Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Business

The Story Of Taste: Using Eegs And Self-Reports To Understand Consumer Choice, Charnetta Brown, Adriane B. Randolph, Janée N. Burkhalter Aug 2014

The Story Of Taste: Using Eegs And Self-Reports To Understand Consumer Choice, Charnetta Brown, Adriane B. Randolph, Janée N. Burkhalter

Adriane B. Randolph

The authors investigate consumers’ willingness to switch from a preferred manufacturer brand to an unfamiliar private-label brand if taste is perceived as identical. Consumer decisions are examined through recordings of electrical brain activity in the form of electroencephalograms (EEGs) and self-reported data captured in surveys. Results reveal a willingness of consumers to switch to a less-expensive brand when the quality is perceived to be the same as the more expensive counterpart. Cost saving options for consumers and advertising considerations for managers are discussed.


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Copyright Liability And Performing Rights Organizations In The United States And India: A Comparative Analysis, Elyria Kemp, Chinna Natesan, Leila Borders Jun 2014

Copyright Liability And Performing Rights Organizations In The United States And India: A Comparative Analysis, Elyria Kemp, Chinna Natesan, Leila Borders

Aberdeen L Borders

Music has become a central element in consumer marketing for its ability to influence consumers’ attitudes and behaviors. Research has shown that music adds value to the retail and service environments. In most instances, however, the cost to use music extends beyond the expenses incurred from purchasing CDs, stereo equipment or engaging musicians to perform. Most industrialized nations have statutes that protect music under copyright. As a result, businesses that use music to enhance the consumer’s service experience are responsible for obtaining clearance to perform copyrighted music. Performing rights organizations exist in countries all over the world and grant clearance …


Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell May 2014

Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell

Herbert J. Mattord

Organizations rely on password-based authentication methods to control access to many Web-based systems. In a recent study, we developed a benchmarking instrument to assess the authentication methods used in these contexts. Our instrument developed included extensive literature foundation and an expert panel assessment. This paper reports on the development of the instrument and the expert panel assessment. The initial draft of the instrument was derived from literature to assess 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. Following, the criteria within the index were evaluated by an expert panel and the same panel provided opinions …


Information Security Governance For The Non-Security Business Executive, Michael E. Whitman, Herbert J. Mattord May 2014

Information Security Governance For The Non-Security Business Executive, Michael E. Whitman, Herbert J. Mattord

Herbert J. Mattord

Information security is a critical aspect of information systems usage in current organizations. Often relegated to the IT staff, it is in fact the responsibility of senior management to assure the secure use and operation of information assets. Most managers recognize that governance is the responsibility of executive management. The primary objective of governance can be achieved when the members of an organization know what to do, how it should be done, as well as who should do it. The focus on governance has expanded to include information systems and information security. This article offers value to the executive by …


Factors Of Password-Based Authentication, Herbert J. Mattord, Yair Levy, Steven Furnell May 2014

Factors Of Password-Based Authentication, Herbert J. Mattord, Yair Levy, Steven Furnell

Herbert J. Mattord

Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS. This approach explored how authentication practices can be measured in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. This report explores the criteria that are required to define these component areas.


The Impact Of Operating System Obsolescence On The Life Cycle Of Distributed Teams, Herbert J. Mattord, Tridib Bandyopadhyay May 2014

The Impact Of Operating System Obsolescence On The Life Cycle Of Distributed Teams, Herbert J. Mattord, Tridib Bandyopadhyay

Herbert J. Mattord

Operating System obsolescence is widely considered an important factor when architectural choices are made during the planning phase of systems development and maintenance. In this work, we seek to understand the importance that planners actually ascribe to this attribute in practice, and ask probing questions to the managers, developers, and analysts of systems in industry in the form of a survey. Initial results suggest that obsolescence is neither perceived as a critical factor during planning for systems development, nor is it viewed as a major contributor to the total cost of operation of client/server systems. However, the survey does identify …


Intangible Investments And The Pricing Of Corporate Sga Expenses, Rongbing Huang, Gim S. Seow, Joe S. Shangguan May 2014

Intangible Investments And The Pricing Of Corporate Sga Expenses, Rongbing Huang, Gim S. Seow, Joe S. Shangguan

Rongbing Huang

This study examined whether the market fully prices the reported Selling, General, and Administrative (SGA) expenses when this item includes an intangible investment component. For a sample of intangible investment-intensive firms, we showed that their SGA expenses benefit future operating performances. Evidence suggests some degree of market inefficiency in the pricing of SGA expenses and the intangible investment component. Furthermore, the financial analysts do not appear to appreciate fully the future benefits of the component in their earnings forecasts. Finally, the pertinent disclosures in firms’ annual reports are so inadequate as to attenuate the market mispricing, suggesting a significant room …


Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury Mar 2014

Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury

Pratyush Bharati

Firms are increasingly employing social media to manage relationships with partner organizations, yet the role of institutional pressures in social media assimilation has not been studied. We investigate social media assimilation in firms using a model that combines the two theoretical streams of IT adoption: organizational innovation and institutional theory. The study uses a composite view of absorptive capacity that includes both previous experience with similar technology and the general ability to learn and exploit new technologies. We find that institutional pressures are an important antecedent to absorptive capacity, an important measure of organizational learning capability. The paper augments theory …