Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Kennesaw State University

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 109

Full-Text Articles in Business

South African Millennials’ Attitudes Towards The Communications Effect Of Youtube Marketing, Rodney G. Duffett Associate Professor Dec 2020

South African Millennials’ Attitudes Towards The Communications Effect Of Youtube Marketing, Rodney G. Duffett Associate Professor

The African Journal of Information Systems

YouTube (YT) is the largest global digital video information and communication technology (ICT) channel and has become an important channel for companies and their brands to reach younger target markets with their marketing communications (MC). The main objectives of this research are to determine the effect of YouTube marketing communications (YTMC) on traditional and non-traditional attitudinal relationships, and to establish whether demographic variables and usage factors have an effect on traditional attitudinal relationships among the South African millennial cohort. A multi-stage sampling method was employed and 1,900 millennial cohort members (aged 18-32 years old) participated in the survey. Structural equation …


Emerging Internet Technologies And The Regulation Of User Privacy, Phil Nyoni, Mthulisi Velempini, Nehemiah Mavetera Dec 2020

Emerging Internet Technologies And The Regulation Of User Privacy, Phil Nyoni, Mthulisi Velempini, Nehemiah Mavetera

The African Journal of Information Systems

Modern Internet-based technologies pose a threat to privacy, as they possess multiple sensors or features that collect data about users. There is a need to determine the privacy risks that affect users in South Africa as there are a few studies on the subject. A qualitative study was done which involved interviewing seven experts and a survey consisting of 101 respondents. The results show that regulators view emerging technologies as potentially risky and are motivated by public interest to develop protective laws. It therefore is necessary that regulators develop robust laws to help prevent privacy violations. Furthermore, this paper proposes …


2020 - The First Annual Fall Symposium Of Student Scholars Dec 2020

2020 - The First Annual Fall Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Fall 2020 Symposium of Student Scholars, held on December 3, 2020. Includes abstracts from the presentations and posters.


Augmented Reality In Sport Marketing: Uses And Directions, Chad Goebert Nov 2020

Augmented Reality In Sport Marketing: Uses And Directions, Chad Goebert

Faculty and Research Publications

The augmented reality (AR) market is expected to grow to $60.55 billion by 2023 and there are currently an estimated 4.2 billion AR-capable devices in the hands of consumers. Experts believe that sport is a high-value market for AR as it is uniquely positioned to utilize AR in multiple marketing contexts (Haber, 2019). The COVID-19 pandemic has accelerated the rate at which sport organizations are utilizing AR as they attempt to reach fans and consumers that are limited or restricted from attending events in person. This article introduces augmented reality to sport managers and practitioners and defines AR, detailing how …


Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu Oct 2020

Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu

The African Journal of Information Systems

The pervasiveness of public sector corruption has been a major concern by successive governments and their citizenry. In order to curb such corruption, previous studies have focused on the anti-corruption strategies adopted by governments in isolation, but little or no study has focused on the interactions of the anti-corruption strategies. Using the concept-centric approach, we reviewed 91 studies systematically to understand the trends of government anti-corruption strategies. From the synthesized studies, we identified three dominant themes of anti-corruption strategies and their associated concepts. In addition, we also identified one dimension that captures information technology (IT) as a vehicle that enhances …


Contingency Planning Amidst A Pandemic, Natalie C. Belford Oct 2020

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin Oct 2020

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman Oct 2020

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus Oct 2020

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …


Automated License Plate Recognition Using Existing University Infrastructure And Different Camera Angles, Andre Calitz, Matthew Hill Aug 2020

Automated License Plate Recognition Using Existing University Infrastructure And Different Camera Angles, Andre Calitz, Matthew Hill

The African Journal of Information Systems

Number or license plate recognition has become an essential technology for traffic and security applications. Providing access control at any organization or academic institution improves the level of security. However, providing security personnel to manually control the access of vehicles at an academic institution is costly, time-consuming, and to a limited extent, error prone. This study investigated the use of an automated vehicle tracking system, incorporating experimental computer vision techniques for license plate recognition that runs in real-time to provide access control for vehicles and provide increased security for an academic institution. A vehicle monitoring framework was designed by using …


The Form, Function And Materiality Of Portable It In Inter-Organizational Control, Gamel O. Wiredu Jul 2020

The Form, Function And Materiality Of Portable It In Inter-Organizational Control, Gamel O. Wiredu

The African Journal of Information Systems

Extant explanations of inter-organizational (IO) control are based on functional assumptions of information technology (IT) at the expense of structural assumptions. By focusing on structural assumptions, this paper explains how and why the formal and material properties of portable IT shape IO control. Based on analysis of portable IT mediation between a government agency and traders for tax administration, it was found that portable IT, with the support of the IO structure, reduces IO control. This occurs because portable IT invites users to subvert its connectivity and visibility with the support of the IO structure. Portable IT and IO structures …


Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick Jul 2020

Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick

The African Journal of Information Systems

Research shows that the information systems domain is underrepresented in project complexity as it has only eight percent representation within the project complexity landscape. Emphasis is placed mostly on generic project management and engineering project management. This begs the question of how well IS project complexity is understood in literature? The goal of this research is to perform the groundwork for developing new theoretical foundations for information systems (IS) project complexity by enriching previous work. Complexity theory was applied to develop a comprehensive theoretical model for IS project complexity. The IS project complexity (ISPC) model was developed and revealed that …


A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku Jul 2020

A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku

The African Journal of Information Systems

The coordination of communication and awareness efforts in the process of Information Security Incident Management (ISIM) has been identified as a critical means of enhancing information security protection in organizations. This paper aims to explore the nuances of organizational information security with respect to the coordination of communication and awareness efforts among organizational stakeholders towards achieving a shared, interactive, and participatory ISIM. According to the findings of the study in the organizations sampled, it has been identified that reporting, communication, and awareness efforts within ISIM were found to be largely uncoordinated. The exploratory findings provided a rationale for the proposal …


Predicting Factors Contributing To Road Traffic Accident And Implying Driver’S Driving Behavior In Addis Ababa City,, Shimelis Shiferaw Deneke Mr., Shimelis Shiferaw Deneke Mr, Abdurahman Ali Endalkachew Mr, Shimelis Shiferaw Deneke, Abdurehman Ali Jul 2020

Predicting Factors Contributing To Road Traffic Accident And Implying Driver’S Driving Behavior In Addis Ababa City,, Shimelis Shiferaw Deneke Mr., Shimelis Shiferaw Deneke Mr, Abdurahman Ali Endalkachew Mr, Shimelis Shiferaw Deneke, Abdurehman Ali

African Conference on Information Systems and Technology

This study tries to uncover which factor could be associated with Addis Ababa City rode traffic accident and implicate drivers driving behaviors based on the data collected from post-accident. Which is the capital city of Ethiopia. The main objective of this research is Appling data mining technique to explore on factors that could associated with drivers related factors with road traffic accident to provide an insight way to reduce road traffic accident. The data was collected from road traffic accident from the real-world data collected at accident time in Addis Ababa City/Ethiopia. Totally 4285 datasets with 20 attributes were used. …


Business - It Strategic Alignment Improvement Framework: A Case Study On An Ethiopian Bank, Menelik Belete, Yonas Hagos Jul 2020

Business - It Strategic Alignment Improvement Framework: A Case Study On An Ethiopian Bank, Menelik Belete, Yonas Hagos

African Conference on Information Systems and Technology

In recent years, the bank sector is heavily relies on IT and has been investing a lot to easily reach their customer and gain the competitive advantages. Unfortunately, due to alignment gap between the business and IT strategy, they were not able to maximize their IT return value. The purpose of this study is finding internal and external challenges that hinders business and IT strategy alignment in the context of an Ethiopian Bank, A. The study conducted as a qualitative case study. The main finding shows that vendor dependency, lack of proper system evaluation, lack of clear national regulation, external …


Adoption And Challenges Of Mobile Banking Systems In Ethiopia: The Case Of Cooperative Bank Of Oromiya, Ebisa Beyene Jul 2020

Adoption And Challenges Of Mobile Banking Systems In Ethiopia: The Case Of Cooperative Bank Of Oromiya, Ebisa Beyene

African Conference on Information Systems and Technology

The incorporation of information system into organizations for the purpose of getting competitive advantage, easing workload, providing intangible (soft) work place and coping up with technological advancement has become an indispensable for organizations. Due to these many companies (like banks) are getting advantages of information communication technology implementation like Mobile Banking (M-banking), Internet banking, Automatic Teller Machine, etc. Accordingly Ethiopian commercial banks have implemented Mbanking system into their service system. This research examine adoption of M-banking system in Ethiopia focusing on Cooperative bank of Oromiya with respect to the challenges which can influence the bank from taking advantage and expected …


Learnings From A Cloud Migration Project At A South African Retailer, Nonqaba Jaka, Carolien Van Den Berg Dr. Jul 2020

Learnings From A Cloud Migration Project At A South African Retailer, Nonqaba Jaka, Carolien Van Den Berg Dr.

African Conference on Information Systems and Technology

All industries are aware of the potential benefits of cloud computing, however, the migration to cloud has not been widely adopted by South African retailers. The purpose of this paper is to explore the motivations behind organisations deciding to migrate to cloud and the factors that may impact a successful cloud migration project. The paper discusses a case study that analysed the key drivers and the impact of cloud migration within a retail environment. The empirical findings suggest that skills and competencies largely impact every aspect of cloud migration, from decision making to execution and support. Furthermore, that migrating to …


Information Technology Disaster Recovery Plan (Itdrp) Framework For Banks In Ethiopia, Nigussie Tariku, Lemma Lessa Jul 2020

Information Technology Disaster Recovery Plan (Itdrp) Framework For Banks In Ethiopia, Nigussie Tariku, Lemma Lessa

African Conference on Information Systems and Technology

IT services and solutions in the banking sector should be protected to keep the business continuity in a disastrous scenario. This study aims to develop an Information Technology Disaster Recovery Plan (IT DRP) framework in the case of Ethiopian Banks. Qualitative case study method is employed to investigate current best practices and challenges in Ethiopian banks. The findings indicated that Banks do not have IT DRP in place. Lack of framework, lack of focused group, lack of experiences, and lack of standardization are some of the challenges identified. Accordingly, the IT DRP framework is proposed for Banks of Ethiopia. The …


Factors Affecting Mobile Payment Adoption By Merchants In Ethiopia, Firehiwot Abebe, Lemma Lessa Jul 2020

Factors Affecting Mobile Payment Adoption By Merchants In Ethiopia, Firehiwot Abebe, Lemma Lessa

African Conference on Information Systems and Technology

Nowadays the world witnessed a rapid growth in mobile commerce and widespread use of mobile devices. The growth of mobile commerce depends on widely accepted mobile payment systems. However, this trend is not well experienced in developing countries like Ethiopia. Even though merchants somehow benefited from the rapid growth in electronics commerce and use of mobile devices in ecommerce, they still hesitate to effectively employ in their day to day transactions. Little research has been conducted to examine and explain the merchants' views on the new payment technology. In this paper, we explore the factors that affect merchants’ adoption of …


Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez Jun 2020

Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez

Journal of Cybersecurity Education, Research and Practice

As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure software applications from the group up. Therefore, defensive secure coding techniques covering security concepts must be taught from beginning computer science programming courses to exercise building secure applications. Using static analysis, this study thoroughly analyzed Java source code in two textbooks used at a collegiate level, with the goal of …


Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi Jun 2020

Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

Journal of Cybersecurity Education, Research and Practice

Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …


A Conceptual Information Technology Project Management Assurance Framework, Elizabeth Mkoba, Carl Marnewick May 2020

A Conceptual Information Technology Project Management Assurance Framework, Elizabeth Mkoba, Carl Marnewick

The African Journal of Information Systems

Over the last decade, information technology (IT) projects have continued to fail at an alarming rate. Project managers are still battling to manage and deliver successful IT projects in organizations. The conceptual information technology project management assurance framework developed consists of project assurance processes. The conceptual framework was validated through a survey of 121 IT project managers from organizations in seven African countries. The purpose of this paper is to present research findings on how well project assurance processes are implemented and their importance in achieving a successful IT project outcome in organizations. The findings indicate that most project assurance …


Causes Of Challenges In Implementing Computer-Based Knowledge Management Systems In Healthcare Institutions: A Case Study Of Private Hospitals In Johannesburg, South Africa, George Maramba, Alfred Coleman, Felix F. Ntawanga May 2020

Causes Of Challenges In Implementing Computer-Based Knowledge Management Systems In Healthcare Institutions: A Case Study Of Private Hospitals In Johannesburg, South Africa, George Maramba, Alfred Coleman, Felix F. Ntawanga

The African Journal of Information Systems

The advent of computer-based knowledge management systems has changed the world, especially in the way businesses operate, making them an integral aspect to modern economies and the drivers of success. Studies show that the implementation of computer-based knowledge management systems is challenging, particularly in healthcare institutions. This paper presents a study that was undertaken to identify the causes of challenges encountered when implementing computer-based knowledge management systems in healthcare institutions. A case was used as this study’s research methodology in which three private hospitals based in Johannesburg, South Africa, were utilized. Six participants, two from each private hospital, were purposively …


In-Service Biology Teachers’ Perceptions And Pedagogical Rating Of Two Mobile Learning Applications Recommended For Learning Biology In Nigerian Secondary Schools, Uchenna Udeani Prof, Jeremiah Nosakhare Akhigbe Mr May 2020

In-Service Biology Teachers’ Perceptions And Pedagogical Rating Of Two Mobile Learning Applications Recommended For Learning Biology In Nigerian Secondary Schools, Uchenna Udeani Prof, Jeremiah Nosakhare Akhigbe Mr

The African Journal of Information Systems

The study investigated in-service biology teachers’ perceptions of the instructional use of smartphones equipped with Biology Mobile Learning Applications (BMLAs) in the learning of biology concepts in Nigerian senior secondary schools and the pedagogical rating of two commercially available mobile learning applications recommended for learning biology. The study utilized a descriptive survey design. Data collected were analyzed using descriptive and inferential statistics. Findings gathered revealed that the in-service biology teachers had good perceptions of the instructional use of BMLAs and that these perceptions influence their pedagogical rating and selection of mobile applications. The study also revealed that demographic variables such …


Using Multiple Data Sources For Customer Satisfaction Analyzing: A Sentimental Approach, Jhanvi Vyas May 2020

Using Multiple Data Sources For Customer Satisfaction Analyzing: A Sentimental Approach, Jhanvi Vyas

Master of Science in Information Technology Theses

The effectiveness of data and data providers in marketing has created a hype in the marketing world. Businesses often face a divided approach because of the increasing volume of data collected through a variety of data channels. This results in marketers often facing problems in acquiring precise market data for analysis. The correct techniques and knowledge required to integrate all the available sources for acquiring proper analytical results are yet to be specifically known. There is no universally accepted technological methodology when it comes to integrating data sources for market analysis, but there are a few business concepts that can …


Data-Driven Investment Decisions In P2p Lending: Strategies Of Integrating Credit Scoring And Profit Scoring, Yan Wang Apr 2020

Data-Driven Investment Decisions In P2p Lending: Strategies Of Integrating Credit Scoring And Profit Scoring, Yan Wang

Doctor of Data Science and Analytics Dissertations

In this dissertation, we develop and discuss several loan evaluation methods to guide the investment decisions for peer-to-peer (P2P) lending. In evaluating loans, credit scoring and profit scoring are the two widely utilized approaches. Credit scoring aims at minimizing the risk while profit scoring aims at maximizing the profit. This dissertation addresses the strengths and weaknesses of each scoring method by integrating them in various ways in order to provide the optimal investment suggestions for different investors. Before developing the methods for loan evaluation at the individual level, we applied the state-of-the-art method called the Long Short Term Memory (LSTM) …


2020 - The Twenty-Fourth Annual Symposium Of Student Scholars Apr 2020

2020 - The Twenty-Fourth Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Twenty-fourth Annual Symposium of Student Scholars, held on April 16, 2020. Includes abstracts from the presentations and posters.


A Credit Analysis Of The Unbanked And Underbanked: An Argument For Alternative Data, Edwin Baidoo Apr 2020

A Credit Analysis Of The Unbanked And Underbanked: An Argument For Alternative Data, Edwin Baidoo

Doctor of Data Science and Analytics Dissertations

The purpose of this study is to ascertain the statistical and economic significance of non-traditional credit data for individuals who do not have sufficient economic data, collectively known as the unbanked and underbanked. The consequences of not having sufficient economic information often determines whether unbanked and underbanked individuals will receive higher price of credit or be denied entirely. In terms of regulation, there is a strong interest in credit models that will inform policies on how to gradually move sections of the unbanked and underbanked population into the general financial network.

In Chapter 2 of the dissertation, I establish the …


The Expanded View Of Individualism And Collectivism: One, Two, Or Four Dimensions?, Jennifer L. Priestley, Kamal Fatehi, Gita Taasoobshirazi Apr 2020

The Expanded View Of Individualism And Collectivism: One, Two, Or Four Dimensions?, Jennifer L. Priestley, Kamal Fatehi, Gita Taasoobshirazi

Faculty and Research Publications

Recent research to analyze and discuss cultural differences has employed a combination of five major dimensions of individualism–collectivism, power distance, uncertainty avoidance, femininity– masculinity (gender role differentiation), and long-term orientation. Among these dimensions, individualism–collectivism has received the most attention. Chronologically, this cultural attribute has been regarded as one, then two, and more recently, four dimensions of horizontal and vertical individualism and collectivism. However, research on this issue has not been conclusive and some have argued against this expansion. The current study attempts to explain and clarify this discussion by using a shortened version of the scale developed by Singelis et …