Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

California State University, San Bernardino

Theses/Dissertations

2020

Articles 1 - 15 of 15

Full-Text Articles in Business

Online Strategies For Small Businesses Affected By Covid-19: A Social Media And Social Commerce Approach, Julianne Itliong Dec 2020

Online Strategies For Small Businesses Affected By Covid-19: A Social Media And Social Commerce Approach, Julianne Itliong

Electronic Theses, Projects, and Dissertations

The Covid-19 pandemic has altered the way many US citizens work, live, and interact with one another. Many rules and regulations have been put in place by government officials to slow the spread of the virus because of how contagious it is in social settings. Because of these rules and regulations, many small businesses were forced to temporarily close their doors to the public in order to comply with the rules of social distancing and the ban on large gatherings. For some businesses, this shift from physical sales to digital sales has always been a part of their business models, …


Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed Dec 2020

Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed

Electronic Theses, Projects, and Dissertations

With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.

The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …


Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi Jul 2020

Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi

Electronic Theses, Projects, and Dissertations

Suicide is one of the leading health concerns in United States among adolescents and the presence of suicidal ideation (SI) is quite high, with ~20-30% of adolescents reporting it at some point. Though we have seen growth and development in the prevention of suicide, there is limited research on the ability to identify the adolescents which might be at risk for SI. The objective behind the project is to identify adolescents with SI using machine learning.

The project shows statistics from different articles on adolescents in the U.S. For this study, adolescent data was taken from NSDUH 2018. Moreover, detailed …


Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar Jul 2020

Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar

Electronic Theses, Projects, and Dissertations

Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …


Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams Jun 2020

Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams

Electronic Theses, Projects, and Dissertations

This culminating experience project explores geofencing as a potential risk and advantageous tool within the field of cybersecurity. Geofencing is defined here as a software program feature that allows its users to collect and deliver data within a specific targeted geographical area. Currently used applications are addressed from a cybersecurity mindset by applying the hacker methodology to demonstrate the potential threat. Additionally, geofencing is applied to the NIST Cybersecurity Framework to demonstrate potential benefits for cyber defence. Finally, vulnerabilities associated with applying geofencing to cyber defense, and its potential implications on privacy and cybersecurity laws is discussed and recommendations for …


Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon Jun 2020

Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon

Electronic Theses, Projects, and Dissertations

Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …


Communication Competence Training Within Minority-Owned Small Businesses, Shirleena Racine Baggett Jun 2020

Communication Competence Training Within Minority-Owned Small Businesses, Shirleena Racine Baggett

Electronic Theses, Projects, and Dissertations

Business ownership is imperative in correcting economic issues for demographic groups subjugated to discrimination, inequality, poverty, and other harmful disadvantages. This project supports the idea that building communication competence within minority-owned small businesses and nonprofit organizations, will significantly increase achievement of long-term sustainability and success. The solution is not only creating communication training tailored for minority entrepreneurs, but to allow access in feasible and tangible ways. This study begins by defining communication and explaining its function to assist in moving past the narrative of communication interaction as “talking and listening,” but instead a concept rooted in logic, theoretical analysis, and …


Getting To The Heart Of Professional Development And Employee Engagement Among Non-Teaching Personnel In Higher Education: An Appreciative Inquiry Into The Influential Role Of A Staff Development Center, Rowena Casis-Woidyla Jun 2020

Getting To The Heart Of Professional Development And Employee Engagement Among Non-Teaching Personnel In Higher Education: An Appreciative Inquiry Into The Influential Role Of A Staff Development Center, Rowena Casis-Woidyla

Electronic Theses, Projects, and Dissertations

Despite the importance and incorporation of staff development in higher education, there is limited research on the availability and use of learning opportunities for non-teaching personnel (NTP) in the form of professional development. Work performed by NTP in higher education is critical to university operations. Without professional development and engagement opportunities, NTP lack visibility, disengage and ultimately may separate from institutions of higher education. Deliberate organizational efforts to provide access to new learning opportunities and promote personal growth among NTP is the development and institutionalization of centers for professional development, also called staff development centers and staff training and professional …


Preventing Ransomware Within Local Government Agencies: A Public Policy Analysis Perspective, Bruce Cole Jun 2020

Preventing Ransomware Within Local Government Agencies: A Public Policy Analysis Perspective, Bruce Cole

Electronic Theses, Projects, and Dissertations

Cases of ransomware within local government agencies have become prevalent over the last decade. While solutions to ransomware are available, local government agencies are slow to implement such measures. As a result, local government agencies are among the most famous victims of ransomware. This project attempts to provide an answer for ransomware prevention within these agencies from a public policy perspective. To formulate this answer, the issues local governments face in combating ransomware are compared to the solutions implemented in the private sector. This project then analyzes the mechanisms local governments have at their disposal to implement such solutions through …


Working Women’S Cognitive Attributions And Self-Perceptions After Experiences Of Subtle Sexism And Internalized Sexism, Amanda Bain Jun 2020

Working Women’S Cognitive Attributions And Self-Perceptions After Experiences Of Subtle Sexism And Internalized Sexism, Amanda Bain

Electronic Theses, Projects, and Dissertations

Subtle sexism is a pervasive problem for working women due to the normative, unequal and ambiguous treatment they experience. The ambiguous nature further exacerbates the experience because women are unsure where to place causal attribution and often times are left blaming themselves. Similarly, internalized sexism is rooted in the same limiting beliefs of traditional female stereotypes as subtle sexism. Both experiences and internalized sexism hinder working women’s cognitive internal attributions and their self-perceptions of value and competence. Subtle sexism and internalized sexism can be particularly damaging because they are hard to recognize as negative and thus, when never remedied, can …


Investigating Work Engagement And Affective Commitment Through A Multi-Dimensional Work Underload Scale, Mediated By Work-Related Boredom, Jessica Clemons Jun 2020

Investigating Work Engagement And Affective Commitment Through A Multi-Dimensional Work Underload Scale, Mediated By Work-Related Boredom, Jessica Clemons

Electronic Theses, Projects, and Dissertations

Previous research on workload has primarily approached work underload as unidimensional focusing on either repetitive monotonous tasks or the employee’s perception of their current workload. Researchers have focused on work related outcomes, such as job engagement and organizational commitment, as consequences of those perceptions. Recently, work related boredom has been measured alongside work underload as precursors to aforementioned outcomes. In the current study we investigated if a recently developed, more complex, multidimensional scale of work underload, including desire for more work and expectation of more work, would better explain the relationship between perceived work underload, and work-related boredom, job engagement, …


Analysis Of Us Accidents And Solutions, Swapnil Kisan Nikam Mar 2020

Analysis Of Us Accidents And Solutions, Swapnil Kisan Nikam

Electronic Theses, Projects, and Dissertations

Reducing traffic accidents is an essential public safety challenge all over the world; therefore, accident analysis has been a subject of much research in recent decades.

The objective of the project is to analyze the US accident data from 50 states to inform the US government agencies and the general public on trends and possible causes of traffic accidents and what could be done to reduce them. The analysis include number of accidents by year, number of accidents by state, best time to travel by month, day and hour, accident-prone area in each state, factors responsible of the accidents like …


Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray Mar 2020

Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray

Electronic Theses, Projects, and Dissertations

The Malcolm Baldrige Framework for Performance Excellence outlines best practices for strategic and operational processes. Enterprises that achieve the award do so not for the award itself – but for the transformation that takes place along the way. Although the fifty-page summaries of Malcolm Baldrige award winning organizations are posted on the National Institute of Science and Technology (NIST) (https://www.nist.gov/baldrige/award-recipients), the process and effort used to create such applications has not been documented. This project documents and provides an internal perspective and lessons learned from the early stages of the Malcolm Baldrige journey for a medium size financial institution. The …


Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar Mar 2020

Sharepoint Design And Implementation - An Enterprise Architecture Solution, Zachary Mckellar

Electronic Theses, Projects, and Dissertations

Having a solid enterprise architecture foundation is critical to the success and growth of a business. Considering the volatility of many industries, businesses must consistently grow, innovate, and advance their technology to ensure high availability of their products and systems. Seeing that projects fail more than they succeed, it stresses the importance of having a strong enterprise architecture (Schneider, 2020). With this said, it is imperative that a business creates a proper collaborative environment to ensure that all future implementations and developments within their environments are successful. Without these foundations, an enterprise will fail to grow.

This project provides an …


Workplace Communication: Examining Leader-Member Exchange Theory, Uncertainty Avoidance, And Social Styles, Guy Robinson Mar 2020

Workplace Communication: Examining Leader-Member Exchange Theory, Uncertainty Avoidance, And Social Styles, Guy Robinson

Electronic Theses, Projects, and Dissertations

There are numerous books, articles, and papers written about communicating in the work environment; especially how to communicate to the work force at large. However, not much is written or studied concerning the dyadic communication between supervisor and subordinate. The paper will use leader-member exchange theory (LMX) as a basis for communication between supervisor and subordinate. LMX gives steps to aid in the communication process and helps guide the relationship between a supervisor and subordinate; however, there are two other elements in need of attention. In order to communicate effectively with their subordinates, supervisors need an understanding of the subordinates’ …