Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Business

Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley Dec 2011

Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley

Undergraduate Honors Capstone Projects

Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …


The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay Aug 2011

The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The purpose of this study was to test the effectiveness of the readiness assurance process of team-based learning (TBL) in virtually isolated settings. Many Internet sites offer courses for adults to use on their own without access to mentors or other learners. However, educational theory suggests that people learn better with others than by themselves. The focus of this investigation was whether the inclusion of the readiness assurance process would increase participants’ levels of learning based on Bloom’s revised taxonomy within the limits of virtual isolation.

In this study an experimental pretest-posttest design was employed. Using a 2- day mini-course …


The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar May 2011

The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.

The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …