Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Journal

2018

Discipline
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Business

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona Sep 2018

Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona

The African Journal of Information Systems

Educators’ digital fluency has been noted as one of the most important skill required for effective curriculum delivery in connected classrooms. Research and anecdotal evidence show that even though many Western Cape classrooms have internet connectivity, many of the educators are unable to take advantage of the connectivity for teaching and learning. Hence, this paper focuses on the educators’ digital fluency as a necessary competence for effective curriculum delivery in connected classrooms. The study was done qualitatively. Randomly selected educators from public schools participated in the one-on-one and focus group interviews. Results show that most educators perceive their digital fluency …


Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof. Sep 2018

Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof.

The African Journal of Information Systems

This study seeks to understand the existing interactions between actors of the Kenya Open Data Initiative (KODI), and how the actors’ interests are aligning to achieve openness and transparency of government operations. This study is based on the Callon’s moments of translation framework, which helps in describing the interaction between initiators of a network and other involved actors with the aim of aligning their diverse interests in order to achieve a common goal. KODI comprised of a diverse group of stakeholders from government, private sector, inter-governmental organisation, and civil society. KODI has faced various challenges since its inception in 2011, …


Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe Sep 2018

Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe

The African Journal of Information Systems

SNS platforms are providing simultaneously for hedonic and utilitarian type uses. However, extant research continues to model the SNS usage construct as a simplistic unidimensional construct that fails to adequately reflect the multi-dimensional nature of SNS usage in workplace contexts. This paper contributes by presenting results of a multi-phase process used to develop and validate measures of the deep structure SNS usage construct from both hedonic and utilitarian perspectives. Psychometric tests were conducted using 124 usable responses, and the results show that deep structure usage is best modelled as a reflective second order construct with three first order dimensions reflecting …


Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee Sep 2018

Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee

The African Journal of Information Systems

Recent trends combine smart phones with social networking platforms to bring new opportunities that can enable people to collaborate anywhere and at any time. For example, organisations can be given the opportunity to recruit part-time job seekers such as software developers using social media tools. Previously, collaboration was static in nature, but today loosely enabled collaboration needs to support flexible schedules, ad hoc processes and members that may not be known in advance. Furthermore, current crowdsourcing platforms that enable software developers to contribute their skills to projects do not meet the social needs of participants as they collaborate. This paper …


Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner Sep 2018

Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner

The African Journal of Information Systems

Digital disruption is breaking down long established business models. In most organisations, IT managers are charged with management of technology-enabled change. It is therefore important that IT managers understand the opportunities and challenges posed by digital disruption to aid the organisation's response. The purpose of this study was to explore what South African IT managers perceive, and what their responses (or planned responses) to digital disruption within the context of a financial services organisation are. The study is interpretive, exploratory and qualitative, drawing from situational awareness theory to ground the participants’ perception of digital disruption. The study draws on Disruptive …


An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu Sep 2018

An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu

The African Journal of Information Systems

Organizations thrive on efficient information management systems as they support activities. Hence, these systems need to be protected from attacks that threaten their existence and use. Although non-technical information security ideas have been espoused by researchers, they have excluded the role of organizational communication. As such, this study explains information security from an organizational communication perspective. Drawing upon a framework of discourse and organizational change, we analyze an empirical case of how information security in an organization is implicated by communicative actions, deep structures, and communication traits. The analysis reveals that (1) prevention of security breaches is achieved by structures …


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jul 2018

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz Jul 2018

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins Jul 2018

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding Jul 2018

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …


Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak Jul 2018

Experiential Learning Builds Cybersecurity Self-Efficacy In K-12 Students, Abdullah Konak

Journal of Cybersecurity Education, Research and Practice

In recent years, there have been increased efforts to recruit talented K-12 students into cybersecurity fields. These efforts led to many K-12 extracurricular programs organized by higher education institutions. In this paper, we first introduce a weeklong K-12 program focusing on critical thinking, problem-solving, and igniting interest in information security through hands-on activities performed in a state-of-the-art virtual computer laboratory. Then, we present an inquiry-based approach to design hands-on activities to achieve these goals. We claim that hands-on activities designed based on this inquiry-based framework improve K-12 students’ self-efficacy in cybersecurity as well as their problem-solving skills. The evaluation of …


Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd May 2018

Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd

The African Journal of Information Systems

The study examined the use of digital diary as a tool for enhancing parental school involvement in Tanzania. The development of the digital diary followed eXtreme Programming agile method where 87 parents and 6 teachers from St. Florence school were involved. Parents and teachers were given six months to use the tool before testing for its effectiveness using data from 7 teachers and 156 parents through semi-structured interviews and questionnaires respectively. The study found that the majority of respondents (84.4% of parents and 96.7% of teachers) indicated that the digital diary was useful tool as enabled them to track children’s …


Framework Towards Enhancing Adoption Of Electronic Payment In A Developing Economy: A Case Of Uganda, Samuel Eelu, Agnes Nakakawa May 2018

Framework Towards Enhancing Adoption Of Electronic Payment In A Developing Economy: A Case Of Uganda, Samuel Eelu, Agnes Nakakawa

The African Journal of Information Systems

Usage of electronic payment (e-payment) in developing economies is still limited, yet literature reveals several models and research efforts that explain adoption of innovations associated with information and communication technologies. This paper investigates issues hindering increased adoption of e-payment systems in a developing economy (specifically Uganda), and suggests possible strategic capabilities or interventions that key stakeholders can actualize to address the issues and enhance e-payment adoption. To achieve this, participatory action research was adopted and instantiated by: conducting an exploratory survey to gain relevant insights from target users of e-payment, devising a framework basing on survey findings and a literature-based …


Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello May 2018

Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello

The African Journal of Information Systems

Although there is a steady use of information technology in institutions of higher learning, little is known about the level of information security awareness (ISA) amongst students joining universities in developing countries and more specifically Africa. The purpose of this study was to investigate ISA amongst undergraduate students at a higher education institution in Kenya. The study made use of a quantitative survey approach. Overall, the study findings indicate that majority of the students surveyed did not possess adequate understanding of ISA. Consequently, we submit that there is a strong need to cultivate ISA culture amongst students joining universities in …


Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis May 2018

Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis

The African Journal of Information Systems

We are told that university students are Digital Natives and the diffusion of digital technologies into education holds prospective advantages. However, will students in Africa be prepared to engage with and accept the technology? This study aimed to determine the applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) model within a South African higher education setting and to clarify the factors that are influencing students’ intentions to make use of two digital technologies: an eBook and SLMS. 738 ICT students completed a questionnaire to gauge their responses to Performance expectancy (PEx), Effort expectancy (EfEx), Facilitating conditions …


Two-Pronged Approach To Imbedding Values In Organizations, Evans Lusuli Apr 2018

Two-Pronged Approach To Imbedding Values In Organizations, Evans Lusuli

The Siegel Institute Journal of Applied Ethics

The purpose for this paper is to argue that in order to successfully implement values and develop an ethically conscious or morally intelligent organizations, a two-pronged strategy must be adopted. A two-pronged strategy is an approach that seeks to imbed ethical values at both the organizational level – which, in this case includes the organization’s leadership, and empowering employees at the individual level to do what Mary Gentile (2010) describes in her book, as giving voice to values. Empowering employees to speak their minds when they know what is right is an avenue that enables employees to imbed ethical values …


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …


Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr Apr 2018

Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr

The African Journal of Information Systems

The integration of Internet-based collaborative tools such as Web 2.0 technologies to facilitate the design process has rendered collaborative design a chaotic practice filled with controversy and uncertainty, with the inevitable risk of unintended consequences. The purpose of this study was to trace the sources of design controversy in a Web 2.0 facilitated collaborative design process. The study employed an Actor Network Theory (ANT) methodological framework to explore design controversy in five design teams comprising of 4 to 6 undergraduate engineering students. Data was constituted by following the traces left by the actors, both human and nonhumans, their actions and …


Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi Apr 2018

Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi

The African Journal of Information Systems

Mobile bullying, which is one form of cyberbullying, is escalating in schools in South Africa. Research can contribute to better understanding of the nature of this aggression, and provide guidance in determining appropriate interventions and administration of justice. However, studies into cyberbullying tend to focus mainly on the urban environment. Rural South Africa involves a large percentage of mobile phone users and experiences in relatively different cultural and social-economic conditions. Lack of research on rural mobile bullying calls into question the applicability of existing theories of crime and cyberbullying to the rural context and their effectiveness in guiding legal and …


The Role Of The Transaction Assurance, Perceived Cost And The Perceived Innovation In The Decision To Continue Using Mobile Money Services Among Small Business Owners, Edison Wazoel Lubua Dr, Philip Pretorius Apr 2018

The Role Of The Transaction Assurance, Perceived Cost And The Perceived Innovation In The Decision To Continue Using Mobile Money Services Among Small Business Owners, Edison Wazoel Lubua Dr, Philip Pretorius

The African Journal of Information Systems

The motive of this study is to assess the role of the perceived transaction assurance, perceived transaction cost, and anticipated future innovations to predict the intention to continue using mobile money services. Currently, many models on the intention to continue using the technology are based on frameworks for general technology adoption. This study acknowledges the value of these frameworks, but extended the analysis to include the perceived transaction assurance and the perceived innovation upon testing. Other variables included in the study are as follows: the influence of the customer support, the ease of correcting mistakes, and the comfortability with transaction …


Trends In Manufacturing Inventory Efficiency: 1980-2013, Ahren Johnston Jan 2018

Trends In Manufacturing Inventory Efficiency: 1980-2013, Ahren Johnston

Atlantic Marketing Journal

This study was motivated by Cooke’s 2013 article questioning the inclusion on inventory carrying costs in CSCMP’s Annual State of Logistics Report since it is based on interest rates. This paper explores that question more fully and goes on to look at trends in inventory efficiency based on inventory turnover for U.S. manufacturing firms. Results of the study reveal that there has been a level trend between 1980 and 2013 after firm size is controlled for. Since these results are contradictory to those obtained by looking at inventory carrying costs as a percent of GDP, they suggest the need for …


The Inherently Flawed Relationship Between Physicians And Pharmaceutical Companies’ Gifts: Tanstaafl*, David P. Paul Iii Jan 2018

The Inherently Flawed Relationship Between Physicians And Pharmaceutical Companies’ Gifts: Tanstaafl*, David P. Paul Iii

Atlantic Marketing Journal

Pharmaceutical companies frequently give practicing physicians and physicians-in-training an assortment of free “gifts,” ranging from pens to stethoscopes to continuing medical education. In an ideal world, these gifts would not compromise, or even seem to compromise, physicians’ decision-making. Unfortunately, as we live in a non-perfect world, this paper examines how physicians have been shown to perceive such gifts, the pharmaceutical companies’ position regarding these gifts, what the theory of gift-giving and gift-receiving tells us about this behavior, and what the future may hold as healthcare becomes more transparent.


Generation Solutions Of Lynchburg (B), Francis Record Whitehouse Jr. 5448264 Jan 2018

Generation Solutions Of Lynchburg (B), Francis Record Whitehouse Jr. 5448264

Atlantic Marketing Journal

This case was developed to support classroom discussion of a market choice problem. Students are asked to make a recommendation on the market areas that a small entrepreneurial organization should enter next. Tabular data is provided to support demand estimation for selected geographic areas.


A Theoretical Framework Of Sports Team’S Well-Being: An Integrative Perspective Of Emotional Intelligence And Equivocality On Trust And Happiness, Drew Sannes, Wooyang Kim Jan 2018

A Theoretical Framework Of Sports Team’S Well-Being: An Integrative Perspective Of Emotional Intelligence And Equivocality On Trust And Happiness, Drew Sannes, Wooyang Kim

Atlantic Marketing Journal

Abstract – The purpose of this study is to develop and provide an integrative conceptual model of sports teams’ well-being to achieve a win-win situation of happiness for all stakeholders of sports teams, grounded in role theory and commitment-trust theory. We first conceptualized the well-being as an ultimate consequence by exploring sub-dimensions of happiness and provide relevant propositions linking with the respective antecedents. Second, we explored the effect of antecedents of sports team’s well-being in the spectrum of the anchor between positive and negative sides on the resultant outcomes – i.e., trust and happiness. Third, we examined the role of …


Communication And Engagement Strategies For Promoting Division Iii College Sports: An Exploratory Study, Lisa D. Spiller, Dae-Hee Kim, Matt Hettche Jan 2018

Communication And Engagement Strategies For Promoting Division Iii College Sports: An Exploratory Study, Lisa D. Spiller, Dae-Hee Kim, Matt Hettche

Atlantic Marketing Journal

College sports programs are embracing promotional activities that aim to create spectators and fans for live-action events. Whereas relationship marketing and fan engagement tactics are a mainstay of professional sports organizations, their inclusion within college sports programs is not ubiquitous. This study explores the promotional strategies for college sports, surveys the sports marketing literature, and presents findings from a spectator/fan questionnaire (n = 600) conducted with full-time enrolled students for a Division III college sports team. The twofold purpose of the questionnaire was to investigate what motivates student-spectators to attend men’s college basketball games and how to increase the level …


Moderating Factors On The Impact Of B Corporation Certification On Purchasing Intention, Willingness To Pay A Price Premium And Consumer Trust, Albena Ivanova, Jill Maher, Gayle Marco, Melissa Reinbold Jan 2018

Moderating Factors On The Impact Of B Corporation Certification On Purchasing Intention, Willingness To Pay A Price Premium And Consumer Trust, Albena Ivanova, Jill Maher, Gayle Marco, Melissa Reinbold

Atlantic Marketing Journal

This study determines the impact of B Corp certification on consumers’ attitudes, consumers’ purchasing intention, and consumers’ willingness to pay price premium and investigates the moderating effect of demographics and psychographics on these relationships. A convenient sample of 133 Americans participated. Respondents were exposed to pictures of a product with and without the B Corp logo and meaning. Repeated measures on a single sample research method is applied. Findings indicate a significant overall effect of the certification with description on purchase intentions, willingness to pay a price premium and trust. Additionally, there is a significant moderating effect of consumer demographics …