Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Business

Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting Apr 2024

Teaching Digital And Social Media Marketing Through Community Engagement: An Online Asynchronous Class Longitudinal Case Study, Joie Hain, Anita Whiting

Atlantic Marketing Journal

Abstract - While marketing educators have identified the need for community engagement projects within the marketing curriculum, there is little research on implementing a community engagement project in marketing, especially in digital marketing. Therefore, this longitudinal case study aims to demonstrate how a community engagement project was implemented into digital and social media marketing classes at one university. This case study discusses (1) how the community engagement project was developed, (2) the work conducted, and (3) the results provided to the client. This case study also provides feedback from both students and the client. Overall, students were pleased with the …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews Jan 2024

Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews

Atlantic Marketing Journal

With the decline in the number of traditional college-aged students, understanding the degree selection process is important for departments, colleges, and universities alike. For students, selecting the proper major early is also beneficial since it reduces time in school and tuition costs. Therefore, a better understanding of the degree selection process is worthwhile. Survey data was collected from 1,177 undergraduates at a southeastern U.S. university. Survey questions included major selection influences and other attitude and demographic items. The highest ranked reason is interest and passion followed by fit with personality type. This was similar for students who changed majors. External …


Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen Oct 2023

Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen

Journal of Cybersecurity Education, Research and Practice

One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …


Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn Sep 2023

Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn

African Conference on Information Systems and Technology

Micro-credential providers are increasing both in diversity and volume. However, employers are still concerned about their role in skill development. This study aimed to understand how micro-credentials can assist employees in skills development. A systematic literature review was conducted for studies published between (2016 to 2023). Thirty-two sources were included in the final review. After that, five recommendations for employers when adopting micro-credentials were constructed first by (1) defining the value of formal and informal education. (2) exploring micro-credentials as a tool for skills development. (3) encouraging organisations to collaborate with other institutions. (4) encouraging continuous personalised learning, known as …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın Jul 2023

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek Jul 2023

A Systematic Mapping Study On Gamification Applications For Undergraduate Cybersecurity Education, Sherri Weitl-Harms, Adam Spanier, John Hastings, Matthew Rokusek

Journal of Cybersecurity Education, Research and Practice

Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework. Cyber Security Operations (CSO) education is no exception. CSO education traditionally requires comprehension of complex concepts requiring a high level of technical and abstract thinking. By properly applying gamification to complex CSO concepts, engagement in students should see an increase. While an increase is expected, no comprehensive study of CSO gamification applications (GA) has yet been undertaken …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu Jul 2023

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson Aug 2022

The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson

Georgia Library Quarterly

This article describes a practical way to teach student entrepreneurs to search and use market data for business startup plans. The conventional way of teaching students to find articles and business intelligence based on a class assignment can be challenging for many students without an academic business background. This library instruction approach sequentially uses three databases enriched with business data and infographics to support the development of critical thinking for student entrepreneurs. It teaches entrepreneurial personality support, analysis, visualization, and market mapping.


Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim Jul 2022

Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim

Journal of Cybersecurity Education, Research and Practice

Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.

In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …


Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting Jun 2022

Investigating The Impact On Student Engagement From Converting Face-To-Face Classes To Online In Response To Covid-19, Anita Whiting

Atlantic Marketing Journal

Paper investigates the impact on student engagement from converting traditional face-to-face classes to online in response to Covid-19. In particular, this study investigated the impact of conversion to online on four different types of student engagement: (1) participation engagement, (2) emotional engagement, (3) skill engagement, and (4) performance engagement. Survey data were collected from 160 business students who had their face-to-face classes converted to online due to Covid-19. Results of study show that all four types of student engagement significantly declined when classes were converted to online. Participation engagement declined the most while performance engagement declined the least. Non-traditional students …


Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane Mar 2022

Beyond The Ivory Tower: Supporting The Graduate Nonacademic Career Search Through Library Partnerships, Sarah Lane

Transforming Libraries for Graduate Students

For a variety of reasons, some graduate students ultimately determine that they would like to pursue a career outside of the ivory tower. At the same time, these scholars may be uncertain about how to translate their expertise into a nonacademic position. At Cornell University, a partnership between the Management Library and the Careers Beyond Academia office has allowed librarians to utilize their unique expertise to assist graduate students throughout their job search.

At the Management Library, business librarians have historically worked with the Career Management Center of the Johnson Graduate School of Management to assist MBA and graduate business …


Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs. Mar 2022

Transitioning To A Master's Degree Granting University: Implications For Librarian Instruction, Outreach, And Collection Development, Mary A. Aquila Ms., :Laken T. Smith Ms., Jennifer L. Wolfe Mrs.

Transforming Libraries for Graduate Students

Athens State University is located in Athens, Alabama in the northern part of Alabama bordering Giles County, Tennessee. It is one of the only upper-level universities serving juniors, seniors, and graduate students in the country. The student body consists primarily of non-traditional and first-generation students. In 2014, Athens State University was approved to offer a graduate program in Global Logistics and Supply Chain Management in the College of Business by the Alabama Commission on Higher Education (ACHE). Since then, Athens State University has expanded its graduate offerings to include five additional fields of study: Strategic Healthcare Management and Administration, Strategic …


Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen Jan 2022

Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen

Journal of Cybersecurity Education, Research and Practice

As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across Virginia and how cybersecurity programs can cater to these needs. It also seeks to propose an evidence-based approach for improving the existing cybersecurity programs so that they can become more inclusive and student-ready. A survey of 251 college students in four higher-education institutions in Virginia showed that while there are common patterns …


Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach Jul 2021

Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach

The African Journal of Information Systems

The focus of the study was to determine the factors that influence the acceptance and use of online feedback in an undergraduate module using the modified unified theory of acceptance and use of technology (UTAUT2). The participants were third-year pre-service teachers in the Bachelor of Education degree who were taking a fully online Teaching Studies module, in addition to their specialist subject areas at one of the universities in South Africa. A survey instrument was developed from the original UTAUT2 instrument and modified where appropriate, to fit the formative feedback context. Exploratory factor analysis was used to validate the instrument. …


Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar Jan 2021

Importance-Performance Gap Analysis Of The University Brand Equity Dimensions, Tulay Girard, Musa Pinar

Atlantic Marketing Journal

This study examines the gaps between the importance students place on brand equity dimensions and their perceptions of how well their university performs on each dimension. It also assesses if the brand equity dimensions differ based on student demographics including gender, class level, and their living arrangement. Data were collected from a university in the Midwestern U.S. from undergraduate students. The findings reveal significant gaps between the importance and performance perceptions of students, and that females, students living on campus, and freshman require special


Supporting Mba Students In A Team-Based Experiential Learning Environment, Teresa Williams Mar 2020

Supporting Mba Students In A Team-Based Experiential Learning Environment, Teresa Williams

Transforming Libraries for Graduate Students

The Lacy School of Business at Butler University (Indianapolis) has embraced an experiential approach for the school’s Master of Business Administration (MBA) degree program by combining traditional classroom instruction with opportunities for students to learn through partnerships with local businesses. Beginning with the MBA Gateway Experience course, graduate students are tasked with conducting team research to present informed recommendations to business owners and community leaders. The related support provided by the Butler Business Librarian for MBA students complements the experiential nature of the program by engaging students with the real-world challenges of collecting and evaluating business information for applied problem-solving. …


Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu Mar 2020

Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu

The African Journal of Information Systems

Although considerable literature has grown around cyberbullying, there are still only limited studies on this within developing economies, especially African countries. In particular, studies on cyberbullying in Africa have failed to have a direct focus on the prevalence of this phenomenon among students in universities. Not only does cyberbullying have an emotional-social impact, it has ramifications on the learning process as well. This subject remains of utmost relevance within academia, and a number of institutions continue to grapple with its impact. The study reported here is an exploratory investigation of 396 students from one of the private universities within Nairobi, …


Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas Jan 2020

Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas

Journal of Cybersecurity Education, Research and Practice

Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …


A Guide For Early Career Success In Academic Research, Obinna O. Obilo, William B. Locander, David A. Locander Jan 2020

A Guide For Early Career Success In Academic Research, Obinna O. Obilo, William B. Locander, David A. Locander

Atlantic Marketing Journal

Balancing the research, teaching, and service facets is important to achieving success in academia. Doctoral programs should prepare their students to successfully navigate and balance all three of these facets. We focus on the research facet in this study and draw from the experience of a panel of accomplished researchers within the discipline, to compile a set of guidelines for doctoral students and new faculty. Analyzing the qualitative results from the panel interviews, we find that to ensure success within the research facet, one must effectively manage three emergent focal distinctions; a relationship with: oneself, others, and with the work.


Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson Dec 2019

Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson

Atlantic Marketing Journal

This study re-examines students’ attitudes and preferences to the four primary textbook types (hardback, paperback, loose leaf, and E-book). One hundred eighty-three students currently taking Principles of Marketing from a large public university in the southeastern United States completed the survey. Unlike the 2014 study, where students overwhelming preferred paperback textbooks, even when this textbook is at a higher price than other alternatives, the 2018 study found that the textbook choice depended on if an access code to publisher’s online course materials was required. When access codes were required, students preferred paperback textbooks, followed closely by E-books. When no access …


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


Marketing Competitions: Triumphs And Trepidations, Tyra M. Burton Feb 2019

Marketing Competitions: Triumphs And Trepidations, Tyra M. Burton

Atlantic Marketing Association Proceedings

No abstract provided.


Teaching Traditional College Students Professional Marketing Via Linkedin, Necall Wilson Feb 2019

Teaching Traditional College Students Professional Marketing Via Linkedin, Necall Wilson

Atlantic Marketing Association Proceedings

No abstract provided.


Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson Feb 2019

Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson

Atlantic Marketing Association Proceedings

No abstract provided.


Using Social Media To Improve Student Engagement And Learning, Tommy Hsu Feb 2019

Using Social Media To Improve Student Engagement And Learning, Tommy Hsu

Atlantic Marketing Association Proceedings

No abstract provided.


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …