Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Kennesaw State University

2016

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 84

Full-Text Articles in Business

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2016

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt Dec 2016

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord Dec 2016

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Capital Structure In The Family Firm: Exploring The Relationship Between Financial Sources And Family Dynamics, Diego G. Velez Nov 2016

Capital Structure In The Family Firm: Exploring The Relationship Between Financial Sources And Family Dynamics, Diego G. Velez

Doctor of Business Administration Dissertations

How a company structures its capital greatly affects its strategic options and its strategic decisions according to contemporary thinking. However, while there is ample literature on how publicly held companies’ capital should be structured, less is known about private companies. Additionally, one or more members of a single family typically own the majority of private companies, and unlike public companies, family dynamics influence these firms’ non-financial and financial goals and strategic decisions. This overlap of family dynamics into the business arena complicates conventional approaches or at least makes conventional approaches more difficult to apply.

This dissertation focuses on privately held, …


Recognizing And Exploiting New Opportunities In Times Of Chaos And Unintended Impacts, Ryan Matthews Nov 2016

Recognizing And Exploiting New Opportunities In Times Of Chaos And Unintended Impacts, Ryan Matthews

Doctor of Business Administration Dissertations

Select entrepreneurs are successful for a reason. They have been able to use their alertness and prior knowledge, among other skill sets, to identify and exploit new opportunities. However, when new opportunities are identified outside of their area of expertise, will they choose to pursue these opportunities, or stick to the behaviors that are most comfortable? While several studies have been conducted looking at the characteristics of the entrepreneur, or the experiences faced by the entrepreneur, there is a gap in the current literature when combining these two elements. The current literature lacks an understanding as to how the environment …


Winning And Other Determinants Of Revenue In North America's Major Professional Sports Leagues, John Charles Bradbury Nov 2016

Winning And Other Determinants Of Revenue In North America's Major Professional Sports Leagues, John Charles Bradbury

Faculty and Research Publications

This study investigates recent determinants of revenue in North America’s four major professional sports leagues. Estimates reveal that revenue is positively associated with winning in baseball (MLB), basketball (NBA), and hockey (NHL), but not in football (NFL). The returns to winning are not diminishing as commonly assumed, which casts doubt on the uncertainty of outcome hypothesis, and differences across leagues are consistent with revenue sharing arrangements. Estimates also indicate a strong negative relationship between stadium age and revenue, which is consistent with observed rapid replacement of sports stadiums. The results have several important implications for economic models of sports leagues.


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord Oct 2016

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

KSU Proceedings on Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. The article includes a summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the article shares results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Fitting Consumer Needs To Perceived Product Value: The Example Of Apple Versus Samsung Products, Yi-Chia Wu, Arturo Z. Vasquez-Parraga Oct 2016

Fitting Consumer Needs To Perceived Product Value: The Example Of Apple Versus Samsung Products, Yi-Chia Wu, Arturo Z. Vasquez-Parraga

Atlantic Marketing Journal

This study explores the fitting of consumer needs to product perceived value using the example of two lines of competitive products in the area of communication electronics, Apple products versus Samsung products. Five types of needs regarding digital communication and three types of related product value are evaluated for these two brands in order to know if product value differences have a distinctive effect on consumer needs. The results show that Apple users are more satisfied with their needs being fulfilled by Apple products than Samsung users getting satisfied with Samsung products. Moreover, Apple users emphasize the emotional value of …


Cueing The Customer Using Nudges And Negative Option Marketing, Clarence W. Vonbergen, Courtney Kernek, Martin S. Bressler, Lawrence S. Silver Oct 2016

Cueing The Customer Using Nudges And Negative Option Marketing, Clarence W. Vonbergen, Courtney Kernek, Martin S. Bressler, Lawrence S. Silver

Atlantic Marketing Journal

Abstract

Nudges—subtle, covert, and often unobtrusive interventions that take advantage of individuals’ mental shortcuts and biases—frequently change the context of people’s choices and in so doing influence individual and societal behavior. They have become fashionable in recent years, and the ability of such phenomena to bring about significant change for relatively little cost has captured the imagination of governments and businesses. One simple yet potent nudge empowered by the status-quo bias that has received increased attention involves default rules which specify the condition imposed on persons when they fail to make a decision or choice. Marketers have used default options …


Cutting The Cord—A Marketing Case: An Examination Of Changing Tv Viewership, John E. Crawford Oct 2016

Cutting The Cord—A Marketing Case: An Examination Of Changing Tv Viewership, John E. Crawford

Atlantic Marketing Journal

Consumers have more choices for TV programming and how that content is acquired than at any other time in the history of television. Through an action referred to as cord-cutting, many consumers are choosing to drop their cable or satellite programming providers in favor of lower-priced and more consumer-friendly programming providers such as Netflix, Hulu, and others. Consumer choices are being driven by many factors, including economics, lifestyle, technological developments, and social trends. This case discusses the cord-cutting trend and how it is impacting consumer choices and the business of providing television content to consumers. The case can be used …


“You Can Count On It!” Using County Auditors' Data For Marketing Research Group Projects: A Case Study, Julie M. Szendrey Oct 2016

“You Can Count On It!” Using County Auditors' Data For Marketing Research Group Projects: A Case Study, Julie M. Szendrey

Atlantic Marketing Journal

The purpose of this research was to develop an efficient and effective process for marketing educators to use in the teaching of an undergraduate marketing research course. Instructors should consider the use of readily available auditors’ data for pedagogical usage in a semester-long courses. The research process posed by Neuman (2007) was followed in the development of a course assignment utilizing the use of auditors’ data. Students analyzed and presented their project results using SPSS software tools learned during the course and through videos provided by the American Marketing Association certificate offerings. Final group presentations also included the discussion of …


Motivations In The Fine-Art Market: A Self-Determination Theory Approach, Jonathan P. Leavell Oct 2016

Motivations In The Fine-Art Market: A Self-Determination Theory Approach, Jonathan P. Leavell

Atlantic Marketing Journal

The purpose of this paper is to demonstrate the theoretical value of incorporating constructs from self-determination theory (SDT) into the analysis of the motivations within the fine-art market. The motivations of buyers and artists are examined in light of a controlling-informational event gradient. Moureau’s and Sagot-Duvauroux’ (2012) artist business-model framework is used to provide the context for marketing’s role in facilitating communication along the various motivational interactions of the gradient. Opportunities for further research are presented.


How Customer Shopping Motivation Influences Perceived Design Of The Retail Environment, Julie C. Steen Oct 2016

How Customer Shopping Motivation Influences Perceived Design Of The Retail Environment, Julie C. Steen

Atlantic Marketing Journal

This research proposal extends the Mehrabian-Russell stimulus-organism-response framework to examine how two different hedonic shopping motivations—adventure and gratification—influence a customer’s perceptions of the retail environment. Specifically, the paper examines perceived design of the retail environment. The paper also examines how perceived design of the retail environment influences pleasure and arousal. Since there is not an accepted measure for perceived design, the paper offers a comprehensive list of potential items to measure perceived design.


Turning Guest Speakers' Visits Into Active Learning Opportunities, Vassilis Dalakas Oct 2016

Turning Guest Speakers' Visits Into Active Learning Opportunities, Vassilis Dalakas

Atlantic Marketing Journal

While guest speakers have a lot to offer, the traditional format of their visits to marketing classes may hinder student engagement. This paper describes an idea used in marketing classes intended to increase active learning and to maximize impact of guest speakers’ visits. It involves creating assignments for the students to prepare prior to a speaker’s visit. As a result, the students end up preparing thoughtful questions, they are engaged in their discussion with the speaker, and they make a more conscious effort to link course material to the insight from the speaker.


Internet Diffusion And Adoption In Cuba, Randi L. Priluck Oct 2016

Internet Diffusion And Adoption In Cuba, Randi L. Priluck

Atlantic Marketing Journal

The purpose of this paper is to examine Internet adoption at a time of increasing change for the Cuban marketplace. As the Cuban economy begins to open to new business formats one key driver of economic will be access to communications networks. This paper explores the penetration of Internet connectivity in Cuba as relations with the United States thaw. The theories of diffusion of innovations, cultural dimensions of adoption and market and political realities are employed to better understand the pace of Internet adoption as the Cuban economy continues to develop.


College Students Use Social Networking Sites For Sharing With Friends, But Guess Who Else Is Looking?, Elizabeth C. Alexander, Fred Mader, Deanna Mader Oct 2016

College Students Use Social Networking Sites For Sharing With Friends, But Guess Who Else Is Looking?, Elizabeth C. Alexander, Fred Mader, Deanna Mader

Atlantic Marketing Journal

Abstract - Jobvite, a recruiting platform for the social web, reports from their annual 2012 survey of recruiters that 92% of U.S. companies are using social networking sites (SNS) for hiring purposes (Jobvit, 2012). Career Builder reported in 2009 that 45% of employers were using SNS to screen and research applicants (CareerBuilder, 2009). It is important that faculty and support staff working to place students, and the students themselves, understand the developments and practices in the use of social networking sites for job search and recruiting and the best methods, as well as detriments when marketing themselves. This study examines …


Using Focus Groups And Correspondence Analysis To Explore The Relationship Between Millennials’ Online Behavior And Their Opinions Of Online Reviews, James E. Stoddard, Michael Dotson, Neel Das Oct 2016

Using Focus Groups And Correspondence Analysis To Explore The Relationship Between Millennials’ Online Behavior And Their Opinions Of Online Reviews, James E. Stoddard, Michael Dotson, Neel Das

Atlantic Marketing Journal

This paper explores the relationship between millennials’ online behavior and their opinions of online reviews via the use of focus groups and correspondence analysis. The proposition was that millennials’ online behavior (including search behavior) is likely to have an effect on how they view online reviews. The correspondence analysis results suggest that millennials who spend more time online peruse a greater number of products. Further, relationships were found between millennials’ time online and factors influencing review trustworthiness as well as millennials’ time online and factors affecting review memorability. It is noteworthy to suggest that focus group analysis can be enhanced …


The Effect Of Advertorial Format And Copy Length On Attitudes Of Female (Target) And Male (Non-Target) Audiences, Cynthia B. Hanson Oct 2016

The Effect Of Advertorial Format And Copy Length On Attitudes Of Female (Target) And Male (Non-Target) Audiences, Cynthia B. Hanson

Atlantic Marketing Journal

This study investigates the effect of the advertorial format and ad copy length on ad and brand attitude. Results of a 2 (advertorial versus non-advertorial) by 2 (light versus moderate copy length) study indicate that the advertorial format generated more favorable ad and brand attitudes for the female (target) subjects, but less favorable attitudes for the male (non-target) subjects. A marginally significant gender by copy length interaction suggests a differential effect of copy length for the male sample, as well: ad and brand attitudes were higher for lighter copy ads for the female sample but lower for the male sample. …


The Scent Of Change: A Case Study, William K. Foxx, Melissa C. Northam, Corlette S. Burns Oct 2016

The Scent Of Change: A Case Study, William K. Foxx, Melissa C. Northam, Corlette S. Burns

Atlantic Marketing Journal

Decisions about entering into a new business venture involve a variety of considerations, despite the level of experience an entrepreneur has. This case presents the story of a business owner Bennett Gage and his decisions concerning whether or not he should enter into a business where canines are used to detect bed bugs in hotels. This case study gives the reader an opportunity to wrestle with some of the many questions that are part of entering into the creation of a new service.


Media Influence On Opinion About Man-Made Global Warming As Moderated By Individual Ecological Orientation And Personal Experience, George W. Stone Dr. Oct 2016

Media Influence On Opinion About Man-Made Global Warming As Moderated By Individual Ecological Orientation And Personal Experience, George W. Stone Dr.

Atlantic Marketing Journal

AbstractThe purpose of the study was to assess the opinions of two equal groups of QUALTRICS panelists, one having lived through a CAT 5 storm and the other not, on their respective beliefs about the effect man-made global warming has had on increasing the intensity of major weather events. The authors identified individuals in each group based on individual eco-orientation. The author then tested for opinion differences based on three factors related to eco-orientation as well as the role played by the media on influencing opinions related to man’s impact on increasing storm intensity


Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard Oct 2016

Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard

KSU Proceedings on Cybersecurity Education, Research and Practice

Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC learning …


Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer Oct 2016

Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer

KSU Proceedings on Cybersecurity Education, Research and Practice

Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain …


Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala Oct 2016

Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala

KSU Proceedings on Cybersecurity Education, Research and Practice

The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.


“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar Oct 2016

“Not All Friends Are Equal”: Friendship Classification For Defending Against Social Engineering Attacks, Munene W. Kanampiu, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is a serious security threat to Online Social Networks (OSNs). Identity theft, impersonation, phishing, and deception are some of the social engineering-based attacks that exploit vulnerabilities of interpersonal relationships of online users. As a result, relationships in OSNs need to be thoroughly examined. In this vein, we propose a relationship categorization model to evaluate relationship strength based on graph-theoretic properties and social network analysis (SNA) methods. For example, in Facebook, users may be categorized into close-neighbors, distant-neighbors, celebrities (influential by admiration), authority (influential by power), and loners. Close-neighbors category will help identify a set of trustworthy actors while …


Smart City Security, Shawn Ralko, Sathish Kumar Oct 2016

Smart City Security, Shawn Ralko, Sathish Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues …


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor Oct 2016

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Proceedings on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …


Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid Oct 2016

Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown Oct 2016

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

KSU Proceedings on Cybersecurity Education, Research and Practice

Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.

The purpose of this research is to examine how information security policy quality and …