Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2017

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 60 of 126

Full-Text Articles in Business

Problems And Challenges In Application Cost-Benefit Analysis– Case Study Of Resen Municipality, Biljana Runcevska, Pece Nedanovski Oct 2017

Problems And Challenges In Application Cost-Benefit Analysis– Case Study Of Resen Municipality, Biljana Runcevska, Pece Nedanovski

UBT International Conference

In the framework of public sector, government has an obligation to take care of the rational use of the funds intended for investment. In order to determine the degree of rationality of individual programs or projects, or to make a choice between potential programs and projects, government should apply a methodology for their mutual comparison. Cost-benefit analysis is such a methodological approach for social optimization of policies, programs and projects. The project for improvement of energy efficiency and environmental protection in the case of secondary school in Resen municipality, Republic of Macedonia, is a relevant example for applying this kind …


Forming Community Partnerships, Lori Foley Oct 2017

Forming Community Partnerships, Lori Foley

CHAR

In the event of a disaster, regardless of the type or scope, the first response is always local. For the institutions and organizations charged with safeguarding the nation’s cultural and historic resources – museums, historical societies, libraries, and municipal offices, to name just a few – building relationships with local first responders and emergency managers before disaster strikes is key to ensuring the safety of staff and collections. State emergency management agencies are also collaborating with their state cultural agencies to protect these valuable and vulnerable resources. The resulting emergency networks better position the local community and the state to …


Lessons Learned From Culture In Crisis; Or Protecting The Past To Save The Future, Laurie Rush Oct 2017

Lessons Learned From Culture In Crisis; Or Protecting The Past To Save The Future, Laurie Rush

CHAR

At the midpoint of the second decade of the 21st century, the world is experiencing deliberate destruction of cultural property at a scale not seen since the Second World War. Future protection and preservation of cultural heritage depends on learning from tragedy and applying these lessons as pro-actively as possible. First, we are discovering that no matter the threat, there are people who risk their lives to save artifacts and features of their culture, and the motives for this courage are retrospectively clear. For a community to survive a conflict or disaster as a corporate entity, elements of shared …


Keynote Address - When Violent Nonstate Actors Target Cultural Heritage Sites, Victor Asal Oct 2017

Keynote Address - When Violent Nonstate Actors Target Cultural Heritage Sites, Victor Asal

CHAR

Why would organizations attack or kill people at cultural heritage sites or destroy such sites? Using data from the Big Allied and Dangerous insurgent dataset that has data on 140 insurgent organizations from 1998-2012, and data from the Global Terrorism Database, this presentation examines the factors that make insurgent groups more likely to attack such sites or kill people at such sites. We look at the impact of organizational ideology, organizational structure and power as well as country level factors.


Polish Foreign Trade In Live Geese And The Goose’S Meat In The Years 2012-2016, Dorota Pasińska Oct 2017

Polish Foreign Trade In Live Geese And The Goose’S Meat In The Years 2012-2016, Dorota Pasińska

UBT International Conference

The main aim of the article is to present the Polish goose market in 2012-2016 in the context of changes in foreign trade of selected goose products. During the considered period Poland was a net exporter of goose meat and offal, a net importer of live geese and the world's largest exporter of goose (meat). In 2016, livestock of geese felt by more than 29% as compared to 2012, slaughter and exportsincreased. Consumption of this kind of meat influenced favorable on development of market, in Poland we can observed the fashion to consumption of goose meat. Although the production of …


Diversification Of Polish Agri-Food Trade, Malgorzata Bulkwoska Oct 2017

Diversification Of Polish Agri-Food Trade, Malgorzata Bulkwoska

UBT International Conference

The embargo introduced in August 2014 by Russia on the food products imported from the European Union caused a strong decline in sales of food from Poland in this country. The aim of the article is to analyse the current trends and prospects of development of Polish agri-food trade with the EU and non-EU countries in 2013-2016. A special attention was paid on changes in geographical structure and the level of diversification of Polish food exports as a result of the export restriction. The analysis shows that the situation on the Russian market influenced the growth of the food exports …


Challenges And Prospects Of Hydropower Options In Albiana. Can Albania Lead The Region., Ermela Dërmyshi, Xhonsila Hoxha Oct 2017

Challenges And Prospects Of Hydropower Options In Albiana. Can Albania Lead The Region., Ermela Dërmyshi, Xhonsila Hoxha

UBT International Conference

With world electricity demand increasing, exploitation of the considerable potential for hydropower generation in many developing countries is an attractive prospect. Even Albania looks to have a high potential in this sector. In general, electricity generation in Albania mainly depends on hydropower, as about 90% of electricity is generated by it. For this reason, we aim to identify and explore challenges and prospects of hydropower sector in our country regarding the economic and social aspects. Also, is important to see if Albania can be the leader of the Western Balkans. To get the results we used secondary data, collected from …


Mitigation, Response And Recovery, Richard Lord Oct 2017

Mitigation, Response And Recovery, Richard Lord

CHAR

Abstract: Hurricane Harvey ravaged Texas and Louisiana nearly five years after Superstorm Sandy devastated the East Coast and caused 53 deaths, destroyed or severely damaged 100,000 Long Island homes, and left an estimated $42 billion in damages across New York State.

This session will provide an overview of the disaster relief and assistance programs available under the Stafford Act, when they are triggered, and how private non-profit and cultural institutions can plan for natural hazards and take full advantage of available aid. There will also be discussion of the NYS Hazard Mitigation Plan, the Community Risk and Resiliency Act, and …


Informing Responders Using Gis And Gps, Deidre Mccarthy Oct 2017

Informing Responders Using Gis And Gps, Deidre Mccarthy

CHAR

Hurricane Katrina devastated the Gulf Coast in August 2005 and created the single largest disaster for cultural resources that the United States has witnessed since the inception of the National Historic Preservation Act (NHPA) in 1966. Notably, the NHPA created the National Register of Historic Places, our nation’s catalog of important cultural resources. The NHPA also stipulates that any federal undertaking which may adversely affect National Register eligible resources be mitigated. For the Federal Emergency Management Agency (FEMA), Katrina created the largest compliance project ever under Section 106 of the NHPA.

Although causing a great deal of damage, Katrina also …


Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft Oct 2017

Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft

CHAR

This talk is concerned with the science and impacts of climate change from global to New York scales. It will provide an assessment of how the climate has changed over the past Century based on a purely observational perspective. The scientific basis for anthroprogenic climate change will be explained and discussed including a description of the “greenhouse effect” and why it is important for life on this planet. We will briefly discuss global and local consequences of a warmer climate and what we need to be prepared for going forward in the coming decades.


Opening Keynote Address: Using Data To Understand Cultural Destruction, Brian I. Daniels Oct 2017

Opening Keynote Address: Using Data To Understand Cultural Destruction, Brian I. Daniels

CHAR

Brian I. Daniels, Ph.D, Penn Cultural Heritage Center, University of Pennsylvania Museum.

Why is cultural heritage targeted in conflict? Under what circumstances? By whom? Today, due in part to the recent notorious instances of cultural destruction in the Middle East and North Africa, there is perhaps more attention among the broader scientific community than ever before about the phenomenon of cultural loss. At the same time, there are many significant data and analytical gaps. Little social science literature about cultural destruction exists and many critical questions—and avenues of research—are, as of yet, unstudied. A primary reason for this lack …


The Nuts And Bolts Of Supporting Change And Transformation For Research Librarians, Mira Waller, Heidi J. Tebbe Oct 2017

The Nuts And Bolts Of Supporting Change And Transformation For Research Librarians, Mira Waller, Heidi J. Tebbe

Charleston Library Conference

Libraries have a rich tradition of providing services and support to researchers. In recent years, changing technology, evolving research methods and requirements, and the transforming landscape of scholarly communication have revealed a need for libraries to actively engage scholars and participate in the entire research lifecycle. As liaison and subject librarian roles shift to a more holistic and engagement-focused model, it is important that libraries provide them with the tools and resources to develop new skills.

This paper will focus on three ways in which the North Carolina State University Libraries created and supported relevant training and opportunities for research …


Project Management Office To The Rescue: Aligning Workforce And Resources With Library Vision And Delivering Results, Anastasia Guimaraes, Zheng (John) Wang Oct 2017

Project Management Office To The Rescue: Aligning Workforce And Resources With Library Vision And Delivering Results, Anastasia Guimaraes, Zheng (John) Wang

Charleston Library Conference

Many libraries today are inundated with increasing number of tasks, projects, and initiatives through which they hope to achieve their mission and strategic vision only to find themselves losing focus and drowning in the volume of work. Hesburgh Libraries at the University of Notre Dame struggled with absorbing an exponentially growing number of projects and aligning them with institutional strategic initiatives and goals. The increasing number of projects and the relatively stable size of the workforce significantly impacted the institution’s ability to complete projects in a timely fashion and within the budgetary allocation.


Housing Diversity In Children’S Literature, Carla Earhart Oct 2017

Housing Diversity In Children’S Literature, Carla Earhart

Charleston Library Conference

Previous studies have examined diversity in children’s literature: Gender diversity, racial diversity, religious diversity, and diversity in family composition. This project examines an often overlooked diversity issue in children’s literature: Housing diversity. In the stories they read and the accompanying images, children need to see a variety of housing environments and need to see the settings and the people portrayed in a positive manner.

Renting an apartment is an increasingly popular housing option for many families. However, many children’s books glamorize living in a traditional house. Using a rubric designed by the course instructor, students in a university immersive learning …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

No abstract provided.


Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:

  • harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
  • parsed and structured 89,988 transcripts using regular expressions in Stata
  • analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
  • saved almost 2 years (675 days) of the project time
As this project is related to big data, text analytics, and big computing, it may be a good case to show how we can benefit from modern …


Readiness For Inter-Institutional Collaboration: A Path Forward For Online Learning, Robert Arthur Paulson Phd, Shirley Ann Freed Oct 2017

Readiness For Inter-Institutional Collaboration: A Path Forward For Online Learning, Robert Arthur Paulson Phd, Shirley Ann Freed

Adventist Online Learning Conference / Conferencia de Aprendizaje en Línea

An environment conducive to inter-institutional collaboration greater utilizes intellectual and structural assets for the good of all in a growing learning community. As small colleges and universities struggle to maintain financial viability many have recognized the positive impact a collaborative environment has for all aspects of the institution. The leaders in this transition from autonomous to collaborative have been librarians and their use of technology to share databases and other assets. Organizations like the Concordia University System and The Great Plains Interactive Distance Education Alliance have been sharing structural and intellectual assets to reduce costs and risks in offering online …


Upgrading Lmss: Understanding Faculty Perceptions And Use For Improved Implementation, David A. Jeffrey Ph.D., Randy J. Siebold Ph.D. Oct 2017

Upgrading Lmss: Understanding Faculty Perceptions And Use For Improved Implementation, David A. Jeffrey Ph.D., Randy J. Siebold Ph.D.

Adventist Online Learning Conference / Conferencia de Aprendizaje en Línea

Adventist schools are in a constantly changing academic environment and are under consistent pressure to implement the latest technologies, such as Learning Management Systems (LMSs). This research study seeks to provide a better understanding of faculty perceptions of their LMS. We explore factors leading to successful faculty use of LMSs.


Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo Oct 2017

Distributed Evolution Of Spiking Neuron Models On Apache Mahout For Time Series Analysis, Andrew Palumbo

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Application Of New Theory In Entrepreneurship: Social Cognition, Ryan Matthews Dr., Kelly R. Hall, Lucy Matthews Sep 2017

Application Of New Theory In Entrepreneurship: Social Cognition, Ryan Matthews Dr., Kelly R. Hall, Lucy Matthews

Atlantic Marketing Association Proceedings

No abstract provided.


Developing A Model For Entrepreneurs: Niche Tourism And Consumer Typologies, Michelle B. Kunz, Janet M. Ratliff Sep 2017

Developing A Model For Entrepreneurs: Niche Tourism And Consumer Typologies, Michelle B. Kunz, Janet M. Ratliff

Atlantic Marketing Association Proceedings

No abstract provided.


Book Retailers And The Ever-Changing Scm Landscape: Case Study Of Barnes & Noble Company And Amazon, William T. Rupp, Steven A. Clinton Sep 2017

Book Retailers And The Ever-Changing Scm Landscape: Case Study Of Barnes & Noble Company And Amazon, William T. Rupp, Steven A. Clinton

Atlantic Marketing Association Proceedings

No abstract provided.