Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2016

Faculty Publications

Discipline
Institution
Keyword
File Type

Articles 1 - 30 of 30

Full-Text Articles in Business

Capabilities, Human Development, And Design Thinking: A Framework For Gender-Sensitive Entrepreneurship Programs, Tonia Warnecke Dec 2016

Capabilities, Human Development, And Design Thinking: A Framework For Gender-Sensitive Entrepreneurship Programs, Tonia Warnecke

Faculty Publications

This paper discusses the ways that capabilities and human development theory can guide the creation of entrepreneurship programs, utilizing a framework of human-centered design thinking. It is well known that a variety of institutional factors shape gender outcomes and gender inequality within entrepreneurship, particularly with regard to necessity versus opportunity entrepreneurship and informal versus formal sector entrepreneurship. Failure to understand the diversity of entrepreneurial activity among women, and the connection (or lack thereof) of such activity to human freedom, leads to biased entrepreneurship programs. This paper links social economic theory and practice by: (1) discussing the ways that capabilities and …


Job Applicants' Information Privacy Protection Responses: Using Socia Media For Candidate Screening, John R. Drake, Dianne Hall, J. Bret Becton, Clay Posey Dec 2016

Job Applicants' Information Privacy Protection Responses: Using Socia Media For Candidate Screening, John R. Drake, Dianne Hall, J. Bret Becton, Clay Posey

Faculty Publications

For human resource (HR) departments, screening job applicants is an integral role in acquiring talent. Many HR departments have begun to turn to social networks to better understand job candidates’ character. Using social networks as a screening tool might provide insights not readily available from resumes or initial interviews. However, requiring access to an applicants’ social networks and the private activities occurring therein—a practice currently legal in 29 U.S. states (Deschenaux, 2015)—could induce strong moral reactions from the job candidates because of a perceived loss of information privacy. Subsequently, such disclosure requests could induce job candidates to respond in a …


From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle Dec 2016

From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle

Faculty Publications

Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …


An Architectural Framework For Global Talent Management, Shad S. Morris, Scott Snell, Ingmar Björkman Dec 2016

An Architectural Framework For Global Talent Management, Shad S. Morris, Scott Snell, Ingmar Björkman

Faculty Publications

A unique characteristic of the multinational corporation is that it consists of culturally diverse employees that embody both firm-specific and location-specific human capital. This paper takes an architectural approach to describe how different types of human capital develop from the individual level, to the unit level, and then to the firm level in order to build a talent portfolio for the multinational corporation. Depending on the company’s strategy (multidomestic, meganational, transnational), different configurations of the talent portfolio tend to be emphasized and integrated to achieve competitive advantage. Implications for theory and practice are discussed and a research agenda is introduced.


Plastic Fantastic: The Fiberglass Boatbuilding Industry In Holland, Michigan, Geoffrey D. Reynolds Oct 2016

Plastic Fantastic: The Fiberglass Boatbuilding Industry In Holland, Michigan, Geoffrey D. Reynolds

Faculty Publications

Plastic Fantastic: The Fiberglass Boatbuilding Industry in Holland, Michigan is a chapter concerning the use of fiberglass reinforced plastic (FRP) to build boats starting in the 1940s. In the 1950s boat builders discovered that fiberglass would allow them to design boats that would lead to new boat sales and increased profit margins for years to come. This technology steadily spread throughout American boat manufacturing plants, including Holland, Michigan, placing the town among the leaders in the industry.


From Woods To Water: Reviving A G-W Invader, Geoffrey D. Reynolds Sep 2016

From Woods To Water: Reviving A G-W Invader, Geoffrey D. Reynolds

Faculty Publications

From Woods to Water: Reviving a G-W Invader is an article concerning the full restoration of a 1972 G-W Invader 10.3' Rally fiberglass boat by high school students Peter Reynolds, Gurjinder Sandhu, and instructor Geoffrey Reynolds, during May and June 2016.


Compliance Police Or Business Partner? Institutional Complexity And Occupational Tensions In Human Resource Managment, Kurt Sandholtz, Tyler N. Burrows Aug 2016

Compliance Police Or Business Partner? Institutional Complexity And Occupational Tensions In Human Resource Managment, Kurt Sandholtz, Tyler N. Burrows

Faculty Publications

Faced with institutional demands, organizations often create departments whose work is divorced from technical imperatives. This paper examines workers in one such department: Human Resources. Analysis of HR's recent history and evidence from an ethnographic study of HR work highlight the institutional origins of conflict between HR's established "compliance police" role and the "business partner" expectations of line managers. The paper outlines a theory of how organizational responses to institutional complexity contribute to persistent tension in HR and other heteronomous occupations.


More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle Aug 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle

Faculty Publications

System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance of a primary task (the task that was interrupted), no research has examined the effect of DTI on the interrupting task. This is an important gap because in many …


Webinar 1: Marketing And Branding: Asserting Your Value, Michele Villagran Jun 2016

Webinar 1: Marketing And Branding: Asserting Your Value, Michele Villagran

Faculty Publications

Promoting and Enhancing the Advancement of Rural Libraries (PEARL) project: Rural & Small Libraries 4-part Webinar Series with Dr. Michele A. L. Villagran.


Crowdfunding For Congregations And Faith-Related Non-Profits, Adam J. Copeland May 2016

Crowdfunding For Congregations And Faith-Related Non-Profits, Adam J. Copeland

Faculty Publications

No abstract provided.


The Impact Of Learning Curve Model Selection And Criteria For Cost Estimation Accuracy In The Dod, Candace Honious, Brandon Johnson, John J. Elshaw, A. B. Badiru Apr 2016

The Impact Of Learning Curve Model Selection And Criteria For Cost Estimation Accuracy In The Dod, Candace Honious, Brandon Johnson, John J. Elshaw, A. B. Badiru

Faculty Publications

The first part of this manuscript examines the impact of configuration changes to the learning curve when implemented during production. This research is a study on the impact to the learning curve slope when production is continuous but a configuration change occurs. Analysis discovered the learning curve slope after a configuration change is different from the stable learning curve slope pre-configuration change. The newly configured units were statistically different from previous units. This supports that the new configuration should be estimated with a new learning curve equation. The research also discovered the post-configuration slope is always steeper than the stable …


Effects Of Remanufacturable Product Design On Market Segmentation And The Environment, Tianqin Shi, Wenjun Gu, Dilip Chhajed, Nicholas Petruzzi Apr 2016

Effects Of Remanufacturable Product Design On Market Segmentation And The Environment, Tianqin Shi, Wenjun Gu, Dilip Chhajed, Nicholas Petruzzi

Faculty Publications

Despite documented benefits of remanufacturing, many manufacturers have yet to embrace the idea of tapping into remanufactured-goods markets. In this article, we explore this dichotomy and analyze the effect of remanufacturable product design on market segmentation and product and trade-in prices by studying a two-stage profit-maximization problem in which a price-setting manufacturer can choose whether or not to open a remanufactured-goods market for its product. Our results suggest that it is optimal for a manufacturer to design a remanufacturable product when the value-added from remanufacturing is relatively high but product durability is relatively low and innovation is nominal. In addition, …


Internal Control: It's More Than A Locked Safe, Annetta M. Gibson Mar 2016

Internal Control: It's More Than A Locked Safe, Annetta M. Gibson

Faculty Publications

Presentation for the NAD orientation for new treasurers, March 30, 2016


Release Of Restricted Funds And How To Account For Them, Annetta M. Gibson Mar 2016

Release Of Restricted Funds And How To Account For Them, Annetta M. Gibson

Faculty Publications

Presentation for treasurers of the North American Division, March 29, 2016


Reading And Interpreting A Financial Statement, Annetta M. Gibson Mar 2016

Reading And Interpreting A Financial Statement, Annetta M. Gibson

Faculty Publications

Presentation for Treasurers, North American Division, March 29, 2016


How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins Feb 2016

How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins

Faculty Publications

Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users' responses to security messages—discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS—cognitive neuroscience applied to information system (IS)—to shed new light …


Social Media: Creating Student Awareness Of Its Use In The Hiring Process, Justin Blount, Carol S. Wright, Ashley A. Hall, Judith L. Biss Jan 2016

Social Media: Creating Student Awareness Of Its Use In The Hiring Process, Justin Blount, Carol S. Wright, Ashley A. Hall, Judith L. Biss

Faculty Publications

As the use of social media permeates our lives, it is important for business educators to promote the effective use of this technology to students for both their role as job seekers as well as potential hiring managers. This article will present current perceptions among business students on using social media in the job search process, primary research from recruiters in an attempt to understand employers’ policies and practices with respect to the use of social media in the hiring process, key laws which students should be aware of with respect to the use of social media by employers, and …


Accounting Information Systems: A View From The Public Eye, Rachelle Paige Miller, Esther Bunn, Kelly Noe Jan 2016

Accounting Information Systems: A View From The Public Eye, Rachelle Paige Miller, Esther Bunn, Kelly Noe

Faculty Publications

In order to fully appreciate the potential impact accounting information systems have on the accounting profession, an understanding of what accounting encompasses is necessary. Over the years, accounting has evolved from what many would call a “checks and balance” system to a much more complex system involving complicated activities such as calculating taxes and garnishments, auditing financial statements and processing payroll to name a few. It would be reasonable to think that advanced technology such as accounting information systems would only enhance the production of these activities. However, like with any “game changers,” there are always potential threats involved. The …


Using Option Theory To Determine Optimal Ira Investment, Treba Marsh, Todd A. Brown, Mary Fischer Jan 2016

Using Option Theory To Determine Optimal Ira Investment, Treba Marsh, Todd A. Brown, Mary Fischer

Faculty Publications

Given the current uncertain economic trends, the decision to contribute to a personal retirement account can be a financial challenge taking a great deal of courage. Using the option theory, this paper presents arguments to justify the optimal contribution to maximize an IRA investment return.


Rodeo In The Classroom: Activity Based Costing Simulation, Nikki Shoemaker, Marie Kelly Jan 2016

Rodeo In The Classroom: Activity Based Costing Simulation, Nikki Shoemaker, Marie Kelly

Faculty Publications

This paper describes a classroom Activity Based Costing simulation called Rodeo in the Classroom. This simulation has been used in several introductory managerial accounting and cost accounting courses in order to help students understand the difference in the application of overhead between Job Order Costing and Activity Based Costing methods. Each student is assigned their own rodeo simulation and must calculate its cost using specific cost drivers. To verify their calculations, students with the same rodeos are grouped together to compare costs. Final rodeo costs are presented to the class where differences in cost allocations and reasons for these differences …


Best Practices Developing Service Learning Protocol For Hospitality Administration, Mary Olle, Chay Runnels, Gina Fe Causin, Todd Barrios Jan 2016

Best Practices Developing Service Learning Protocol For Hospitality Administration, Mary Olle, Chay Runnels, Gina Fe Causin, Todd Barrios

Faculty Publications

Developing Service Learning Protocol for students in the Hospitality Administration program at Stephen F. Austin State University provides an opportunity for students to experience these values such as networking, commitment, and building self-confidence. In 2015 SFA Hospitality Administration faculty made a decision to institutionalize service learning throughout their program. This presentation discusses its implementation.


Cooperative Strategies In International Business And Management: Reflections On The Past 50 Years And Future Directions, Paul W. Beamish, Nathaniel C. Lupton Jan 2016

Cooperative Strategies In International Business And Management: Reflections On The Past 50 Years And Future Directions, Paul W. Beamish, Nathaniel C. Lupton

Faculty Publications

Over the past 50 years, cooperative forms of governance such as equity joint ventures and other strategic alliances have received tremendous attention in international business and management research. This article traces the history of this research over these past five decades with particular emphasis on the critical role that (Columbia) Journal of World Business has played in disseminating scholarly and managerial expertise on the successful management of cross-border, inter-firm collaboration. We highlight the evolution of interest in different contexts, phenomena, theories, and methodologies, along with the factors that have driven interest in these topics. Several suggestions for future research are …


Analysis Of The Factors Impacting Etfs Net Fund Flow Changes, Stoyu Ivanov Jan 2016

Analysis Of The Factors Impacting Etfs Net Fund Flow Changes, Stoyu Ivanov

Faculty Publications

PurposeThe purpose of this study is to identify the factors that impact the exchange-traded funds net fund flow changes on a daily basis.Design/methodology/approachA total of 1,212 different exchange-traded funds with a proprietary daily net fund flow data and logistic regressions were studied because the majority of the 1,212 exchange-traded funds have mostly zero daily net fund flow changes.FindingsIt was documented that in the period December 22, 2005 to July 28, 2010 autocorrelation at the daily frequency is not universally present for the 1,212 exchange-traded funds that we study, despite the fact that this is the case in the monthly data …


Study Of Reit Etf Beta, Stoyu Ivanov Jan 2016

Study Of Reit Etf Beta, Stoyu Ivanov

Faculty Publications

PurposeThe aim of this study is to examine real estate investment trust exchange-traded funds (REIT ETFs) and test for the existence of the “asymmetric beta puzzle” phenomenon in these financial instruments that are relatively new and are gaining popularity. The “asymmetric beta puzzle” phenomenon is used to identify the hedging and diversification benefits of a financial instrument. “Asymmetric beta puzzle” exists when betas in declining markets are higher than betas in advancing markets.Design/methodology/approachTo study 14 REIT ETFs by using monthly and daily Center for Research in Security Prices (CRSP) data. Capital asset pricing model (CAPM) and Fama–French three-factor model were …


The Influence Of Operational Resources And Activities On Indirect Personnel Costs: A Multilevel Modeling Approach, Bradley C. Boehmke, Alan W. Johnson, Edward D. White, Jeffery D. Weir, Mark A. Gallagher Jan 2016

The Influence Of Operational Resources And Activities On Indirect Personnel Costs: A Multilevel Modeling Approach, Bradley C. Boehmke, Alan W. Johnson, Edward D. White, Jeffery D. Weir, Mark A. Gallagher

Faculty Publications

Indirect activities often represent an underemphasized, yet significant, contributing source of costs for organizations. In order to manage indirect costs, organizations must understand how these costs behave relative to changes in operational resources and activities. This is of particular interest to the Air Force and its sister services, because recent and projected reductions in defense spending are forcing reductions in their operational variables, and insufficient research exists to help them understand how this may influence indirect costs. Furthermore, although academic research on indirect costs has advanced the knowledge behind the modeling and behavior of indirect costs, significant gaps in the …


Forging Tomorrow's Air, Space, And Cyber War Fighters: Recommendations For Integration And Development, Mark Reith Jan 2016

Forging Tomorrow's Air, Space, And Cyber War Fighters: Recommendations For Integration And Development, Mark Reith

Faculty Publications

Today’s Airmen operate in contested environments, and years of technical-data spillage, coupled with policies emphasizing commercial-off-the-shelf acquisition, ensure that the immediate future will remain contested as our adversaries seek to exploit level playing fields. Long gone are the days of Operation Desert Storm and Enduring Freedom when air superiority dominated and the supporting elements of space, communications, and computers were largely out of reach for many nation-states. Since then, technology has become ubiquitously intertwined in weapon systems and today largely turns the gears of warfare, allowing a range of actors to erode national instruments of power.


Scaling Up Your Story: An Experiment In Global Knowledge Sharing At The World Bank, Shad Morris, James B. Oldroyd, Sita Ramaswami Jan 2016

Scaling Up Your Story: An Experiment In Global Knowledge Sharing At The World Bank, Shad Morris, James B. Oldroyd, Sita Ramaswami

Faculty Publications

Timely and effective knowledge transfer is increasingly important in today’s technologically advanced global market. However, a myopic focus on efficiency has frequently rendered most organizational knowledge ineffective. By coupling technology with a formal system that captures informal stories in an engaging and entertaining way, actors within an organization may be more willing to listen to what geographically dispersed colleagues are doing, and may be more likely to ascribe value to that information. Focusing on the International Finance Corporation of the World Bank Group, we conducted interviews with those sharing and using knowledge, and performed content analyses of 175 knowledge-sharing narratives. …


Firm-Specific Human Capital Investments As A Signal Of General Value: Revisiting Assumptions About Human Capital And How It Is Managed, Shad S. Morris, Sharon A. Alvarez, Jay B. Barney, Janice C. Molloy Jan 2016

Firm-Specific Human Capital Investments As A Signal Of General Value: Revisiting Assumptions About Human Capital And How It Is Managed, Shad S. Morris, Sharon A. Alvarez, Jay B. Barney, Janice C. Molloy

Faculty Publications

Research Summary:

Prior scholarship has assumed that firm-specific and general human capital can be analyzed separately. This paper argues that, in some settings, this is not the case because prior firm-specific human capital investments can be a market signal of an individual’s willingness and ability to make such investments in the future. As such, the willingness and ability to make firm-specific investments is a type of general human capital that links firm-specific and general human capital in important ways. The paper develops theory about these investments, market signals, and value appropriation. Then the paper examines implications for human resource management …


Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal Jan 2016

Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal

Faculty Publications

Innovation requires inventors to have both "new knowledge" and the ability to combine and configure knowledge (i.e. "combinatory knowledge") and such knowledge may flow through networks. We argue that both combinatory knowledge and new knowledge are accessed through collaboration networks, but that inventors' abilities to access such knowledge depends on its location in the network. Combinatory knowledge transfers from direct contacts, but not easily from indirect contacts. In contrast, new knowledge transfers from both direct and indirect contacts, but is far more likely to be new and useful when it comes from indirect contacts. Exploring knowledge flows in 69,476 patents …


Developing A Risk Model To Target High-Risk Preventive Interventions For Sexual Assault Victimization Among Female U.S. Army Soldiers, Amy E. Street, Anthony J. Rosellini, Robert J. Ursano, Steven G. Heeringa, Eric D. Hill, John Monahan, James A. Naifeh, Maria V. Petukhova, Ben Y. Reis, Nancy A. Sampson, Paul D. Biese, Murray B. Stein, Alan M. Zaslavsky, Ronald C. Kessler Jan 2016

Developing A Risk Model To Target High-Risk Preventive Interventions For Sexual Assault Victimization Among Female U.S. Army Soldiers, Amy E. Street, Anthony J. Rosellini, Robert J. Ursano, Steven G. Heeringa, Eric D. Hill, John Monahan, James A. Naifeh, Maria V. Petukhova, Ben Y. Reis, Nancy A. Sampson, Paul D. Biese, Murray B. Stein, Alan M. Zaslavsky, Ronald C. Kessler

Faculty Publications

Sexual violence victimization is a significant problem among female U.S. military personnel. Preventive interventions for high-risk individuals might reduce prevalence but would require accurate targeting. We attempted to develop a targeting model for female Regular U.S. Army soldiers based on theoretically guided predictors abstracted from administrative data records. As administrative reports of sexual assault victimization are known to be incomplete, parallel machine learning models were developed to predict administratively recorded (in the population) and self-reported (in a representative survey) victimization. Capture–recapture methods were used to combine predictions across models. Key predictors included low status, crime involvement, and treated mental disorders. …