Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

Reaction Of Currencies To Trade War, Thanh Huong Tra Nguyen Oct 2018

Reaction Of Currencies To Trade War, Thanh Huong Tra Nguyen

Undergraduate Research

Recently, China has announced plans for reciprocal tariffs on $50 billions of 106 products that imported from the United States as the second response to President Donald Trump’s increasing tariffs on Chinese exports. Only in a few months, the two influential countries have consecutively announced punishment policies on each other’s exports in order to protect their advantages. The economic war between the two most powerful economies have great impact not only on currencies of themselves but also on those of other countries. After each policy was announced, different countries have their currencies fluctuated differently. The change in exchange rate is …


Strategic Signaling And New Technologically Superior Product Introduction: A Game-Theoretic Model With Simulation, Madjid Tavana, Debora Di Caprio, Francisco J. Santos-Arteaga Aug 2018

Strategic Signaling And New Technologically Superior Product Introduction: A Game-Theoretic Model With Simulation, Madjid Tavana, Debora Di Caprio, Francisco J. Santos-Arteaga

Business Systems and Analytics Faculty Work

User acceptance of technology is essential to determine its success. The current paper incorporates the main properties of the technology acceptance models (TAMs) developed by management scholars into a pre-commitment signaling duopolistic framework, where two competing firms must decide the level of technological improvement of the products being introduced. As a result, the corresponding equilibria of the duopolistic technological games will be determined by demand-based factors, providing a novel approach and complementing the current supply-based economic and operational research models developed in the literature. The proposed model will be simulated numerically to illustrate the strategic optimality of the update process …


A Model For The Role Of Information Technology Leaders In Disaster Recovery Planning And Organizational Resilience, Varun Vuppala, Rasoola Tyler May 2018

A Model For The Role Of Information Technology Leaders In Disaster Recovery Planning And Organizational Resilience, Varun Vuppala, Rasoola Tyler

Mathematics and Computer Science Capstones

Natural and man-made disasters in the past several years have resulted in millions in damages and losses. Despite this, disaster recovery is often not considered by boards as a priority. This paper will detail the current research on organizational resilience in relation to disaster recovery. It will cover the best practices for IT leaders to prepare for disasters and make their organizations more resilient. It will also show how IT leaders can work to convince their boards to invest in disaster recovery planning and how they can build organizational resilience culture in their organizations through a structured organizational culture change …


Security Management For Mobile Devices Of Higher Education, Kala Battle May 2018

Security Management For Mobile Devices Of Higher Education, Kala Battle

Mathematics and Computer Science Capstones

Mobile learning has made a major impact on the security of Learning Management Systems (LMS) in higher education. The advancements in mobile technology have made mobile learning one of the top trending topics regarding education and technology. Students appreciate the convenience and flexibility that mobile learning offers. However, there is an added concern with the security in mobile learning. Instructors and students have little say in what software will be used in mobile learning. This paper will address the issues surrounding security management in LMS platforms, the basics of the Family Educational Rights and Privacy Act (FERPA), and the best …


Beneficial Ownership: Tracking The True Owners Of Business Accounts, Angela Lintag-Ihde May 2018

Beneficial Ownership: Tracking The True Owners Of Business Accounts, Angela Lintag-Ihde

Economic Crime Forensics Capstones

Bank accounts are a popular place to hide and move illegal funds. Many banks offer private banking or wealth management services, to customers with more than $1,000,000. That provides premier banking services as well as a confidential, safe, and legal haven. With these services is a heightened money laundering risk. The Federal Financial Institutions Examination Council (FFIEC) of Bank Secrecy Act/Anti-Money Laundering (BSA/AML) Examination Manual specifically states that privacy and confidentiality are important elements of private banking relationships. “Private Banking and Wealth Management services are vulnerable to money laundering schemes that include: private bankers as client advocates; powerful clients including …


A Close Look At Audit Standards And Best Practices How To Validate The Existence Of An Asset, Luis Lebron May 2018

A Close Look At Audit Standards And Best Practices How To Validate The Existence Of An Asset, Luis Lebron

Economic Crime Forensics Capstones

A comparative analysis will be conducted seeking to identify how to obtain sufficient evidence to determine the existence of an asset within an organization during an independent audit. The external auditor is often regarded as the “gatekeeper” of the financial markets which has a fiduciary duty to its clients. (Choy, Fields, & King, 2008) Accounting firms are required by operation of law to act in an ethical manner and have a social responsibility to protect the interest of the public. However, there exists an ongoing issue in the performance of audits by larger firms. In a recent study conducted by …


A Novel Three-Stage Distance-Based Consensus Ranking Method, Nazila Aghayi, Madjid Tavana May 2018

A Novel Three-Stage Distance-Based Consensus Ranking Method, Nazila Aghayi, Madjid Tavana

Business Systems and Analytics Faculty Work

In this study, we propose a three-stage weighted sum method for identifying the group ranks of alternatives. In the first stage, a rank matrix, similar to the cross-efficiency matrix, is obtained by computing the individual rank position of each alternative based on importance weights. In the second stage, a secondary goal is defined to limit the vector of weights since the vector of weights obtained in the first stage is not unique. Finally, in the third stage, the group rank position of alternatives is obtained based on a distance of individual rank positions. The third stage determines a consensus solution …


X-Inefficiency In Monopolies, Emily Nowlan Apr 2018

X-Inefficiency In Monopolies, Emily Nowlan

HON499 projects

This paper takes a case study approach to studying the efficiency and causes of decline for monopoly firms. The focus of the analysis will be on two firms: IBM, and Xerox. The main causes of failure studied will be financial issues, mismanagement, and regulatory cases. One theory is that, as monopolies operate, one begins to see a differential between growth of profits and expenditures. Thus, the firms become “fat and slow.” The company may also become bogged down with overhead, attempting to maintain unsustainable and unnecessary levels of employment. Compounding this issue, many managers fail to accurately predict the movement …