • Invitations sent to potential Community Steering Committee members.
  • Project Manager Doug Joslin appointed to new county-wide Southern Nevada Recycling Advisory Committee.
  • Four public service announcements produced by UNLV students.
  • Contract with the Nevada Division of Forestry (NDF) in progress for prison crew site clean-ups.
  • Plan for agency requests for additional dumpsters and/or roll-offs approved by team.


An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp Dec 2005

An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp

Adrian Gepp

Accurate business failure prediction models would be extremely valuable to many industry sectors, particularly in financial investment and lending. The potential value of such models has been recently emphasised by the extremely costly failure of high profile businesses in both Australia and overseas, such as HIH (Australia) and Enron (USA). Consequently, there has been a significant increase in interest in business failure prediction, from both industry and academia. Statistical models attempt to predict the failure or success of a business based on publicly available information about that business (or its industry and the overall economy), such as accounting ratios from …


Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder Dec 2005

Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder

Theses and Dissertations

Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …


Minerva 2005, The Honors College Dec 2005

Minerva 2005, The Honors College

Minerva

This issue of Minerva includes an article on the development of HON 170: Currents & Contexts; a discussion of the Honors College's "Last Lecture Series;" a reflection on the legacy of former Honors Program Director, Robert Thomson; and an article on the visual art found around the Honors College complex.


The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu Nov 2005

The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu

Qing Hu

Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventive technologies based on the frameworks of theory of planned behavior in the context of anti-spyware technologies. We find that the user awareness of the issues and threats from harmful technologies is a strong predictor of user behavioral intention toward the use of preventive technologies. In the presence of awareness, …


Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall Nov 2005

Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall

Business and Information Technology Faculty Research & Creative Works

Willingness to engage in exchange is based on desired benefits. In typical commercial transactions, restricted exchange benefits dominate. However, public policy, social marketing situations might require consideration of both restricted and generalized exchange benefits. Applying factor analysis, cluster analysis and cross-tabulation, this paper reports research that has successfully segmented a young adult target market regarding interest in military service based on considerations of generalized and restricted exchange motivations. This research contributes to a growing body of literature on generalized exchange as a key conceptual element for social marketing. Results demonstrate the utility of the generalized exchange concept in identifying amarket …


2005 Scholars And Artists Bibliography, Stephen D. Slane Dr., Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library Oct 2005

2005 Scholars And Artists Bibliography, Stephen D. Slane Dr., Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library

Scholars and Artists Bibliographies

This bibliography was created for the annual Friends of the Michael Schwartz Library Scholars and Artists Reception, recognizing scholarly and creative achievements of Cleveland State University faculty, staff and emeriti. Dr, Steve Slane was the guest speaker.


Santa Clara Magazine, Volume 47 Number 2, Fall 2005, Santa Clara University Oct 2005

Santa Clara Magazine, Volume 47 Number 2, Fall 2005, Santa Clara University

Santa Clara Magazine

6 - THE DRIVE TO CREATE by Elizabeth Kelley Gillogly '93. Albert Hoagland, an adjunct professor at SCU for more than 20 years, helped to build the first disk drive. Now is he working to preserve the history of magnetic disk storage.

10 - UNFINISHED MESSAGE by Toshio Mori. We share an excerpt from a collection of short stories by Mori, whose work highlights the plight of Japanese immigrants in the U.S. during World War II. The book is a part of the California Legacy Series, a partnership between SCU and Heyday Books.

14 - THE FAMILIAR STRANGER By Cynthia …


Improving Pro Forma Analysis Through Better Terminal Value Estimates, Tom Arnold, David S. North, Roy A. Wiggins Oct 2005

Improving Pro Forma Analysis Through Better Terminal Value Estimates, Tom Arnold, David S. North, Roy A. Wiggins

Finance Faculty Publications

Basic pro forma analysis often estimates the terminal value input using a simple growing perpetuity assumption. While this assumption is easy to implement, it potentially creates an upward bias in some inputs leading to lower firm or project value outputs. The purpose of this paper is to demonstrate a more accurate way to estimate the terminal value input. Further, by allowing for multiple sales growth rates and by not restricting other input variables to necessarily grow at these same rates, a more accurate, flexible, compact, and thorough analysis is possible.


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Oct 2005

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Faculty and Research Publications

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


Managerial Assessments Of E-Business Investment Opportunities: A Field Study, Anandhi S. Bharadwaj, Amrit Tiwana Oct 2005

Managerial Assessments Of E-Business Investment Opportunities: A Field Study, Anandhi S. Bharadwaj, Amrit Tiwana

Research Collection School Of Computing and Information Systems

Managers charged with assessing investment opportunities for information technologies such as e-business projects face considerable uncertainty in their decision-making processes. Contemporary theories of the firm and the normative prescriptions thereof emphasize the potential for such investments to augment firm-level knowledge and relational capabilities. However, prior research has not examined the relative emphases that managers place on the knowledge and relational capability-augmenting characteristics of the e-business investments. In this paper, we develop a model to assess whether managerial evaluations of e-business investment opportunities are consistent with these normative and theoretical prescriptions. A test of the model using survey data on 485 …


Towards Semantic Service Request Of Web Service Composition, Qianhui Althea Liang, Jen-Yao Chung, Steven M. Miller Oct 2005

Towards Semantic Service Request Of Web Service Composition, Qianhui Althea Liang, Jen-Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user's service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a way to model the elements of a composite service request as user preferences and constraints. The model is based on an interactive and iterative strategy meant to obtain the exact requirements from potential service consumers. The markup vocabularies and associated inference mechanism of OWL-S are used as a means to bring semantics to service requests. Language constructs …


Take Pride In America In Southern Nevada: Quarterly Progress Report, Period Ending September 30, 2005, Take Pride In America In Southern Nevada Sep 2005

Take Pride In America In Southern Nevada: Quarterly Progress Report, Period Ending September 30, 2005, Take Pride In America In Southern Nevada

Anti-littering Programs

  • Interagency Anti-Litter Team met on August 22 and September 14, 2005.
  • Community Anti-Litter Steering Committee participants have been identified.
  • Project Manager Doug Joslin has been recommended for appointment to the new county-wide Southern Nevada Recycling Advisory Committee.
  • Five Take Pride in America public service announcements were produced and delivered to television stations in southern Nevada.
  • A messaging campaign proposal will be shared with the federal land managers on October 27, 2005.
  • An initial review of progress on the Spring Mountains anti-litter pilot project has been conducted.
  • Three Take Pride in America clean-up events were supported by the Anti-Litter Team. The …


Proposals For Community Discussion : A Quality Future For The Recreational Marron Fishery : A Five-Year Draft Strategy To Ensure The Long-Term Sustainability Of The Marron Fishery, Recreational Freshwater Fisheries Stakeholder Sub-Committee Sep 2005

Proposals For Community Discussion : A Quality Future For The Recreational Marron Fishery : A Five-Year Draft Strategy To Ensure The Long-Term Sustainability Of The Marron Fishery, Recreational Freshwater Fisheries Stakeholder Sub-Committee

Fisheries management papers

While some of the factors threatening the future of the marron fishery can be managed via traditional fisheries controls, many fall outside of the Department of Fisheries’ jurisdiction and require a ‘whole of Government’ approach to management. To help ensure a quality future for the recreational marron fishery, the Recreational Freshwater Fisheries Stakeholder Sub-committee (RFFSS) has now developed a set of draft management proposals designed to form the basis of a five-year management plan for the fishery.


A Five Year Management Strategy For Recreational Fishing On The South Coast. The Minister For Fisheries' Decision In Response To The Final Report Of The South Coast Recreational Fishing Working Group., Jon Ford (Minister For Fisheries; The Kimberley, Pilbara And Gascoyne) Sep 2005

A Five Year Management Strategy For Recreational Fishing On The South Coast. The Minister For Fisheries' Decision In Response To The Final Report Of The South Coast Recreational Fishing Working Group., Jon Ford (Minister For Fisheries; The Kimberley, Pilbara And Gascoyne)

Fisheries management papers

After careful consideration of the South Coast Recreational Fishing Working Group’s recommendations and the wide range of issues raised in submissions, I have made my decisions in respect to the future management arrangements for recreational fishing in South Coast Region. I believe the new management arrangements which will be implemented in 1 January 2006 will go a long way to protecting recreational fishing quality and meeting the long term needs for the sustainable management of recreational fishing. I did note that some of the most pressing concerns raised during public meetings, and in submissions, related to the interaction between the …


Analysis Of Per Capita Expenditures Of Suburbanizing Communities In Maine, New England Environmental Finance Center Sep 2005

Analysis Of Per Capita Expenditures Of Suburbanizing Communities In Maine, New England Environmental Finance Center

Economics and Finance

This study analyzes per capita expenditure trends among selected fast-growing Maine towns from 1970-2004. The ten communities studied are termed as “suburbanizing” towns. This term is used to describe towns that over the past 30-40 years have been in the process of transition from rural to suburban – in terms of their population and housing densities, their forms of government, and the services they provide, as well as other characteristics.1 Such towns are of particular interest because they have been absorbing a healthy percentage of the state’s population growth during this time period, often at the expense of Maine’s service …


Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu Aug 2005

Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu

Dissertations

This thesis work examines the time management strategies of individuals in an academic institution and gathers information on the complex temporal structures they experience and manage. Its focus is on understanding the relationship between the quality of individual time management and an individual's understanding and use of temporal structures. This work consists of an exploratory field study to gather data on how people use temporal structures with electronic tools. It is followed by a survey that is given to a larger group of respondents in the same subject population examined with the field study. The survey examines the hypotheses developed …


Electronic Capture And Analysis Of Fraudulent Behavioral Patterns : An Application To Identity Fraud, Benjamin Ngugi Aug 2005

Electronic Capture And Analysis Of Fraudulent Behavioral Patterns : An Application To Identity Fraud, Benjamin Ngugi

Dissertations

The objective of this research was to find a transparent and secure solution for mitigating identity fraud and to find the critical factors that determine the solution's acceptance. Identity fraud is identified as a key problem with total losses exceeding fifty two billion dollars (Javelin Strategy and Research 2005). A common denominator in most identity-fraud-prone transactions is the use of a keypad; hence this research focuses on keypad data entry and proposes a biometric solution. Three studies develop, evaluate and investigate the feasibility of this solution.

The first study was done in three stages. Stage one investigated the technical feasibility …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel Aug 2005

Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel

International Conference on Information and Communication Technologies

Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.


Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid Aug 2005

Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid

International Conference on Information and Communication Technologies

This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.


Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi Aug 2005

Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi

International Conference on Information and Communication Technologies

Nowadays, businesses need a system that can provide flexibility, reusability and simplicity for their business solutions. However, if business logics or rules are implemented using procedural paradigms, then the business systems will become more complex. In this paper we treat business logics separate from system logics, whereby we analyse a business by describing its rules and developing a set of rule statements. These business rules will be treated as a separate component in the design and implementation of the system. We have found that our proposed method leads to a system, which is more customisable, flexible, efficient, and reusable, in …


Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz Aug 2005

Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz

International Conference on Information and Communication Technologies

Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.


Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb Aug 2005

Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb

International Conference on Information and Communication Technologies

This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.


Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan Aug 2005

Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan

International Conference on Information and Communication Technologies

Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the "any time, any place" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the …


Management Of The Proposed South Coast Trawl Fishery. A Discussion Paper., Department Of Fisheries. Aug 2005

Management Of The Proposed South Coast Trawl Fishery. A Discussion Paper., Department Of Fisheries.

Fisheries management papers

In late 1987, the Minister approved a development plan for the South Coast Inshore Trawl Fishery (Fisheries Management Paper No. 13) and made a number of notices regulating trawling activities in the Recherche Archipelago. Fishing Boat Licences were subsequently ‘endorsed’ by reference to those notices. The development plan was declared to be for a period ending 31 December 1989, subject to extension for a further year if necessary. Despite the considerable interest in the fishery during 1986 to 1989, fishing results demonstrated that the economic returns were marginal and a number of operators withdrew from participation in the fishery (at …


A Five-Year Management Strategy For Recreational Fishing In The Pilbara/Kimberley. The Minister For Fisheries' Decisions In Response To The Final Report Of The Pilbara Kimberley Recreational Fishing Working Group, Jon Ford (Minister For Fisheries; The Kimberley, Pilbara And Gascoyne) Aug 2005

A Five-Year Management Strategy For Recreational Fishing In The Pilbara/Kimberley. The Minister For Fisheries' Decisions In Response To The Final Report Of The Pilbara Kimberley Recreational Fishing Working Group, Jon Ford (Minister For Fisheries; The Kimberley, Pilbara And Gascoyne)

Fisheries management papers

The regional review for the Pilbara/Kimberley Region is now complete and I would like to thank all members of the review working group for their efforts in what has been a challenging task. I would also like to thank those members of the community who attended public meetings and made submissions on the draft discussion paper. After careful consideration of the Pilbara/Kimberley Recreational Fishing Working Group’s recommendations and the wide range of issues raised in submissions, I have made my decisions in respect to the future management arrangements for recreational fishing in Pilbara/Kimberley Region. I believe the new management arrangements, …


Evaluation Of Time-Varying Availability In Multi-Echelon Inventory System With Combat Damage, Hoong Chuin Lau, Huawei Song Aug 2005

Evaluation Of Time-Varying Availability In Multi-Echelon Inventory System With Combat Damage, Hoong Chuin Lau, Huawei Song

Research Collection School Of Computing and Information Systems

The models for multi-echelon inventory systems in existing literatures predominantly address failures due to reliability in peacetime. In wartime or even peacetime operational scenarios, unexpected combat damage can cause a large number of systems to be heavily damaged, to the extent that they become irreparable. In this paper, we study a multi-echelon spare parts support system under combat damage, discuss the replenishment policy and propose an approximate method to evaluate the time-varying system performance operational availability considering the effect of passivation. Experiments show our model works well and efficiently against simulation.


Santa Clara Magazine, Volume 47 Number 1, Summer 2005, Santa Clara University Jul 2005

Santa Clara Magazine, Volume 47 Number 1, Summer 2005, Santa Clara University

Santa Clara Magazine

9 - A MOGUL IN THE MAKING By Larry Sokoloff J.D. '92 While working toward his business degree, SCU sophomore Tyler Dickman runs a multimillion-dollar business based in Florida.

10 - TOP OF THE CLASS: FOUNDATION HONORS INNOVATIVE SCU PROFESSORS By Kim Kooyers. This year's winners of the Louis and Dorina Brutocao Award for Teaching Excellence and the Brutocao Family Foundation Award for Curriculum Innovation are examples of the SCU's outstanding teaching scholars.

14 - A GLOBAL ETHIC: A CONVERSATION WITH HANS KUNG By Rita Beamish '74 Hans Kung, scholar, Roman Catholic priest, and author of some 50 books on …


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jul 2005

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Research Collection School Of Computing and Information Systems

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.