Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Kennesaw State University

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 85

Full-Text Articles in Business

Agency Theory And Corporate Governance In China: A Meta-Analysis, Canan C. Mutlu, Marc Van Essen, Mike W. Peng, Sabrina F. Saleh Dec 2017

Agency Theory And Corporate Governance In China: A Meta-Analysis, Canan C. Mutlu, Marc Van Essen, Mike W. Peng, Sabrina F. Saleh

Faculty and Research Publications

Do agency theory-based “good corporate governance” principles indeed apply to China? A straightforward answer to this question is lacking, because evidence is inconclusive across studies. We endeavor to fill this gap by conducting the first meta-analysis on the China literature with two focuses. First, we assess the impact of (i) board independence, (ii) board leadership structure, and (iii) managerial incentives on firm performance, as these elements have been central to both agency theory as well as to Chinese corporate governance reforms. Second, we extend current theorizing by showing support for the temporal hypothesis, which states that over time, with the …


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee Dec 2017

The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee

The African Journal of Information Systems

There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between …


Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke Dec 2017

Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke

The African Journal of Information Systems

This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current generation …


Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr. Dec 2017

Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr.

The African Journal of Information Systems

This paper presents the findings of a study that uses the advanced impact analysis (ADVIAN®) method to derive critical success factors (CSFs) of enterprise resource planning implementation in higher education institution. Through analysis of CSFs, the paper contributes towards assisting higher education institution to reduce some of the plethora of challenges in this domain as highlighted in the literature. The ADVIAN® method classified 20 factors into categories of integration, criticality and stability as well as ranked them by measures of precarious, driving and driven. The results of the classification and ranking show 5 factors that are ideal for intervening activities …


Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo Dec 2017

Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo

The African Journal of Information Systems

The South African ICT industry is struggling with high turnover despite the relatively high remuneration packages it offers to its gender and racially diverse IT professionals. This study explored pay satisfaction levels and its relationship with job satisfaction, organizational commitment, and turnover intentions. Survey responses from 158 IT professionals were subjected to descriptive, correlation and regression analysis. The results show that, irrespective of gender or race, employees generally have low pay satisfaction, low organizational commitment, and only moderate job satisfaction levels. However, black ethnic groups did show a difference in their appraisals of pay satisfaction, expressing slightly lower pay satisfaction …


Students' Perceptions Of Interactive Technology As A Learning Tool In Legal Studies Courses, Cristen W. Dutcher, Sonia J. Toson Dec 2017

Students' Perceptions Of Interactive Technology As A Learning Tool In Legal Studies Courses, Cristen W. Dutcher, Sonia J. Toson

Faculty and Research Publications

This article attempts to further the literature on technology in the classroom by performing an initial investigation on an innovative new textbook technology in an undergraduate legal studies course, such as the Legal Environment of Business. First, we discuss the traditional methods of teaching the law at both the law school and undergraduate levels. We also review the history and effectiveness of using technology in law school and legal studies classrooms. Next, we look the use of textbooks in legal education. Then, we introduce LearnSmart, an adaptive and interactive textbook technology and compare it to other electronic texts in the …


Cause-Related Marketing: The Effect Of Checkout Charity Requests On Consumer Donation Behavior, Brian R. Kinard, Minerva Lacal Pardo Nov 2017

Cause-Related Marketing: The Effect Of Checkout Charity Requests On Consumer Donation Behavior, Brian R. Kinard, Minerva Lacal Pardo

Atlantic Marketing Journal

The aim of this research was to understand better consumer reactions to donation requests when making point of purchase decisions. A between-subjects full factorial design manipulated product type (goods/services), consumption experience (frivolous/practical), and product/cause fit (strong/weak). In line with prior research (e.g., Chang, 2008; Savary et al, 2015; Strahilevitz & Myers, 1998), a scenario-based approach was employed to assess responses to the CRM manipulations. A total of 241 subjects participated in the study. Our results mirror extant research evidence on the positive effects of pairing frivolous products with donation requests. In that, positive donation behavior largely results as consumers compensate …


Double Trouble: Commingled Effects Of Fast Food And Sugar-Sweetened Beverage Consumption And The Intervening Role Of Physical Activity On Childhood Obesity, Christopher Berry, Scot Burton, Elizabeth Howlett Nov 2017

Double Trouble: Commingled Effects Of Fast Food And Sugar-Sweetened Beverage Consumption And The Intervening Role Of Physical Activity On Childhood Obesity, Christopher Berry, Scot Burton, Elizabeth Howlett

Atlantic Marketing Journal

Children are exposed to a great deal of food and beverage promotion. This is particularly concerning given that the prevalence of childhood obesity, a critical public health challenge, may be partially due to the increased consumption of fast food and sugar-sweetened beverages. However, there are lingering questions about the complex relationships between fast food and sugar-sweetened beverage consumption, physical activity levels, and childhood obesity. To address these complex relationships, this research examines the interaction of fast food and sugar-sweetened beverage consumption, along with the frequency of physical activity, in leading to the likelihood of a child being overweight or obese. …


Entrepreneurship Marketing In North Carolina’S Wine Industry, George D. Shows, Pia A. Albinsson, James E. Stoddard Nov 2017

Entrepreneurship Marketing In North Carolina’S Wine Industry, George D. Shows, Pia A. Albinsson, James E. Stoddard

Atlantic Marketing Journal

Entrepreneurial marketing seeks to create, communicate and deliver value to customers and manage customer relationships in ways that benefit the organization. This paper explores whether increased entrepreneurial marketing practices at North Carolina wineries can lead to enhanced winery performance. A web survey was delivered to N.C. wineries by email. The results suggest that winery customer intensity and innovation was positively related to winery satisfaction of winery performance. Also, innovation and value creation were found to be positively related to percentage sales change at wineries.


Couples Sleeping Apart--Separate Master Bedrooms And The Impact On The Real Estate And Related Markets, John E. Crawford Nov 2017

Couples Sleeping Apart--Separate Master Bedrooms And The Impact On The Real Estate And Related Markets, John E. Crawford

Atlantic Marketing Journal

Sleeping is a fundamental individual human need. However, most adults fulfill this need by sleeping with a partner, a behavior particularly true for married couples. A trend of couples choosing to sleep apart has emerged in recent years. For reasons practical and personally beneficial or preferred, a growing number of couples are choosing to have a home with two master bedrooms--one for him and one for her, each furnished according to the needs and tastes of the partners. Thus, some homes are being built with two master bedrooms, others are being modified to have two master bedrooms, and new empty …


Do Investors Value Comparative Ads? The Effects Of Comparative Advertising On Stock Returns, Tommy Hsu Nov 2017

Do Investors Value Comparative Ads? The Effects Of Comparative Advertising On Stock Returns, Tommy Hsu

Atlantic Marketing Journal

Comparative advertising has been more widely used in the United States. However, based on research that has been done in the past, the effectiveness of comparative advertising is still a controversial argument even though it is generally believed that comparative advertising is more effective than non-comparative advertising. Previous studies have been mainly focusing on the effects on consumer behavior. This study tries to fill the research gap to emphasize on the effects from investors’ perspectives. Therefore, the effect of comparative advertising on stock returns is investigated. Also, since many American firms are doing business in other countries and begin advertising …


The Narcissistic Salesperson: A Framework Of Their Relationships With Job Satisfaction, Organizational Commitment, And Customer Orientation, J. Garry Smith Nov 2017

The Narcissistic Salesperson: A Framework Of Their Relationships With Job Satisfaction, Organizational Commitment, And Customer Orientation, J. Garry Smith

Atlantic Marketing Journal

Narcissistic salespersons can have detrimental effects on customer relationships and voluntary turnover. These impediments to organizational effectiveness occur through their relationships with customers, coworkers, supervisors, and the organization. Conversely, narcissistic salespersons also possess some attractive salesperson characteristics such as charm, resilience, confidence, competitiveness, and initial likeability. In this paper, I draw from the psychology, marketing, sales, and organizational literatures to develop a conceptual framework which illustrates the relationships of narcissistic salespersons with customers and critical job-related attitudes that affect their relationship with the organization. Specifically, this framework contains empirically testable proposed relationships between narcissism and the following specific outcomes of …


Fees, Going Concern Opinions And Auditor Dismissals: An Empirical Assessment, Frances Ann Stott Oct 2017

Fees, Going Concern Opinions And Auditor Dismissals: An Empirical Assessment, Frances Ann Stott

Doctor of Business Administration Dissertations

Auditors issue going concern modified opinions when there is substantial doubt about the company’s ability to continue its operations into the foreseeable future. Companies frequently respond to this type of audit opinion by changing auditors. Critics, such as the SEC, suggest that this may be done in order to opinion shop (i.e., find an auditor who is likely to issue a more favorable unqualified opinion). However, prior research has indicated that opinion shopping may not be effective. Since firms receiving a going concern modified opinion are clearly under significant financial distress, the effect a change in auditor has on subsequent …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …


An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina Sep 2017

An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina

The African Journal of Information Systems

The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus group …


Application Of New Theory In Entrepreneurship: Social Cognition, Ryan Matthews Dr., Kelly R. Hall, Lucy Matthews Sep 2017

Application Of New Theory In Entrepreneurship: Social Cognition, Ryan Matthews Dr., Kelly R. Hall, Lucy Matthews

Atlantic Marketing Association Proceedings

No abstract provided.


Developing A Model For Entrepreneurs: Niche Tourism And Consumer Typologies, Michelle B. Kunz, Janet M. Ratliff Sep 2017

Developing A Model For Entrepreneurs: Niche Tourism And Consumer Typologies, Michelle B. Kunz, Janet M. Ratliff

Atlantic Marketing Association Proceedings

No abstract provided.