Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (18)
- Purdue University (6)
- University for Business and Technology in Kosovo (6)
- Olivet Nazarene University (5)
- Georgia Southern University (4)
-
- Embry-Riddle Aeronautical University (3)
- Florida International University (3)
- University of Central Florida (3)
- University of New Mexico (3)
- Augustana College (2)
- Kansas State University Libraries (2)
- Stephen F. Austin State University (2)
- University of Tennessee at Chattanooga (2)
- University of Tennessee, Knoxville (2)
- Bryant University (1)
- Clemson University (1)
- DePaul University (1)
- Illinois State University (1)
- Marshall University (1)
- Murray State University (1)
- Ohio Wesleyan University (1)
- Singapore Management University (1)
- Southwestern Oklahoma State University (1)
- St. Cloud State University (1)
- The University of San Francisco (1)
- University of Nebraska at Omaha (1)
- Western University (1)
- Keyword
-
- Edd_pubs (3)
- Discovery (2)
- Gender (2)
- Industrial and organizational psychology (2)
- Accounting (1)
-
- Accounting student (1)
- Adult education (1)
- Airworthiness (1)
- Albania (1)
- And business environment (1)
- Androgyny (1)
- BSRI (1)
- Behavioral (1)
- Bem sex-role inventory (1)
- Biol_facp (1)
- Body modification (1)
- Bsns_stsc (1)
- Buyers (1)
- Capacity management (1)
- Choice (1)
- Christian (1)
- Church Administration (1)
- Church Leadership (1)
- Church Network (1)
- Communication (1)
- Competition (1)
- Constant Market Share Analysis (1)
- Corporate culture (1)
- Creation care (1)
- Deregulation (1)
- Publication
-
- KSU Proceedings on Cybersecurity Education, Research and Practice (18)
- Charleston Library Conference (6)
- UBT International Conference (6)
- Scholar Week 2016 - present (5)
- ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens (3)
-
- International Crisis and Risk Communication Conference (3)
- International Material Handling Research Colloquium (3)
- Shared Knowledge Conference (3)
- Celebration of Learning (2)
- EURēCA: Exhibition of Undergraduate Research and Creative Achievement (2)
- River Cities Industrial and Organizational Psychology Conference (2)
- Undergraduate Research Conference (2)
- 2018 Reimagine Future Learning Spaces (1)
- Academic Chairpersons Conference Proceedings (1)
- Adult Education Research Conference (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Creative Activity and Research Day - CARD (1)
- Discovery Day - Prescott (1)
- Faculty Research Day (1)
- Grace Peterson Nursing Research Colloquium (1)
- Huskies Showcase (1)
- National Training Aircraft Symposium (NTAS) (1)
- National Youth Advocacy and Resilience Conference (1)
- Oklahoma Research Day Abstracts (1)
- Posters-at-the-Capitol (1)
- S.C. Water Resources Conference (1)
- Student Symposium (1)
- UNO Student Research and Creative Activity Fair (1)
- Undergraduate Research Symposium - Prescott (1)
- Western Research Forum (1)
- File Type
Articles 1 - 30 of 74
Full-Text Articles in Entire DC Network
Soil Responses To One-Season Winter Cover Crops, Mckenna Morgan, Iin Handayani
Soil Responses To One-Season Winter Cover Crops, Mckenna Morgan, Iin Handayani
Posters-at-the-Capitol
Soil Responses to One-Season Winter Cover Crops
McKenna Morgan and I. P. Handayani
Hutson School of Agriculture Murray State University, KY, USA
Abstract
In regions like western Kentucky where wooded lots are common there is a growing interest in how to utilize them so that land profits can be maximized. The frequently poor soils in wooded areas due to erosion and lack of ground cover vegetation often cause complications in the creation of pasture areas. Therefore, the objective of this study was to assess the effect of growing winter cover crops on soils to prepare for pasture systems in the …
Changes In Business Core & Accounting Course Requirements: Aacsb Influences, Marie Archambault, Jeffrey Archambault, Jean Price
Changes In Business Core & Accounting Course Requirements: Aacsb Influences, Marie Archambault, Jeffrey Archambault, Jean Price
Faculty Research Day
This study explores the business core requirements and accounting program requirements of universities accredited by the Association to Advance Collegiate Schools of Business International (AACSB) and those without such accreditation during both 1996/97 and 2012/13 academic years. The sample of 50 universities consists of 25 with AACSB accreditation and 25 without AACSB accreditation during the 1996/97 academic year. Differences are examined in the courses and credit hours required in various courses between the two types of universities as well as changes in these programs between the two time periods. The changes that have occurred between 1996/97 and 2012/13 are compared …
Viability Of Zero-Based Budgeting Methods In The City Of Albuquerque, Justin P. O'Shea
Viability Of Zero-Based Budgeting Methods In The City Of Albuquerque, Justin P. O'Shea
Shared Knowledge Conference
This project’s objective is to study and propose an alternative budgeting method for use by the City of Albuquerque’s municipal government. Zero-base budgeting (ZBB) is a modern government budgeting process that allocates funds starting from a base of zero for operating units and requires annual justification of all resource and service items in the budget. Although traditional ZBB is rare in practice, local and state governments in the United States are starting to utilize elements of ZBB and are incorporating ZBB methods into their current budgeting process. Interannual variability in economic standing and resultant municipal revenues has prompted the City …
Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport
Creating A Workplace Culture Of Civility And Respect: Preventing Unlawful Harassment And Discrimination, Rose Davenport
Shared Knowledge Conference
This research project identifies a plan to study best practices addressing unlawful workplace harassment and discrimination in New Mexico-based hospital healthcare systems. Initially, this project focusses on Presbyterian Healthcare Services and the University of New Mexico Hospital, with the possibility of including other local healthcare systems. In light of recent developments from “#MeToo” and “Time’s Up” movements, the issues of unlawful sexual harassment and discrimination are hot topics in today’s society and need to be more openly addressed by all levels of an organization, in order to identify these issues head-on and hopefully prevent them from continuing to occur in …
Of Expectations And Experiences: The Moderating Effect Of Valenced Expectations On Enjoyment Of A Positive Vs. Negative Experience, Molly C. Mcgehee
Of Expectations And Experiences: The Moderating Effect Of Valenced Expectations On Enjoyment Of A Positive Vs. Negative Experience, Molly C. Mcgehee
Shared Knowledge Conference
Some extant literature argues that expectations drive enjoyment of experiences, while other literature argues that expectations only comparatively influence enjoyment. The current work addresses this discrepancy and demonstrates that while positive expectations do result in favorable enjoyment of experiences, negative expectations result in the comparative process suggested by others.
Contemporary Trends In Banking, Bashkim Nuredini, Muhamet Gërvalla
Contemporary Trends In Banking, Bashkim Nuredini, Muhamet Gërvalla
UBT International Conference
Over the recent decades, serious changes occurred in the economic, technological and social development, having reflected on banking operations. Changes ensuing today in the field of banking are of utmost significance. Banks are becoming multifunctional or in a certain fashion, are becoming genuine department stores of modern age. The globalization of financial and banking flows is realized by conceiving a new banking concept, due to bank adjustment to the new conditions of management. The traditional bank role has been evidently altered, hence banks in present-day conditions, apart from the standard banking operations, conduct a major number of unconventional banking operations, …
Training Employees To Stay: T&D In Retaining Talent, Megan M. Waite, Troi N. Robinson-Moss, Sydney M. Kopelic, Shawn Bergman
Training Employees To Stay: T&D In Retaining Talent, Megan M. Waite, Troi N. Robinson-Moss, Sydney M. Kopelic, Shawn Bergman
River Cities Industrial and Organizational Psychology Conference
The employee-driven market and “war for talent” demand organizations be increasingly competitive in maintaining the best workforce possible. Furthermore, factors such as millennial “job hopping,” employees leaving because of fears of layoffs and downsizing, and exiting the company without documenting valuable knowledge are all reasons to seek methods to decrease turnover. Organizations can use strategic and evidence-based training and development (T&D) practices to retain talent and prevent the loss of institutional knowledge. This session will discuss how T&D can be used to reduce involuntary turnover in organizations and cover how self-paced training, error management training (EMT), and the use of …
An Approach To The Capacity Management Of The Public Health Institutions: University Clinical Centre Of Kosova Case Study, Ylber Limani, Marigona Markaj
An Approach To The Capacity Management Of The Public Health Institutions: University Clinical Centre Of Kosova Case Study, Ylber Limani, Marigona Markaj
UBT International Conference
This research aims the evaluation of the state of capacity management condition in the public and private health enterprises, as well as its impact on the overall performance, on the quality of services provided, and on achieving enterprise strategic objectives. The supposition is that enterprise capacity in health sector face deficiency on strategic planning. The research model includes a combination of qualitative and quantitative methods in order to examine the problem more intensely. The research is conducted by interviewing respondents engaged in health public and private enterprises management. Capacity management has to do capacity design, planning and organizing, as well …
Sale Of Personal Successful In The Context Of Marketing, Hamëz Rama
Sale Of Personal Successful In The Context Of Marketing, Hamëz Rama
UBT International Conference
Huge development of science and technology at the beginning of this century has affected directly in economic development, the appearance of a rich offer on the market the increase in living standards, the contemporary and quality way of life, etc., personal sales gave a new dimension, quality and new content. By leaving behind the way the traditional sales distribution, the new concept of sales, ranging from sales through the slot, mail, shopping centers, internet "e-bay", etc. introduced radical changes to this concept in communication between seller and buyer. These qualitative changes not only in the spatial view, time of the …
Organizational Alignment Through Leadership Proficiency And Human System Interventions, Kristin Weger, Raeshaun Jones, Lisa Matsuyama, Michael Buford, Jarielle Prince, Sarah Rose Stough
Organizational Alignment Through Leadership Proficiency And Human System Interventions, Kristin Weger, Raeshaun Jones, Lisa Matsuyama, Michael Buford, Jarielle Prince, Sarah Rose Stough
River Cities Industrial and Organizational Psychology Conference
Across many organizations, agencies and programs have been tasked with building, training, and retaining the workforce needed. Yet, only few organizations have succeeded in their efforts by creating a culture in which workforce preferences align and overarching leadership support is provided. Such a cultural transformation requires not only a behavioral shift from employees, but especially from those in leadership positions, in order to break from the typical way that organizations have long encouraged them to behave. Although the importance of leadership has been emphasized in previous literature, no consistent description of leadership attributes or promising application of human system interventions …
Assessment Of Education, Attitudes And Financial Behavior Towards Financial Decision-Making - The Case Of Students With Economic Aid, Perseta Grabova, Meril Canameri, Merlina Guni, Jona Hoxha
Assessment Of Education, Attitudes And Financial Behavior Towards Financial Decision-Making - The Case Of Students With Economic Aid, Perseta Grabova, Meril Canameri, Merlina Guni, Jona Hoxha
UBT International Conference
In today's society, individuals face financial pressures since a very young age. International studies in the field of behavior and financial literacy have shown that individuals who acquire financial knowledge at an early age will be able to manage their money, make the right financial decisions, and con-tribute to the financial stability of their country. Other studies argue that limited financial literacy is an important obstacle for low-income households to require products and financial services as they do not know or are unfamiliar with such products and services and consequently, they cannot obtain them. By analyzing the perception of the …
The Impact Of Entrepreneurship And Strategic Management In Kosovo Sme Sector, Enver Krasniqi, Sehare Maliqi, Dea Krasniqi
The Impact Of Entrepreneurship And Strategic Management In Kosovo Sme Sector, Enver Krasniqi, Sehare Maliqi, Dea Krasniqi
UBT International Conference
This paper examines the impact of Entrepreneurship Activities and Strategic Management in SME sector in Kosovo. The subject was developed based on a broad literature and practices in the SME development sector, and the great importance of strategic activities in regards of firms’ growth.
While preparing the paper, various methods were utilized for researching and studying strategic economic development, with the focal points in SME development. It is well known that the purpose of strategic development for Entrepreneurship is to develop the capacity for local economic development, to strengthen the future of economy and life quality for all citizens. During …
Trends And Challenges Of Export Performance In The Republic Of Macedonia, Nehat Ramadani, Violeta Madzova
Trends And Challenges Of Export Performance In The Republic Of Macedonia, Nehat Ramadani, Violeta Madzova
UBT International Conference
Republic of Macedonia, as a small and open economy, continuously works on improving its export performance, aiming not only to increase the quantity and value of the its total export, but also to improve the export quality, hereby moving the export structure from dominant traditional export products to new capital intensive goods. However, despite successful integration of Macedonian exporters into European supply chains, there is a significant room for improvement in the overall quality of export performance. The paper aims to give empirical evidence of the selected performance indicators of the Macedonian exports over a ten years period. It’s used …
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.
Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady
Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady
KSU Proceedings on Cybersecurity Education, Research and Practice
Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue …
Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy
Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy
KSU Proceedings on Cybersecurity Education, Research and Practice
The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs’. Flexibility in …
Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black
Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black
KSU Proceedings on Cybersecurity Education, Research and Practice
The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results …
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley
KSU Proceedings on Cybersecurity Education, Research and Practice
ABSTRACT
The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.
Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau
Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America …
Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards
Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards
KSU Proceedings on Cybersecurity Education, Research and Practice
The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address this …
A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson
A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson
KSU Proceedings on Cybersecurity Education, Research and Practice
Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best quality …
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros
KSU Proceedings on Cybersecurity Education, Research and Practice
Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
KSU Proceedings on Cybersecurity Education, Research and Practice
In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …
Car Hacking: Can It Be That Simple?, Bryson Payne
Car Hacking: Can It Be That Simple?, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full …
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …
Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy
Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy
KSU Proceedings on Cybersecurity Education, Research and Practice
Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the …
Digital Identity, Philip Andreae
Digital Identity, Philip Andreae
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger
Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Six Things I Wish New Employees Knew, Brian Albertson
Six Things I Wish New Employees Knew, Brian Albertson
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
Why Networks Still Matter, Tim O'Neill
Why Networks Still Matter, Tim O'Neill
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.