Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

2024

Discipline
Keyword
Publication
Publication Type
File Type

Articles 31 - 38 of 38

Full-Text Articles in Business

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar Jan 2024

Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …


Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis Jan 2024

Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …


Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne Jan 2024

Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter Jan 2024

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin Jan 2024

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


The Past And The Promised Future Of Supersonic Flight, Rowan Seskin Jan 2024

The Past And The Promised Future Of Supersonic Flight, Rowan Seskin

Emerging Writers

The commercial aviation industry is extremely competitive, and constant innovation is an essential part of its success. In 1976, the Concorde raised the stakes by more than doubling the cruising speed of existing airliners. However, a handful of issues plagued the aircraft until its eventual retirement in November of 2003. Since then, no airliner has successfully taken its place, but the tides are turning. In my research, I investigated the factors that led to the Concorde's demise and examined the steps currently being taken to overcome those challenges.


A Multi-Method Examination Of Donor Overhead Aversion: Implications For Marketing A Cause, Devin Lunt, Ryan E. Freling, Lucas D. Lunt Jan 2024

A Multi-Method Examination Of Donor Overhead Aversion: Implications For Marketing A Cause, Devin Lunt, Ryan E. Freling, Lucas D. Lunt

Atlantic Marketing Journal

Overhead aversion refers to a reluctance among donors to contribute to a charitable cause when a portion of that donation is allocated to non-cause-related costs. As a consequence, there is an impact on donor intentions and behaviors. A meta-analysis shows that characteristics of potential donors and the charitable cause moderate the impact of overhead level on donation intentions and behaviors. A follow-up experiment investigates two potential mechanisms underlying overhead aversion: perceived personal impact and perceived efficiency. Results of a survey experiment suggest the negative influence of overhead costs on donative behaviors is exacerbated when potential donors doubt their ability …


Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews Jan 2024

Why Students Select Their College Major: An Investigative Study, Kate N. Matthews, Diane R. Edmondson, Lucy Matthews

Atlantic Marketing Journal

With the decline in the number of traditional college-aged students, understanding the degree selection process is important for departments, colleges, and universities alike. For students, selecting the proper major early is also beneficial since it reduces time in school and tuition costs. Therefore, a better understanding of the degree selection process is worthwhile. Survey data was collected from 1,177 undergraduates at a southeastern U.S. university. Survey questions included major selection influences and other attitude and demographic items. The highest ranked reason is interest and passion followed by fit with personality type. This was similar for students who changed majors. External …