Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Business

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani Dec 2021

Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani

Electronic Theses, Projects, and Dissertations

Customer relationship management acts as the backbone of marketing. For any company marketing is the most important sector to promote a company and attract customers. Email marketing is one of the most effective ways of digital marketing. However, the cost of design and development is time consuming and redundant. Marketers and project managers are frequently unassertive about how to solve these issues. Although there are blogs, articles and services available for marketing email development, the lack of research in the effectiveness of email building architecture bolsters the need for this study. The project presents an architecture that modularizes the way …


A Study Of Penetration Testing Processes And Tools, Sushmitha Reddy Mamilla May 2021

A Study Of Penetration Testing Processes And Tools, Sushmitha Reddy Mamilla

Electronic Theses, Projects, and Dissertations

With cybercrimes on the rise, cybersecurity has become very important today. Every company is eager to avoid cybercrimes like data breaches and hacking. To prepare for such incidents, every company has many protection systems in place. However, the best method to test the strength of these protective measures is penetration testing. Every pen tester must consider many factors like budget, time, and scope of the organization’s penetration testing to choose just the right tool for each phase of the process. This project analyzes the most efficient scanning tool by testing them in a Kali Linux environment.


How The Level Of Job Complexity Impacts The Gender Wage Gap Across Occupations, Zytlaly Magaña Corona May 2021

How The Level Of Job Complexity Impacts The Gender Wage Gap Across Occupations, Zytlaly Magaña Corona

Electronic Theses, Projects, and Dissertations

The present study focused on unpacking the social and structural aspects of job complexity to better understand its effects on the gender wage gap. Previous research on the job complexity-compensation dynamic has primarily focused on cognitive complexity. Job complexity across occupations were examined using work activity data from O*NET and merging it with the Current Population Survey data sponsored by the U.S. Bureau of Labor Statistics (N=67,003). Results revealed that higher complexity jobs in this study yielded greater wage disparities across different occupations as predicted. Furthermore, physical activities and gaining knowledge from the Generalized Work Activities were the two most …


Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr. Jan 2021

Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.

Journal of International Technology and Information Management

Using the case study of an Indian Technology and Outsourcing Service Provider, SmartKey (real but renamed company), a technology vendor to a global healthcare provider, this paper analyses offshore outsourcing issues using IT-enabled services to gain deeper insights needed to understand the core conflict and propose a well-reasoned solution approach. Reasoning, the conscious thought process leading to a well-justified decision, is an important managerial skill required for making dynamic decisions, resolving conflicts, and thereby developing human resources. This paper explores Goldratt’s Evaporating Clouds (ECs) as a systematic approach to reasoning in particular, and as a system for developing human resource …


An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza Jan 2021

An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza

Journal of International Technology and Information Management

The key to success in the 21st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the …


The Future Of Api (Application Programming Interface) Security: The Adoption Of Apis For Digital Communications And The Implications For Cyber Security Vulnerabilities, Alison Munsch Phd, Peter Munsch Mba Jan 2021

The Future Of Api (Application Programming Interface) Security: The Adoption Of Apis For Digital Communications And The Implications For Cyber Security Vulnerabilities, Alison Munsch Phd, Peter Munsch Mba

Journal of International Technology and Information Management

Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management.

This research gathered data to investigate why APIs are vulnerable. The research explored the different …