Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Marketing (63)
- Management Information Systems (32)
- Technology and Innovation (27)
- Physical Sciences and Mathematics (21)
- Social and Behavioral Sciences (20)
-
- Computer Sciences (19)
- Information Security (18)
- Advertising and Promotion Management (17)
- Business Administration, Management, and Operations (16)
- Education (15)
- E-Commerce (9)
- Business Law, Public Responsibility, and Ethics (7)
- Communication (7)
- Other Business (7)
- Sales and Merchandising (7)
- Business and Corporate Communications (6)
- Higher Education (6)
- Sports Management (6)
- Arts Management (5)
- Arts and Humanities (5)
- Business Analytics (5)
- Entrepreneurial and Small Business Operations (5)
- Fashion Business (5)
- Accounting (4)
- Curriculum and Instruction (4)
- Nonprofit Administration and Management (4)
- Operations and Supply Chain Management (4)
- Psychology (4)
- Tourism and Travel (4)
- Keyword
-
- Marketing (8)
- E-commerce (4)
- Facebook (4)
- Social media (4)
- Advertising (3)
-
- Case study (3)
- Consumer behavior (3)
- Content analysis (3)
- Cybersecurity (3)
- Social media marketing (3)
- Advocacy (2)
- Attitude (2)
- Business (2)
- CSR (2)
- Charity (2)
- Collaboration (2)
- Consumer attitudes (2)
- Diversity (2)
- Donating (2)
- Economically developing countries (2)
- Experience (2)
- International Olympic Committee (2)
- Knowledge (2)
- Marketing education (2)
- Marketing strategy (2)
- Mobile phone (2)
- Narcissism (2)
- Native advertising (2)
- Networking (2)
- Nonprofits (2)
- Publication
-
- Atlantic Marketing Association Proceedings (64)
- The African Journal of Information Systems (15)
- KSU Proceedings on Cybersecurity Education, Research and Practice (10)
- Atlantic Marketing Journal (9)
- Journal of Cybersecurity Education, Research and Practice (9)
-
- The Kennesaw Journal of Undergraduate Research (6)
- PhD in Business Administration Dissertations (5)
- African Conference on Information Systems and Technology (4)
- Published and Grey Literature from PhD Candidates (2)
- KSU Journey Honors College Capstones and Theses (1)
- Master of Arts in Professional Writing Capstones (1)
- Research Guides & Subject Bibliographies (1)
- The Investigator Research Magazine (1)
- Publication Type
Articles 1 - 30 of 128
Full-Text Articles in Business
Welcome Guide: Onboarding Guidebook For Hannah Michelle Photography, Hannah Lozano
Welcome Guide: Onboarding Guidebook For Hannah Michelle Photography, Hannah Lozano
Master of Arts in Professional Writing Capstones
Hannah Michelle Photography is a small photography brand owned by Hannah Lozano. This document serves as a capstone project for Hannah Lozano. She has created a comprehensive onboarding document for future employees of Hannah Michelle Photography.
Online Advertising And Consumer Behavior In Tunisia, Rabeb Hamdi, Romdhane Khemakhem
Online Advertising And Consumer Behavior In Tunisia, Rabeb Hamdi, Romdhane Khemakhem
Atlantic Marketing Journal
The aim of this study was to present new mediating and moderating variables in the relationship between online advertising and purchase intention as well as visiting the store. Therefore, a qualitative study of 17 Tunisian Internet users was conducted (semi-structured interview). Results showed that the lifestyle change and the disposition to visit the store are the mediating variables between these consequences and electronic advertising (purchase intention and visiting the store). Furthermore, the involvement with the product is the moderating variable between e-advertising and lifestyle change, including disposition to visit the store.
Group Brands As An Innovative Pedagogical Tool: Using Marketing Theory In Real-World Collaborative Teaching, Cheryl A. Tokke
Group Brands As An Innovative Pedagogical Tool: Using Marketing Theory In Real-World Collaborative Teaching, Cheryl A. Tokke
Atlantic Marketing Journal
This teaching and learning pedagogy paper demonstrates how group brands were used as interdisciplinary teaching tools in marketing, business, research, and social science classes by applying theories of branding, collaborative learning, affinity, and social identity in experiential learning. There were two primary reasons why this project was done. First, implementing a pedagogical tool would bring students together in a collaborative team over the period of a semester gaining a critically important business tool; the requirement of working in teams and networked relationships. Second, by enriching the curriculum of business marketing and social science courses through incorporating a semester long term-based …
The Role Of Social Media And Social Networking As Marketing Delivery Systems For Preventive Health Care Information, Joe Cangelosi, David Kim, Ken Griffin, Ed Ranelli
The Role Of Social Media And Social Networking As Marketing Delivery Systems For Preventive Health Care Information, Joe Cangelosi, David Kim, Ken Griffin, Ed Ranelli
Atlantic Marketing Journal
The use of social media and social networking (SM&N) is prevalent in health care. Through social media, individuals can access information to enhance their overall health and well-being. Given that prevention is crucial to a long healthy life, as well as restraining escalating health care costs, this study offers insights into the types of social media and networking platforms that health care consumers consider most important, especially with regard to obtaining Preventive Health Care Information (PHCI). Further, it goes on to identify the demographics of persons who consider social media and social networking platforms as most important. This research used …
Sponsored Messages In Facebook And Twitter News Feeds: An Examination Of Prevalence, Brands, And Products, Cynthia B. Hanson
Sponsored Messages In Facebook And Twitter News Feeds: An Examination Of Prevalence, Brands, And Products, Cynthia B. Hanson
Atlantic Marketing Journal
This paper compares the prevalence and nature of sponsored messages on Facebook and Twitter. Results of a content analysis of 180 sponsored messages from 65 screenshots provided by undergraduate student subjects showed significant differences in the product categories advertised on each platform, with sponsored messages for apparel and entertainment more prevalent on Facebook and financial products and services more prevalent on Twitter. The majority of the sponsoring advertisers on both platforms were from companies established after the year 2000; only seven percent were leading US advertisers; and only three advertisers—Amazon, Microsoft, and Toyota—appeared in both samples.
Impact Of Customer Engagement, Brand Attitude And Brand Experience On Branded Apps Recommendation And Re-Use Intentions, Nusser Raajpoot, Beth Ghilni-Wage
Impact Of Customer Engagement, Brand Attitude And Brand Experience On Branded Apps Recommendation And Re-Use Intentions, Nusser Raajpoot, Beth Ghilni-Wage
Atlantic Marketing Journal
Abstract
This paper seeks to understand the impact of customer engagement, brand attitude, and brand experience on branded apps recommendation and re-use intentions. Using structural equation modeling we test a causal model to establish the direct and mediated paths between constructs under study. We found that contrary to popular perceptions, customer engagement does not load directly on the recommendation or re-use intention suggesting that engagement on its own may not be sufficient to elicit recommendation or re-use intention. Other factors and contexts will be necessary to elicit recommendation etc. We also found that recommendation mediates the relationship between brand attitude …
International Olympic Committee Rule 40: Reasonable Protection For The Ioc Or Unfair Restriction To The Athletes?, Jeri L. Jones
International Olympic Committee Rule 40: Reasonable Protection For The Ioc Or Unfair Restriction To The Athletes?, Jeri L. Jones
Atlantic Marketing Journal
This paper explores the history, legality and ethical perspectives of the International Olympic Committee Rule #40 that was put into effect starting with the 2016 Olympic Games. Rule 40 was established to protect official Olympic sponsors from marketing campaign dilution and ambush marketing attempts from non-official brand sponsors. It was designed to prevent over-commercialization of the Olympic brand and to protect official Olympic sponsors’ substantial investment for exclusive marketing rights during the Games. It also however effectively prevents athletes from recognizing their own individual company sponsors and goes so far as to limit an athlete’s apparel during the Games, their …
The History And Evolution Of The Market For ‘Delebs’ (Dead Celebrities), Denver D'Rozario, Guang Yang
The History And Evolution Of The Market For ‘Delebs’ (Dead Celebrities), Denver D'Rozario, Guang Yang
Atlantic Marketing Journal
In this paper, we survey the history behind the growing market for dead celebrities (‘Delebs’) in their role of creating secondary brand associations. According to some estimates, this market is now worth $2.25 billion in annual licensing and royalty revenues (CBC 2013). We begin, by defining key terms that are used in this market. Next, we do a survey and analysis of the major events that have given rise (intentionally or unintentionally) to this market. For ease of discussion, we discuss these historical events grouped by era. We follow this with a summary of the major events and trends that …
Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson
Revisiting Textbook Adoption Decisions: Are Students Finally Ready For E-Books?, Cheryl B. Ward, Diane R. Edmondson
Atlantic Marketing Journal
This study re-examines students’ attitudes and preferences to the four primary textbook types (hardback, paperback, loose leaf, and E-book). One hundred eighty-three students currently taking Principles of Marketing from a large public university in the southeastern United States completed the survey. Unlike the 2014 study, where students overwhelming preferred paperback textbooks, even when this textbook is at a higher price than other alternatives, the 2018 study found that the textbook choice depended on if an access code to publisher’s online course materials was required. When access codes were required, students preferred paperback textbooks, followed closely by E-books. When no access …
Destructive Selling: An Empirical View From The Perspective Of University Level Business Students, Dennis Bristow, Rajesh Gulati, David Titus, Garth Harris, Zhan Wang
Destructive Selling: An Empirical View From The Perspective Of University Level Business Students, Dennis Bristow, Rajesh Gulati, David Titus, Garth Harris, Zhan Wang
Atlantic Marketing Journal
Preliminary evidence indicates that salespeople working in a variety of industries hold the perception that destructive selling (defined as the intentional use of unethical tactics including lying, misrepresenting product/service performance, misleading the client, spreading rumors about the competition, etc. by professional salespeople) does occur in the professional selling discipline. A rich history of related research provides further evidence that university students exhibit negative perceptions and attitudes towards professional selling. In the work reported in this manuscript, the authors employed the survey research method to empirically study the perceptions held by university level pre-business and business students regarding the presence of …
Making Good Decisions: An Attribution Model Of Decision Quality In Decision Tasks, Bethany Niese
Making Good Decisions: An Attribution Model Of Decision Quality In Decision Tasks, Bethany Niese
PhD in Business Administration Dissertations
Decision-makers endeavor to obtain the decision quality which puts them in a position to reach their goals. In order to control or influence decision quality, the processes by which individuals form their beliefs must be understood. In addition, many decision makers rely on decision support technologies to help find patterns in data and make sense of the input, so these technologies must be considered in parallel with the processes.
There have been numerous studies conducted to illuminate the factors which affect decision quality, however, many of these studies focused on objective measures and factors. This approach ignores individual perception, belief, …
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
KSU Proceedings on Cybersecurity Education, Research and Practice
The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.
These replay attacks can be accomplished by capturing recorded …
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
KSU Proceedings on Cybersecurity Education, Research and Practice
The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
KSU Proceedings on Cybersecurity Education, Research and Practice
The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
KSU Proceedings on Cybersecurity Education, Research and Practice
Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.
This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …
Internet Core Functions: Security Today And Future State, Jeffrey Jones
Internet Core Functions: Security Today And Future State, Jeffrey Jones
KSU Proceedings on Cybersecurity Education, Research and Practice
Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
KSU Proceedings on Cybersecurity Education, Research and Practice
Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.
The Influence Of Socioeconomic Factors To The Use Of Mobile Phones In The Agricultural Sector Of Tanzania, Edison Wazoel Lubua Dr, Michael E. Kyobe Prof.
The Influence Of Socioeconomic Factors To The Use Of Mobile Phones In The Agricultural Sector Of Tanzania, Edison Wazoel Lubua Dr, Michael E. Kyobe Prof.
The African Journal of Information Systems
This study determined the influence of socioeconomic factors to the adoption of mobile phones in the farming community of Tanzania. Currently, a series of well-established models (such as the TAM, UTAUT and the Social Capital Model) provide inadequate consideration toward socioeconomic factors, by ignoring them, or putting them under the same cluster, regardless of their differences in impacting the technology use. Methodologically, a survey strategy was adopted, with a sample of 116 respondents. The study involved farmers along the Pangani River Basin, found in Kilimanjaro and Tanga Regions of Tanzania. Data was analyzed using advanced quantitative methods such as the …
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo
The African Journal of Information Systems
This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source …
Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins
Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins
The African Journal of Information Systems
This study investigated the differences in usage of different social media platforms within the South African context, broken down by user characteristics, specifically gender and age, in addition to investigating the correlation between usage of differing social media platforms. This was carried out to determine which social media needs do the different population groups aim to fulfill when using different social media platforms. Based on the results, the study confirmed the existence of preferences between types of social media platforms and groups of social media platforms in South Africa, based on frequency of use by age group and gender. Social …
Mobile Technology Usage For Street Traders’ Market Search In Dodoma—Urban Tanzania: An Exploratory Study, Joel Rumanyika, Matti Tedre, Apiola Mikko, Nasibu Rajabu Mramba
Mobile Technology Usage For Street Traders’ Market Search In Dodoma—Urban Tanzania: An Exploratory Study, Joel Rumanyika, Matti Tedre, Apiola Mikko, Nasibu Rajabu Mramba
The African Journal of Information Systems
Increased access to mobile technologies has significantly contributed to almost all types of work, including informal work. Mobile phones are one such technology that has been exponentially adopted and used by street traders. However, there is limited information about how street traders use mobile phones to search for new markets. This study investigated street traders’ mobile usage for new market search in Dodoma, Tanzania. Qualitative data were collected using in-depth interviews with 29 street traders, followed by a focus group discussion with eight street traders. Thematic analysis was used to analyze the data. The results show that using mobile phones …
Watch Me Give: Narcissism As A Moderator To Donating To A Nonprofit, Austin Prewett, Charles Elliott, Paul A. Story
Watch Me Give: Narcissism As A Moderator To Donating To A Nonprofit, Austin Prewett, Charles Elliott, Paul A. Story
The Kennesaw Journal of Undergraduate Research
With increased online connectivity in the current generation, more non-for-profit organizations are focusing their efforts on producing online marketing appeals. It has, therefore, become necessary to identify the effect some appeals have on different people. The present study seeks to determine whether an organization offering increased recognition will result in a greater willingness to give by people with narcissistic personalities. Additionally, it will determine if “willingness” to give or “amount” given are different between genders or employment status, as prior research suggests. Results indicated that whether the organization offered increased recognition or not, narcissism did not affect willingness to give …
Assessment Of The Public Value Of Open Data In Ghana, Hubeidatu Nuhu, Jean-Paul Van Belle
Assessment Of The Public Value Of Open Data In Ghana, Hubeidatu Nuhu, Jean-Paul Van Belle
African Conference on Information Systems and Technology
With rising enthusiasm for Open Data (OD) globally, there has been an expanding requirement for research on the impact this movement has created. Ghana is consid-ered as one of the early Open Data adopters in Africa. The case of Ghana presents an interesting and a unique area of concentration due to the country’s long stand in de-mocracy. The practice of democracy, accountability and transparency has been the core of government development in Ghana since independence in 1957. The research pur-pose is to understand and examine the impact of Open Data from the context of Gha-na from the perspective of created …
The African Digital Citizen’S Awareness Of Online Information Privacy, Sam Takavarasha Jr, Liezel Cilliers, Willie Chinyamurindi
The African Digital Citizen’S Awareness Of Online Information Privacy, Sam Takavarasha Jr, Liezel Cilliers, Willie Chinyamurindi
African Conference on Information Systems and Technology
Internet access continues to increase among the youth in developing countries, like South Africa, due to the exponential growth of mobile penetration and the higher education system’s reliance on Information and Communication Technologies. Higher education graduates are expected to be digital citizens in the workplace, which is characterised by socio-economic inclusion and academic capability. However, this increased exposure to the Internet does present information privacy challenges. This paper investigates young adults’ perceptions and concomitant behaviours to protect their information privacy when using Internet sites. The paper further aims to unpack young adults’ understanding of the potential problems and their preparedness …
Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah
Technology Media, Service Innovation And The Shaping Of Executive Cognition, Gamel O. Wiredu, Kofi A. Boateng, John K. Effah
African Conference on Information Systems and Technology
The upsurge of information and communication technology innovations around the world has induced the establishment of many technology enterprises, mostly small-medium, that focus on service innovation. Due to the materiality of technology to this enterprise genre, its executive is significantly shaped by technology media, but explanations of technological shaping are low. This paper seeks to address this gap through a study informed by critical realism and media ecology. It argues that executive cognition is shaped because ICT media and service innovation imperatives combine to generate executive internalizations; and it is shaped by service innovation driven internalizations of technology media functions. …
A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema
A Pedagogical Smart Learning Environment In South African Tertiary Institutions, Tope Samuel Adeyelure, Billy Mathias Kalema
African Conference on Information Systems and Technology
With the rapid growth rate of technology innovation different sectors tends to keep up with the developing trends by implementing the latest technology with the aim of achieving their goals. Educational institutions deploy information systems in their teaching and learning environment to enhance performance. However, educational institutions usually struggle with smooth implementation of IT leading to its failure. Adopting various scientific methods such as content analysis, Principal Component Analysis and so on, contextual factors were identified for effective deployment of smart learning environments based on extensive review of exploratory research, analyzing data and study outcomes of ICT deployment educational institutes …