Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Virtual And Hybrid Meetings: A Three Generational Perspective, Carole B. Sox Aug 2014

Virtual And Hybrid Meetings: A Three Generational Perspective, Carole B. Sox

Theses and Dissertations

The purpose of this dissertation is to provide a focused research stream with regard to virtual and hybrid meetings from a generational perspective. By utilizing a meta-analysis research methodology, an applied research approach, and a theoretical research approach, this three-article manuscript-style dissertation addresses numerous topics pertinent to both academics and industry professionals. The state of current literature pertaining to virtual and hybrid meetings is assessed and gaps are identified, including the need for further research from a generational perspective.

Current best practices, opportunities and barriers for planning and managing virtual and hybrid meetings for Baby Boomers, Generation X, and Generation …


The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris Jun 2010

The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris

Theses and Dissertations

Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects …