Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1233

Full-Text Articles in Business

Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford Jan 2023

Teaching By Practice: Shaping Secure Coding Mentalities Through Cybersecurity Ctfs, Jazmin Collins, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges have largely focused on cybersecurity as a general topic. Further, most in-school CTF challenges are designed with technical institutes in mind, prepping only experienced or upper-level students in cybersecurity studies for real-world challenges. Our paper aims to focus on the setting of a liberal arts institute, emphasizing secure coding as …


Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur Jan 2023

Lightweight Pairwise Key Distribution Scheme For Iots, Kanwalinderjit Kaur

Journal of Cybersecurity Education, Research and Practice

Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation operations for interactive authentication between the server and the IoT devices. Predominantly, the authentication is carried out by the server. It is observed that the algorithm is resilient against man-in-the-middle attacks, forward secrecy, Denial of Service (DoS) attacks, and offers mutual authentication. It is also observed that the …


Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman Jan 2023

Reinventing Cybersecurity Internships During The Covid-19 Pandemic, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as cybersecurity workers prepared to do research, lead multidisciplinary, technical teams, and educate stakeholders and community members. CAP also reinforces leadership skills so that the next generation of cybersecurity professionals becomes a sustainable source of management talent for the program and profession. The remote curriculum innovatively builds non-technical professional skills (communications, teamwork, leadership) for cybersecurity research …


Risk Perceptions About Personal Internet-Of-Things: Research Directions From A Multi-Panel Delphi Study, Paul M. Di Gangi, Barbara A. Wech, Jennifer D. Hamrick, James L. Worrell, Samuel H. Goh Jan 2023

Risk Perceptions About Personal Internet-Of-Things: Research Directions From A Multi-Panel Delphi Study, Paul M. Di Gangi, Barbara A. Wech, Jennifer D. Hamrick, James L. Worrell, Samuel H. Goh

Journal of Cybersecurity Education, Research and Practice

Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We conduct a sequential, mixed-methods study using multi-panel Delphi and thematic analysis techniques to understand consumer risk perceptions. The results identify four themes focused on data exposure and user experiences within IoT devices. Our thematic analysis also identified several emerging risks associated with the evolution of IoT device functionality and its potential positioning …


Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid Jan 2023

Cybersecurity Continuity Risks: Lessons Learned From The Covid-19 Pandemic, Tyler Fezzey, John H. Batchelor, Gerald F. Burch, Randall Reid

Journal of Cybersecurity Education, Research and Practice

The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both topics simultaneously. This study identifies blind spots experienced by businesses as they navigated through the difficult time of the pandemic by using data collected during the height of the COVID-19 pandemic. One major shortcoming was that most continuity and cybersecurity plans focused on single-axis threats. The COVID-19 pandemic resulted …


Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course, Lesley J. Stainbank Prof, Thanesha Reddy Jankeeparsad, Aarthi Algu Jan 2023

Using Accounting Software For Teaching And Learning In A Second-Year Accounting Course, Lesley J. Stainbank Prof, Thanesha Reddy Jankeeparsad, Aarthi Algu

The African Journal of Information Systems

The aim of this paper is to report students’ perceptions on whether the use of accounting software enhances their understanding of the accounting cycle, and improves their information technology skills. Kolb’s experiential learning cycle is used to argue that offering a concrete learning experience increases effective learning. The study uses survey research to determine students’ perspectives of the usefulness of using accounting software in enhancing their understanding of the accounting cycle in a real business environment. The results show that students perceived the accounting example they used in the accounting software training to have some benefits in helping their understanding …


A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger Dec 2022

A Low-Cost, Low-Power, Scada Testbed Solution For Secure Remote Monitoring, Connor Berger

Symposium of Student Scholars

Similar to software application systems adopted by companies and businesses for product logging, payroll, human resources, Supervisory Control and Data Acquisition (SCADA) systems control the distributed processes with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system. SCADA systems severely lack the appropriate security and hack prevention measures. We propose a low cost, low power SCADA testbed solution for secure remote monitoring. The goal of this research is to implement and test the testbed’s security by emulating attack vectors on both hardware components and communication channels to probe the …


Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu Dec 2022

Organizing Digital Platforms And Customer Needs For Digital Service Innovation, Gamel O. Wiredu

The African Journal of Information Systems

Digital organizations have become highly dependent on digital platforms and customer needs as key resources for digital service innovation. These resources in the competitive environment are making and shaping innovation of digital services because, though external, they remain central to digital organizations’ strategic innovation and competitiveness. Yet, how and why organizing these resources influences digital service innovation is under-explained in the literature. This paper, based on an empirical study and grounded theory methodology, addresses this limitation. It explains that digital service innovation occurs through two complementary types of organizing, namely: foundational knowledge organizing by combining digital platforms and customer needs, …


2022 - The Third Annual Fall Symposium Of Student Scholars Dec 2022

2022 - The Third Annual Fall Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Fall 2022 Symposium of Student Scholars, held on November 17, 2022. Includes abstracts from the presentations and posters.


Reducing The Negative Effects Of Uncontrollable Factors When Designing New Courses, Nusser Raajpoot, Ran Liu Dec 2022

Reducing The Negative Effects Of Uncontrollable Factors When Designing New Courses, Nusser Raajpoot, Ran Liu

Atlantic Marketing Journal

This paper seeks to introduce a novel course design method in academic literature. It uses advanced experimental designs to capture student preferences. It also makes a distinction between controllable and uncontrollable design factors and seeks to minimize the negative impact of uncontrollable design factors, ensuring a successful course introduction. We propose and test a design method that combines Taguchi experimental designs with discrete choice estimation where choice probabilities are used as input data for Taguchi's inner and outer arrays. Design efficiency is measured by calculating signal to noise (S/N) ratio, which accounts for both mean and variance of choice probabilities. …


Brides And Bridal Stores: Online Or Brick-And-Mortar, Libby C. Jones, Ismet Anitsal, Melek Meral Anitsal Dec 2022

Brides And Bridal Stores: Online Or Brick-And-Mortar, Libby C. Jones, Ismet Anitsal, Melek Meral Anitsal

Atlantic Marketing Journal

This paper explores the growing global bridal industry and the different trends, traditions, and aspects of specific countries' bridal industries. It outlines western and eastern traditions and how globalization contributes to their spread. A deeper focus is dedicated to the United States' bridal industry and the issues brick-and-mortar bridal boutiques face as more brides have started shopping at online bridal stores. The relationship between brick-and-mortar and online bridal stores is explored based on various propositions about the bridal industry's emerging challenges. These propositions include trust issues in the retail environment, convenience, selection of bridal gowns in different retail formats, incorporating …


Political Reality: Attack Ads Are Here To Stay, Rebecca Dingus, Chanho Song, Richard H. Kolbe, Michael Y. Hu Dec 2022

Political Reality: Attack Ads Are Here To Stay, Rebecca Dingus, Chanho Song, Richard H. Kolbe, Michael Y. Hu

Atlantic Marketing Journal

The primary research questions of this study center on two largely overlooked areas in negative political advertising: (1) Would the sponsor of the attack ad message be better off with a positive message? (2) When one is targeted by an attack ad, how should the attacked candidate respond? M-Turk subjects (n = 1,380) were used to conduct a multi-stage experimental design to capture the dynamic aspects of how subjects react to the use of attack ads in a hypothetical political campaign. In general, subjects did not respond favorably to attack ads, as these negative political messages caused damage to the …


Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa Nov 2022

Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa

Symposium of Student Scholars

Many undergraduate students are not familiar with the research process involved in a book publication proposal. Through this multidisciplinary collaborative research, the faculty intends to minimize this gap by engaging the students in such a process from the early phase of proposal preparation. The student will research and review the past five years of EQUINOX Week* programs focused on Sustainable Development Goals within a collection of local and global initiatives to support a proposal for the EQUINOX proceeding publication.

With an extensive set of qualitative and quantitative data gathered over a span of 5 years. The student will be …


Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms Nov 2022

Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms

The African Journal of Information Systems

Millennials’ advanced knowledge and exposure to product experiences, and irrelevant placement of online advertising has led to an increase of online advertising avoidance. However, effective online advertising design may assist in establishing more positive sentiments towards digital forms of marketing communication. The study used the visual rhetoric theory as the theoretical basis to examine millennial consumer attitudes. The main research aims were to propose an online advertising design quality model, and to ascertain the influence of online advertising design quality on millennial consumer attitudes. The study employed a quantitative research design via an empirical online survey. Online advertising design quality …


Value Propositions Of Implemented E-Government Projects: Towards Developing A Framework From A Systematic Review, Yusuf Ephraim Chidama, Chidi Ononiwu Nov 2022

Value Propositions Of Implemented E-Government Projects: Towards Developing A Framework From A Systematic Review, Yusuf Ephraim Chidama, Chidi Ononiwu

The African Journal of Information Systems

This study aims to develop a framework that identifies and measures the value propositions of implemented e-Government projects. Consequently, the study conducted a systematic review using a concept-centric and thematic approach by reviewing 84 articles as primary research data. In doing so, it identified: (1) effective public organizations; (2) quality service delivery; (3) open government and democratic value; and (4) social value and well-being. Furthermore, two gaps were identified, namely a dearth of studies on the measures well as actualization, and sustainability of the value propositions. The study synchronized the identified value propositions to develop a framework for value propositions …


Principles Of Information Security, Alison Hedrick Oct 2022

Principles Of Information Security, Alison Hedrick

KSU Distinguished Course Repository

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.


Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt Aug 2022

Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt

African Conference on Information Systems and Technology

With the growing popularity of Work-From-Home (WFH) organizations have been required to adapt their ‘ways of working’ strategies to the ‘new normal’, as both employees and organizations aim to reap the benefits of WFH. This has resulted in organizations and their leadership teams needing to create WFH strategies for their organizations. With many of these WFH strategies developed in isolation of all stakeholders, with the feasibility of these WFH strategies remain uncertain. Therefore, this research task has reviewed literature to develop a conceptual model that describes how leadership teams can make informed feasible WFH strategy decisions, through the concept of …


Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi Aug 2022

Factors That Influence The Implementation Of Information And Communication Technology Inclusive Design Practices In Organisations, Faizel Ebrahim, Salah Kabanda, Guidance Mthwazi

African Conference on Information Systems and Technology

Inclusive design in information and communication technology (ICT) is the development of information and communication technology artifacts that are accessible and easy to use for as many people as possible. Human diversities must be considered when producing these inclusive design artifacts. It is not only important for abled people but also extends to people with disabilities, the elderly and anybody challenged with using these artifacts. Yet, few designers and developers adopt inclusive design methodologies in their practice. This study seeks to identify and understand the factors that influence the implementation of inclusive design practices in organisations. The methodology was based …


The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda Aug 2022

The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda

African Conference on Information Systems and Technology

Banks need to remain competitive in the ever-changing business environment. Millennials are one of the largest customer segments with a large digital and mobile appetite; as a result, they form a natural target for banks. To increase their customer base, banks need to ensure that their customer experience strategy caters for these young customers in accordance with their expectations. This study explores factors that influence customer experience in mobile banking and how this experience influences customer loyalty to their bank. This study used a mixed-methods strategy and collected data from 344 mobile banking users via an online survey questionnaire and …


Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen Aug 2022

Access To Technology And Data In Smart Cities For South African Digital Citizens, Brenda Scholtz, Anthea Van Der Hoogen

African Conference on Information Systems and Technology

Lack of access to technologies and quality data are key challenges for reducing the digital divide and developing digital citizens to support Smart City initiatives. This paper reviews efforts towards Smart Cities and access to smart technology and Open Data in developed economies globally and in South Africa. Reviews of literature and websites were conducted and the Qualitative Content Analysis method was used to analyse the data. The contributions are the commonalities and differences between Smart City initiatives in developed economies and in South Africa. The findings revealed that in developed countries the focus was mainly on e-services, citizen engagement, …


Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua Aug 2022

Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua

African Conference on Information Systems and Technology

This paper synthesised the literature on the adoption of Information and Communication Technology within Africa. The purpose was to determine factors (reported by the literature) determining technology adoption and use, in Africa. The paper used the systematic literature review. The study analysed the factors descriptively. Based on the analysis, the following are the main five factors reported to affect the adoption and use of Information Technology in Africa: Lack of ICT knowledge, unreliable infrastructure, high cost of adoption, the perceived usefulness of ICT, and the perceived ease of use. The government and technology implementing organisation has the key role to …


Recreation Programming, Anne Demartini Aug 2022

Recreation Programming, Anne Demartini

KSU Distinguished Course Repository

This course will provide students with an overview of recreation programming across the age spectrum and diverse populations. Leisure programming trends and niche marketing are examined as well. This course also facilitates the understanding and application of the recreation program process for leisure delivery systems including an introduction to activity plans, program design, delivery and evaluation.

This class uses a hybrid format which gives students some flexibility and independence. It also allows for "flex time" for our high impact learning activies. The class performs service learning directly related to the course topic through volunteering with recreation programs both on campus …


The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson Aug 2022

The 1-2-3 Of Market Research For Business Startups: A Case Study In Library Instruction, Daniel Le, Marie-Louise Watson

Georgia Library Quarterly

This article describes a practical way to teach student entrepreneurs to search and use market data for business startup plans. The conventional way of teaching students to find articles and business intelligence based on a class assignment can be challenging for many students without an academic business background. This library instruction approach sequentially uses three databases enriched with business data and infographics to support the development of critical thinking for student entrepreneurs. It teaches entrepreneurial personality support, analysis, visualization, and market mapping.


The Legal And Ethical Environment Of Business, Cristen W. Dutcher Aug 2022

The Legal And Ethical Environment Of Business, Cristen W. Dutcher

KSU Distinguished Course Repository

This course is an introduction of the relationship between law and the business environment. The material includes an overview of the areas of law that are relevant to business, including torts, crimes, contracts, the Constitution, antitrust, real estate, court procedure, government regulation, intellectual property and remedies. The class also addresses ethical issues that may arise in a business’s internal and external activities. Many of these topics will overlap such as computer crime legislation, liability for errors in data or programming for an IT system, or the ethics of revealing information to gain an advantage in business.


Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson Jul 2022

Cybersecurity Educational Resources For K-12, Debra Bowen, James Jaurez, Nancy Jones, William Reid, Christopher Simpson

Journal of Cybersecurity Education, Research and Practice

There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational resources as possible. The resources provided are broken into five categories: 1) Career Information, 2) Curriculum, 3) Competitions, 4) CyberCamps, and 5) Labs and Gaming. Each resource listed has a link, the K-12 levels that are supported, whether the resource is free or has a …


Digital Contact Tracing And Privacy, Mahdi Nasereddin, Edward J. Glantz, Galen A. Grimes, Joanne Peca, Michelle Gordon, Mike Bartolacci Jul 2022

Digital Contact Tracing And Privacy, Mahdi Nasereddin, Edward J. Glantz, Galen A. Grimes, Joanne Peca, Michelle Gordon, Mike Bartolacci

Journal of Cybersecurity Education, Research and Practice

Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information gathered. In general, their effectiveness varied globally, where users expressed privacy concerns associated with sharing identity, illness, and location information. This paper reviews these issues in deployments across Asia, Europe, and the United States. The goal is to begin a discussion that improves the design and development …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim Jul 2022

Assessing The Practical Cybersecurity Skills Gained Through Criminal Justice Academic Programs To Benefit Security Operations Centers (Socs), Lucy Tsado, Jung Seob "Scott" Kim

Journal of Cybersecurity Education, Research and Practice

Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as security operations centers (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, cybersecurity operations centers, fusion centers, and corporate command centers, among many other names. The concept of centralized function within an organization to improve an organization’s security posture has attracted both the government and the private sectors to either build their own SOCs or hire third-party SOC companies.

In this article, the need for a multidisciplinary approach to cybersecurity education at colleges …


The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai Jul 2022

The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai

The African Journal of Information Systems

COVID-19 forced many universities to shift from traditional face-to-face or blended learning, to full online learning. The sudden shift was not easy for both students and lecturers, who had to adapt to the new learning mode. This study aimed to evaluate the acceptance and use of online learning of university students in the law faculty at a South African university during the COVID-19 pandemic. The study employs the extended unified theory of acceptance and use of technology (UTAUT2) model particularised to the online learning context in a country with a developing economy. An online survey was administered to the student …


Looking For Inclusivity In Higher Ed? Start In The Classroom!, Michelle C. Carpenter Jun 2022

Looking For Inclusivity In Higher Ed? Start In The Classroom!, Michelle C. Carpenter

Atlantic Marketing Journal

The rallying cry for inclusivity has never been greater in higher education. As professors look for ways to ensure all sociocultural perspectives are present in their course activities, lectures and discussions, many questions remain beginning with who should be addressing these issues as well as how exactly this might be accomplished. Increasingly more faculty are opening their classrooms to this discussion, even if diversity is not a required element of their course. Exit interviews conducted in Spring 2021 with senior marketing majors at a Mid Atlantic University provided an opportunity for students to share their perceptions about inclusivity and what …