Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur Desai, Lucy Ojode Apr 2018

Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur Desai, Lucy Ojode

Southwestern Business Administration Journal

Despite being a norm in contemporary organizations including in academia, there is limited understanding how multimedia technology use might impact learning. We have also seen a rise in the use of social media applications such as Facebook, tweeter, Instagram, skype, flickr, and blogging among students, but it is unclear the extent to which the academe embraces these applications. In this study, we examine the potential role of multimedia technology and social media use in the learning process. We explore the potential implications for instruction and on student learning of the marriage between multimedia technology and social media use. Focusing on …


Leveraging Decision Making In Cyber Security Analysis Through Data Cleaning, Chen Zhong, Hong Liu, Awny Alnusair Apr 2018

Leveraging Decision Making In Cyber Security Analysis Through Data Cleaning, Chen Zhong, Hong Liu, Awny Alnusair

Southwestern Business Administration Journal

Security Operations Centers (SOCs) have been built in many institutions for intrusion detection and incident response. A SOC employs various cyber defense technologies to continually monitor and control network traffic. Given the voluminous monitoring data, cyber security analysts need to identify suspicious network activities to detect potential attacks. As the network monitoring data are generated at a rapid speed and contain a lot of noise, analysts are so bounded by tedious and repetitive data triage tasks that they can hardly concentrate on in-depth analysis for further decision making. Therefore, it is critical to employ data cleaning methods in cyber situational …