Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Business

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia Dec 2019

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia

Communications of the IIMA

This paper explores issues of accessibility in Web design, including the applicability of various federal statutes such as the Americans with Disabilities Act of 1990 (ADA) and Section 508 of the Rehabilitation Act of 1973. A pilot study of six private sector websites is completed to gauge the effectiveness of current accessibility standards as interpreted from the ADA and Section 508. Evaluating these sites shows that even after 25 years, sites still have accessibility issues.


Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari Dec 2019

Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari

Communications of the IIMA

Retail industry has suffered some of the biggest data breaches in recent times. Organizations are deploying technological tools to limit data breaches. However, purely technological solution is not going to be sufficient because human-factor is often considered to be the weakest link in Information Security. In this paper, the authors investigate the behavioral aspect of information security in a retail setting. Specifically, the factors that influence compliance behaviors to information security policies (ISP) in retail stores are identified. Attitude, awareness, and sanctions are proposed as key variables that influence compliance intentions to ISP. The authors test the proposed model using …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker Sep 2019

What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker

Communications of the IIMA

Media analyses of soccer statistics and game play has accelerated in recent years. This is evident in visual displays of ball and player tracking, average player locations and distances they run. These media depictions aim to be attractive, entertaining and informative for viewers. But are such statistics predictive of goal scoring and match outcome? To answer this question we review the sixty-four matches of the 2014 World Cup and examine nine common match statistics, and others, to evaluate their predictive value for goal production and match outcome.


The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck Sep 2019

The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck

Communications of the IIMA

The difficulty of students transferring from Further Education Colleges and progressing to Higher Education Universities in the United Kingdom is a well-known problem. The study presented here focuses on the ability of students to begin to engage with the subject of computer programming on transferring after 2 years of study at a further education college into a 3rd year of a university programme. There is an assumption that there are environmental factors within the change that cause the problems of student engagement with their studies. The findings of this study concurs with difficulties for many students with beginning to …


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng Sep 2019

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …


Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan Feb 2019

Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan

Communications of the IIMA

The evolution of the economy has gone through the agricultural era, followed by the industrial era focusing on the production of goods and the postindustrial era accentuated by information and services. The new economy of the 21stcentury is characterized by knowledge and relationships. Galbreath (2002) described the transition to a new economic order driven by knowledge and based on the value of relationships. Customer knowledge management (CKM) synthesizes the customer knowledge and relationships assets in the extended enterprise to create advantages for companies in a very competitive market. Technologies have changed alongside the economy. Big Data and Cloud …


Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler Feb 2019

Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler

Communications of the IIMA

Cybersecurity is a national concern for the United States, yet the cybersecurity workforce is currently understaffed. Military capability planning can be used as a framework to evaluate and establish cybersecurity workforce development models, such as the National Initiative for Cybersecurity Education (NICE) Framework. These models can be used in a way that provides the nation a methodology to enhance human resource capabilities and fill the cybersecurity workforce deficit. Furthermore, this report discusses the importance of establishing and enhancing strategic recruitment initiatives that can be utilized for building a cybersecurity pipeline.


Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye Feb 2019

Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye

Communications of the IIMA

Over the past few decades, most of the existing methods for analysing large growing knowledge bases, particularly Big Data, focus on building algorithms and/or technologies to help the knowledge-bases automatically or semi-automatically extend. Indeed, a vast number of such systems that construct the said large knowledge-bases continuously grow, and most often, they do not contain all of the facts about each process instance or elements that can be found within the process base. As a consequence, the resultant process models tend to be vague or missing value datasets. In view of such challenge, the work in this paper demonstrates that …