23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual...

31
1 23 rd Annual Southwestern Business Administration Teaching Conference October 29-30, 2015 Conference Abstracts

Transcript of 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual...

Page 1: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

1

23rd Annual Southwestern Business Administration Teaching

Conference

October 29-30, 2015

Conference Abstracts

Page 2: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

2

Program Committee 1. Gwendolyn Catchings, Jackson State University, MS

2. Mayur Desai, Texas Southern University, TX

3. Alicen Flosi, Lamar University, TX

4. Phyllis Keys, Morgan State University, MD

5. Chu Nguyen, University of Houston – Downtown, TX

6. Rahim Quazi, Prairie View A&M University, TX

7. Dale Rude, University of Houston, TX

8. Naveed Saleem, University of Houston – Clear Lake, TX

9. S. Srinivasan, Texas Southern University, TX (Conference Chair)

10. Kun Wang, Texas Southern University, TX

Conference Chair’s Note

I am pleased to present the Abstracts for this year’s Annual Teaching Conference. I was assistted by Dr. Rahim Quazi and Dr.

Phyllis Keys in the preparation of these Abstracts. I want to thank these two Program Committee members for their dedication and

timeliness in making the Abstracts uniform in appearance. All Abstracts were reviewed by two academics and their comments

communicated to the Corresponding Authors. I want to thank all the reviewers for their commitment to excellence and timely

response. The Abstracts are arranged in alphabetical order of the presenter. An asterisk is placed to identify the presenter in multi-

authored abstracts. All authors are listed in the List of Authors at the end of this document.

Houston, TX S. Srinivasan, Ph.D.

October 19, 2015 Conference Chair

Page 3: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

3

A Novel Analytical Look at Disruptive Technologies and the Cyclical Trends of Emerging and

Displaced Technologies in the Digital Age

Nabie Y. Conteh

Charles A. Briggs*

Southern University at New Orleans

[email protected]

This paper will attempt to review the evolving face of disruptive technologies (the different types of emerging technologies that are continually

displacing established ones), explore the factors behind the phenomenon, and study the growth trajectory in digital technologies. The paper will

compare and contrast the two categories of sustaining and disruptive technologies and will further shed light on their impact in altering our

lifestyle, our work, and businesses, as well as the global economy. It will illustrate how big companies, in the area of sustaining technologies,

excel at understanding their market by being close to their customers and putting together a mechanism in place to help develop existing

technology. Conversely, the paper will also highlight the trouble companies experience for not taking advantage of the potential efficiencies,

cost-savings, or new marketing opportunities created by low-margin disruptive technologies. The paper will use real-world examples to

demonstrate the usual phenomenon wherein a big corporation tends to overlook the value of a disruptive technology based on the fact that it

does not reinforce the current goals of the company, only to be blindsided as the technology reaches a high point of maturity, attracts and

retains a larger audience and market share, and threatens to upset the status quo. The paper will close with conclusions based on research data

obtained from innovations in digital technologies.

A Practical Coaching Model for

Critical Thinking Skill and Leadership Development (C/CTSLD)

Gwendolyn Catchings

Jackson State University

[email protected]

Critical thinking skills are a core competency needed by today’s leaders. However, a deficiency in critical thinking skills in the workplace has

been well documented, and research has shown dire consequences for the individual and the organization. This paper espouses a practical

coaching model for improving critical thinking skills and facilitating leadership development. Using a solution-focused approach with the six

critical thinking skills as identified by the APA Delphi Research Report, its iterative nature fosters the formation of “habits of mind”. Using

coaching (questioning) techniques on the first four skills, qualitative (interview) data was gathered from new entrants into the workforce.

Page 4: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

4

Improvements in their critical thinking skills were measured using quantitative data (pre, mid and post) gathered from the California Critical

Thinking Skills Test. Results showed improvements in critical thinking skills for almost all participants (future leaders). These findings

support the value and use of coaching and critical thinking skill development in management/leadership development programs or any program

focused on personal and/or professional development. Future research warrants the use of an extended coaching schedule (for individual and

group participation) and the inclusion of the last two skills. In addition, the use of a larger research sample and follow-up testing/evaluation for

a year to validate the formation of “habits of mind” is needed.

Characteristics of a Successful Teacher:

Threading Through Face-to-Face and Online Classes

Amitava Chatterjee

Texas Southern University

[email protected]

Many researchers have investigated the traits that create a successful teacher. In similar vein, the advent of online education elicits a growing

body of literature that expounds the characteristics of a successful online instructor. A series of articles indicate that the teacher attributes, such

as (1) experience, (2) preparation programs and degrees of the instructors, (3) type of certification possessed by the instructors, (4) coursework

taken in preparation for the profession, and (5) the teachers’ own test scores are important contributing factors in providing teacher quality.

Taken together, the mastery of content knowledge appears to be an important factor in determining teaching effectiveness. More recently,

researchers propose characteristics that all the successful teachers in both traditional and online teaching formats possess. Irrespective of the

teaching format, a successful teacher is highly organized and presents the instructional materials with absolute clarity. Another common trait,

irrespective of the learning format indicates that an effective educator is energetic, dynamic, self-confidant, and emanates enthusiasm. A

popular teacher is also a great proponent of interactive teaching. This paper investigates the common qualities that make an instructor effective

in both formats of the instructional methods. We approach the task by blending the established ‘best practices’ in teaching with the key

characteristics of effective online teaching.

Page 5: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

5

Quality in Education and the Transition to the Digital Economy

Oscar H. Criner

Texas Southern University

[email protected]

Quality improvement and business process re-engineering was forced upon American industry because of the loss of market share from

competition on the world market. Education is not generally viewed as an industry by educators, but it is a very large industry and many

businesses sell into the education market. The processes of higher education can be viewed in the same manner as those of any other business

enterprise. The products of institutions of higher education are research, education, and community service. For primary and secondary

institutions focusing on education, the product is an educated graduate and the customer is society, who needs and pays for the education

services. More importantly, these are the “raw materials” for the system of higher education. Customers provide the requirements for the

product and feedback on the quality and performance. Our customers are telling us that the quality of our product needs to be improved.

Recognizing the deficiencies in the product of institutions of higher education (using a business process model) and of the raw material from

our suppliers, there needs to be an end-to-end definition for quality improvement change in the processes of education in much the same way as

processes would be changed in a business enterprise undergoing a continuous quality improvement program. This presentation examines how

this significant quality improvement in education might be accomplished.

Strategic Approach to Manage Cybersecurity Risks in Small Businesses

Mayur S. Desai*

Kamala Raghavan

Texas Southern University

[email protected]

Cybersecurity is a topic of discussion at boardrooms of businesses, small and large. From the recent hacking of Ashley Madison, an online

dating service to the embarrassing disclosures of confidential data from Sony Pictures Entertainment, it is obvious that no organization can rest

easy about its information security. Small businesses are becoming painfully aware that their small size does not provide them immunity from

the risk of a cyber-attack. Online businesses can realize substantial benefit and increase potential incremental business revenue streams by

taking steps to alleviate customer fears such as use of technology to protect sensitive customer data, authenticate their websites, and build

consumer trust. Since consumers have the ability to shop at a wide range of trusted e-commerce sites, they can and will make the best choice

that protects their private information. This paper discusses the SEC disclosure guidance for registrants that can provide a model framework for

small businesses and offers steps to strengthen cybersecurity. It reviews the tools available currently on website security to help organizations

Page 6: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

6

protect critical data and build trust with customers such as Secure Sockets Layer (SSL) encryption, the need for data encryption offered by

SSL, and additional measures such as authentication of website legitimacy and trust building with one’s customer base.

Instructor Misbehavior and the Millennial Student: Bridging the Generational Gap

Bettye Rogers Desselle

Texas Southern University

[email protected]

The primary purpose of this research is to explore aspects of instructors’ attitudes and behavior that may be viewed as instructor misbehavior

by millennial students. Instructors communicate with students in a variety of ways that positively or negatively impact student motivation and

learning. These communications are the result of a complex set of factors that include instructors’ personal characteristics, attitudes from

previous experiences, intergenerational differences, and other conscious and unconscious factors. This is especially true for instructors who

communicate with the current generation of students known as millennials, those students born between the years 1982 and 2002. A large

percentage of instructors are from the Generation X (born 1965-1981) and Baby Boomer (born 1946-1964) generations. This generational gap

has caused a divide in instructors’ teaching techniques and students’ learning styles. Instructors should realize that the methods that they used

to learn are no longer effective for millennial students and may cause unintentional instructor misbehavior, as perceived by millennial students.

The paper contributes to the body of knowledge by assisting instructors in changing and adapting teaching strategies to bridge the generational

gap between millennials and previous generations to reduce the millennial student’s perception of instructor misbehavior. This research will

also provide a basis for a further study that will provide information that can assist instructors in making adjustments to their teaching style so

that they are more likely to accomplish their instructional student learning goals for all students, including millennials.

Leadership: Using Case Studies to Increase Learning and Interest

Jeff Dyson*

Alicen Flosi

Lamar University

[email protected]

Case studies featuring local businesses offer an opportunity to align with recently revised AACSB standards calling for engagement, impact,

and innovation. Case studies are innovative, thought-provoking ways to present students with decision-making practice and real-world

Page 7: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

7

situations. They impact the local business community by showcasing a business in the region the college serves. Protagonist’s participation in

the development and presentation of a case provides a unique opportunity for engagement. Students pay close attention to the dynamics of

companies they are familiar with, have worked for, or done business with. This project utilizes a series of cases that focus on leadership and

entrepreneurial behavior in response to challenge and adversity. Each case examines a family’s path to business success despite overwhelming

personal and professional odds. Secondary issues include strategies and tactics that were employed to sustain the business in response to

market conditions and changes in the competitive landscape. The cases are designed to complement two widely used management and

entrepreneurship books: Stephen Covey’s 7 Habits of Highly Effective People, and Michael Gerber’s E-Myth. Students are provided a series

of dilemmas requiring them to develop, analyze, and prioritize the leader’s alternatives. The cases require students to consider numerous

personal, professional, and family business dynamics that come into play and to recommend courses of action. This paper, written by one of

the business owners in collaboration with university professors, reviews the project including the origination, case problem, teaching steps, and

a look at the success of the project and areas for improvement.

In the Mood: A Socionomic Inquiry into the Discounted Cash Flow Valuation Model of Stock

Valuation

Dennis Elam

Texas A&M University-San Antonio

[email protected]

Socionomics is a field of study conducted under the hypothesis that waves of social mood motivate the character of social actions. Socionomics

turns conventional wisdom upside down. Most observers believe social mood is a product of external stimuli. If the news is negative, a

negative mood is likely to develop among those watching the news. Socionomics, however, postulates that mood is endogenously or internally

generated. For example rather than observing rioting causes people to be angry, the proper view is that angry people are liable to riot. Previous

research suggests serious differences between economics and finance. Economics follows traditional supply demand notions that demand

drives supply creation eventually lowering prices. Finance as demonstrated in the stock market works in opposite fashion. The higher the

prices, the more there is demand for the stock. The discounted cash flow valuation model is questioned with a comparison of Shake Shack, a

recent IPO, and Wendy’s, a long established international fast food chain. Massive positive social mood towards Shake Shack has given it an

outsized valuation compared to Wendy’s. The market capitalization cannot be the discounted present value of future cash flows and be that

close to Wendy’s valuation. This will be a lively presentation with examples of how social mood shapes the trends in music, movies, and even

stock market valuations.

Page 8: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

8

Security in Mobile Environments (A Teaching Module)

Lila Ghemri*

Texas Southern University

Shengli Yuan

University of Houston-Downtown

[email protected]

The number and usage of mobile devices have grown exponentially these last few years, so much so that they are bound to become the

dominant platform to access the internet, social and entertainment media. This is particularly true for young people who use their mobile

devices for many activities from working on their homework to accessing their financial data or communicating with their social network of

friends and acquaintances. This surge in mobile devices and mobile software use has also attracted the interest of hackers who have turned their

attention to designing or reformatting malware and spyware specifically to infect mobile environments. Google Android is the most common

and widely used mobile platform with 87 percent share of the global smartphone market. Sadly, it also holds the top position in terms of

malware designed to attack the Android platform with 97 percent. We will discuss the way security principles and guidelines have evolved

with mobile environments and the vulnerabilities and challenges mobile devices and mobile applications present. We will also outline the most

common security threats and exploits in these environments and their targets. Finally, we will present a set of guidelines that both

administrators and users of mobile devices and mobile applications should adopt to preserve the security and integrity of their systems.

Conducting Empirical Research in a Graduate Class

by Use of Publicly Available On-line Database

Richard P. Green

Texas A & M University-San Antonio

[email protected]

This effort presents the structure of a graduate class in accounting research methodology in which students were challenged to conduct a

meaningful research project within the financial constraints of an institution that does not make most commonly-used business databases (e.g.,

CRSP® and Compuserve®) available to either students or faculty. This article describes how the EDGAR database was accessed to extract text

data concerning firms’ selection of depreciation method. Since 2009, publicly-held companies that are listed on U.S. stock exchanges have

been required by the Securities Exchange Commission (SEC) to file financial reports marked-up with XBRL. This functionality allows

financial statements to be retrieved, browsed, searched, and analyzed using readily-available XBRL reader applications. The project comprised

Page 9: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

9

downloading a copy of the EDGAR database to a local server. The data were then accessed through use of the Python programming language

which allowed extracting the desired data directly from the compressed (.zip) format. Data then were analyzed using the data analysis

functions of Microsoft Excel. This process allowed students to complete an empirical accounting research project using primary data. The use

of open-source data sources, open-source programming language, and a Microsoft Office program which is furnished to each student allowed

this project to be completed at zero added cost to either the students or the university.

Personality Typing in Online College Students: A Research Proposal

David Hansen

Texas Southern University

[email protected]

In the case of strictly online universities, convenience may indeed be the most important motivation. However, many students opt to get an

online degree at an established, primarily traditional university that offers online degrees as well as traditional courses. Why would they go to

such a university to get an online degree? Is it the convenience combined with the reputation and, thus, quality of the university? We wish to

investigate this interesting contradiction by looking at factors specific to those individuals who make the choice of studying online at

established universities. Although a large body of research exists concerning distance, virtual, and online learning, relatively little research has

been conducted on characteristics of students who prefer to attend online classes. Those few articles have concerned themselves with

demographics. In general, they have reported no significant differences in things like grades, age, course work completed, and other variables.

Other studies have concerned the type of course or the nature of the learning experience. The differences they found are situational, not

personal. Knowing whether a certain type of person is more likely to succeed in online courses could help both the university selection process,

as well as the student choice process. There is a personality type called introversion that may be related to preference for the anonymity and

social safety of online classes. Our main assertion in this research is that people with a strong need for social safety and, thus, the environment

of online education are more introverted.

Page 10: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

10

The Propensity of Young People to Ignore Collections Communications: An Examination of the True

Cost of Ignorance

Danny Harvey*

Reginald L. Bell

Prairie View A&M University

[email protected]

In this article, we examined the recent literature to determine the propensity of young adults, between 18 to 30 years of age to ignore collection

agency communications. We uncovered a good deal of information pertinent to the true, sometimes life-long, cost of ignoring such

communications. We now identify several reasons that young adults may have reached their present state. However, we follow up with reasons

why these states do not have to persist. Presenting current legislation and recommendations for higher education’s role, we give suggestions for

halting this growing problem. The ignorance about financial literacy among young adults has roots in an inadequate general education

curriculum in schools and colleges. We, therefore, present a series of helpful steps young people can take to know their consumer rights, to

avoid the pitfalls of indebtedness, and to embrace proper habits that develop financial fortitude.

Using Application Exercises to Effectively Teach Complex Business Law Concepts

Cris S. Houston

Prairie View A&M University

[email protected]

Business Law is a difficult course for many law students who have earned at least one undergraduate degree and are now in professional

school; therefore, an undergraduate Business Law professor faces the formidable challenge of effectively teaching novice undergraduate

student learners complex concepts and critical thinking skills. First, the undergraduate Business Law professor seeks to guide the students as

they learn legal concepts and rules that many of the students have never even heard of. Then, the professor seeks to train the students to

undertake critical thinking in the form of legal reasoning as a means of applying those new legal concepts and rules to solve hypothetical client

problems that could arise in a real-world business setting. In this presentation, I demonstrate ways that I use application exercises to effectively

deliver challenging course material and enhance students’ ability to learn complex business law and legal problem-solving skills. I will

outline my 30:70 course delivery model for helping students to concretize difficult, abstract legal concepts and to apply these concepts to

analyze law-related problems like an informed businessperson or lawyer. Under this 30:70 model, I typically lead a lecture-driven class

Page 11: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

11

discussion on legal concepts and rules for approximately 30 percent of the class period. Then, I lead multiple, application-driven exercises

based on the concepts and skills discussed in the lecture for approximately 70 percent of the class period. I will also provide some examples of

my 30:70 course delivery model.

Incorporating Critical Thinking in Teaching: Theory and Practice

Balaji Janamanchi

Texas A&M International University

[email protected]

In Texas, the Texas Higher Education Coordinating Board (THECB) Rules, Chapter 4 Subchapter B dealing with the Texas Core Curriculum

require, “Critical Thinking Skills” as a core objective along with five other core objectives. At Texas A&M International University, as part of

the Quality Enhancement Plan (QEP) under the regional accrediting agency’s reaccreditation process, a new initiative of Applied Critical

Thinking as expressed through undergraduate research titled “ACT on IDEAs” is being launched. The author gained a renewed understanding

of the critical thinking concepts, its components and practices from attending the Professional Resources and Opportunities for Faculty (PROF)

Center’s Applied Critical Thinking Workshop 2015. Many questions were answered and concepts defined at the workshop. For example:

What is critical thinking? What does critical thinking involve? What are the elements of thought? What is critical thinking in the context of a

discipline? What are some ideas on improving critical thinking in classroom activities? What intellectual standards exist for understanding and

evaluating thinking? This presentation shares theoretical aspects of critical thinking, as well as some tools and techniques, from the workshop

of the PROF center, as well as a detailed discussion on how some of the new techniques were implemented in an undergraduate course on

production and operations management.

Is There Still a Place for the Old-Fashioned Socratic Method in Business Teaching Today?

Martin Lindenberg

Texas Southern University

[email protected]

The history of teaching going back to the ancient Greeks and people even before that includes a long tradition of rhetorical dialog between

teacher and student. Today’s technology-centric teaching methods with slides, multi-media, web-based materials and even long-distance

learning seem to preclude much Socratic interaction between teacher and student. This talk explores the circumstances and conditions that

make Socratic teaching relevant today, exploring questions such as level of students, class size and subject matter appropriate for this method.

Page 12: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

12

We will engage the audience to share ideas as to how to make students more involved in the active learning process, thereby enhancing greater

retention of the material. There is significant evidence in the literature that active learning promotes greater retention.

Use of a Common Reading Activity for Teaching Bioethics, Cultural Sensitivity, and Learning

beyond the Classroom

Shirlette G. Milton

Texas Southern University

[email protected]

A common reading activity was used to teach bioethics and cultural sensitivity to students in a graduate level course and apply the principles

learned to a community outreach project with adolescents. This project examined whether common reading of the book “The Immortal Life of

Henrietta Lacks” could accomplish the teaching of these principles to both student groups to achieve Learning Beyond the Classroom (LBC) as

an outreach project. Students in a graduate level pharmaceutical sciences bioethics class were required to read the book for a lecture series on

ethics in biomedical research. Students participated in a group readiness test prior to class discussions. Class discussions provided answers to

assessment questions which tested factual knowledge as well as questions which tested application and critical thinking. The final project for

the lecture series required students to compile a list of ethical infractions detailed in the book, including resulting policies. Students were also

required to formulate an application project for LBC and to develop and implement a community outreach activity to expose adolescents to

principles of healthcare disparities, bioethics and the role of health professionals. Graduate students and teens gained knowledge regarding

bioethics and cultural sensitivity. Teaching these principles could be accomplished through a common reading experience of the referenced

book for both student groups, allowing for a graduate LBC experience.

Self-Handicapping – From Business School to Leadership

Jordan P. Mitchell*

Phillip Decker

University of Houston-Clear Lake

[email protected]

The effects of self-handicapping have been widely researched in the psychology and education literatures, but remain absent from the

business/leadership literature. Self-handicapping is the process where individuals attempt to externalize a potential failure by means of an

Page 13: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

13

excuse or reduced effort. Self-handicapping is caused by uncertainty and the need to manage impressions rather than focusing on learning and

growing competence. This process is usually successful at first but eventually manifests itself in poor leadership. It is learned and reinforced in

education, but can be overcome in several ways. Exceptional leaders are more effective because they place priority on mastering their own

competence rather than avoiding mistakes or trying to “look” competent – impression management. The authors believe that a focus on self-

handicapping in management should be part of every business school curriculum. To become exceptional leaders, students must first learn what

behaviors are sabotaging their leadership efforts. Eliminating self-handicapping changes goal orientation and frees up wasted effort that can be

redirected to excellence. How to manage such a negative force for leadership should start in business schools. When business students evolve

into early careerists, self-handicapping may protect and enhance the impressions of others in the short term, but continued use will lead them to

ineffective and poor leadership. Using what is known about self-handicapping in the education and sports literatures, we explain how to design

classroom structure to equip future managers/leaders to overcome what they do to self-sabotage their leadership.

LARPing It Up: An Innovative Classroom Exercise about Stock Options Utilizing Student Role

Playing

Frank J. Cavaliere

Toni P. Mulvaney*

Delvin D. Seawright

Marleen R. Swerdlow

Lamar University

[email protected]

This paper deals with a classroom exercise concerning two timely topics—stock options and LARPs (Live Action Role Playing). Our students,

mostly millennials, are quite familiar with LARPs. A LARP allows participants to act out their characters' actions. The players pursue goals

within a fictional setting representing the real world while interacting in character. In our classroom LARP, students will be assigned roles

from a variety of stakeholders with legitimate interests affected by the use of stock options by a fictional American corporation considering

offshoring an existing domestic plant. These roles may include the director, the hedge fund manager with large ownership stake, the mayors of

the towns where the plant is located or potentially relocated, a national politician, and a member of the U.S. Chamber of Commerce. The

number of stakeholders can be expanded infinitely as these topics are important to almost every aspect of society. Students must decide

whether closing the plant is a reasonable action from the perspective of the stakeholder they represent, taking into consideration the history of

stock options, Wall Street’s attitude toward plant closings, the social costs associated with plant closings, the efficacy of stock buy-back plans,

and the ethics of the proposed plant closing and its relationship to stock options. This exercise will enhance and impact student learning

because the students will be educating themselves about the perspectives of stakeholders, interacting with other students, and engaging in an

after-action report with a group discussion about the pros and cons of the various views.

Page 14: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

14

Engaging Ideas:

Collaborations between Industry and Business Programs

Chynette Nealy

University of Houston Downtown

[email protected]

Engaging learners to understand the realistic implications in coursework is a continuing problem for academicians. To address this issue, the

author discusses how collaborations between industry representatives and business faculty focusing on redesigning business communication

content and assignments could be applied to engage business majors’ career insight. The business communication course is part of the core of

the undergraduate business major at the author’s university. Understanding the connections between coursework and industry expectations

might help business majors develop career insight thereby improving degree and career choices. Of particular interest to the author, is using

these findings in terms of engaging learners’ to make better degree and career choices. To limit the scope of this study, the author focuses on

learners seeking business degrees. In brief, as suggested by related literature, learners’ knowledge and skill gaps derive from how little they

know about expected workplace practices. This stems from how underprepared – lacking career insight – students are when choosing to

pursue a business degree. Audience participation will be highly encouraged in this presentation.

Factors Influencing Performance in Mathematics Assessment

of Economics Students at an Urban Four-Year University

Chu V. Nguyen*

Stephen Miller

Thai Nguyen

University of Houston-Downtown

[email protected]

This study utilizes the Ordered Logit model to examine personal and contextual factors that may contribute to scores on mathematics and

graphic assessment of economics students attending a large urban minority-serving institution. To this end, the empirical results of this

investigation indicate that the following factors influence student performance in a mathematics and graphing assessment: transfer credit hours

Page 15: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

15

and taking additional math courses. Colleges of Businesses have certainly shared in the struggle to keep students from dropping out before they

complete their college education. Business educators require students to take lower level developmental or “foundation” courses called

“gateway” courses. Gateway courses provide students the “literacy” and “numeracy” skills needed to successfully complete a four-year

business program. Research has found a high correlation between student success in gateway courses and the likelihood of graduating with a

postsecondary degree. However, there is growing concern that today’s college students are not assimilating numeracy, or quantitative skills, as

effectively as they should when taking gateway courses, leaving them insufficiently prepared to handle the rigors of higher level business

courses that are quantitative in nature and less likely to complete their college education. In recent years, research to understand factors that

influence mathematics achievement has been growing. In this presentation we will present the results of our analysis on this important topic.

The Power and Potential of Student Voice

Judith Owens

Texas Southern University

[email protected]

After my first semester of teaching a course that was new to me, I reviewed semester outcomes using the factors of attendance, grades and

gender. This review showed the following – 1) a passing rate of 69%, and 2) a strong correlation between rate of attendance and grade

attainment. A passing rate of 69% was unacceptable. I developed a list of changes I thought would positively impact the attendance rate and

grades. During my second semester of teaching this same course, I searched for a problem-based project for students. It occurred to me that I

could share the outcome results from the previous semester with this current semester’s students and elicit their input about potential changes. I

believed they may have insight that would be both informative and relevant. With few exceptions, their suggestions fell into common

categories and were fairly consistent. I implemented many of their suggestions and saw surprising changes to both the attendance rates and

grades. For me, this project affirmed the power of Student Voice in affecting positive changes to course design, instruction and grades. Student

Voice describes how students give their input on what happens within an institution of learning and in the classroom. The goal of Student

Voice is for students to know that their expertise, opinions and ideas have value and that they have the potential to create change. Student

Voice can take many forms - informal group discussion, partnering in curriculum design or establishing norms of behavior and policy.

Page 16: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

16

YOU are Your Brand:

Employers’ Perceptions of Applicants during the Screening Process

Delonia Cooley

Rochelle Parks-Yancy*

Texas Southern University

[email protected]

When the average person thinks of the term “brand”, it’s generally in the context of a product or service. Just like a company’s brand is

exemplified in its products, press releases about its products, its social media content, etc., job applicants’ brands are exemplified in the

willingness of others to refer them, their resume content, the content of their job applications, their job interview performance, recommendation

letters and, increasingly, in their online presence. Though employers utilize both traditional screening mechanisms and social media to

determine job applicants’ brand and suitability for their organization, some studies have found that social media is not necessarily a better

predictor of job performance than traditional measures. In other words, employers don’t necessarily get a better job performance return on their

investment (ROI) in screening employees’ brand utilizing social media versus screening using traditional methods. Despite previous research,

questions remain regarding how employers utilize traditional screening methods and social media to determine job applicants’ brand and if they

are a fit with the employers’ organization. For example, which screening methods are most important to employers, in terms of likelihood of

offering the job to a candidate? Which methods are more likely to exclude a candidate from being offered the job? Which methods can

determine the immediate exclusion of a candidate from consideration for the job and which may help a candidate overcome an, otherwise, poor

showing on another screening mechanism? Which of those screening methods gives employers the best return on their screening investment

and which gives the least?

The Continued Struggle with Strategy Execution

Lynne Patten

Clark Atlanta University

[email protected]

In today’s fast paced, global marketplace, it is important for companies to have a well-developed and well-executed strategy. However, this

task is much easier said than done, especially for institutions of higher education. Many organizations have become very adept at strategy

formation, but somehow get lost in the complex nature of effective strategy execution. Too often there is an over emphasis on the development

of strategic plans, goals, and outcomes and a lack of emphasis on ensuring that the necessary organizational structure and processes are in place

Page 17: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

17

to allow for effective implementation of those plans. This paper posits that knowledgeable and flexible leadership, organizational alignment,

adequate technology, and performance measurements are critical factors necessary for effective strategy execution. This research will evaluate

these factors and how each is impacting institutions of higher education. This perspective draws on current literature and survey data to explore

these factors and evaluate how each factor impacts strategy execution in higher education. The educational landscape is experiencing

significant growth and continues to be dynamic. However, many institutions of higher education are struggling to keep pace with market

changes, lagging behind, or about to fail. It is important to understand how these organizational factors can help institutions of higher education

improve operations, become more competitive, and improve organizational outcomes.

Creating Relevance in Managerial Accounting

Using a Business Plan

Richard Pitre*

Joseph Boyd

Texas Southern University

[email protected]

The traditional managerial accounting course is a lower level version of the cost accounting course. Students are introduced to the differences

between managerial accounting and financial accounting, cost terms, break-even analysis, job costing, process costing, inventory management,

budgeting, etc. Many of these students come to the business school with limited knowledge of the operations of a business. As a result, most of

their accounting education is a process of rote learning. The objective of this project is to determine whether a student awareness of how

businesses are created and operated can enhance their understanding of managerial accounting: facilitate an intellectually disciplined process of

actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, real life experiences of

creating and operating a business. Successful conclusion of this project will facilitate an intellectually disciplined process of actively and

skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from real life experiences of creating and

operating a business. In addition to making managerial accounting more relevant, this process will provide students with the ability to

appreciate the application of accounting knowledge in all future accounting courses. Successful conclusion of this project will also improve the

students’ ability to: articulate the basic management accounting process, apply managerial accounting principles and procedures, prepare entry

level management accounting reports, understand the organization and management of a business and related risk, and be successful on the

relevant parts of the Uniform Certified Public Accounting Examination.

Page 18: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

18

Cloud Computing and Health Care Privacy

Richard Pitre*

Carlton Perkins

Texas Southern University

[email protected]

Cloud computing allows computer users to conveniently rent access to fully featured applications, to software development and deployment

environments, and to computing infrastructure assets such as network-accessible data storage and processing. Cloud-based services use the

Internet to store data. This can be risky and can mean less control over your data. Privacy is the foundation of the entire health care system.

Without it, patients will not trust their doctors enough to tell them about symptoms and illnesses that are painful, frightening, and embarrassing.

Patients need and require absolute privacy to trust the doctors, to face what ails them, and seek professional help. Privacy addresses the

confidentiality of data for specific entities, such as consumers or others whose information is processed in a system. Privacy carries legal and

liability concerns, and should be viewed not only as a technical challenge but also as a legal and ethical concern. Protecting privacy in any

computing system is a technical challenge; in a cloud setting this challenge is complicated by the distributed nature of clouds and the possible

lack of consumer awareness over where data is stored and who has or can have access. The objective of this paper is to analyze the ways in

which your health care privacy rights can be violated and the consequences for the CPAs using cloud services. This paper will use the Health

Net & IBM Data Breach as a basis for analysis.

Cyber Fraud and Financial Reporting

Richard Pitre*

S. Srinivasan

Texas Southern University

[email protected]

The rapid growth in the use of the Internet as a way of life has given rise to serious Cyber Security issues. As a result, there has been a

substantial change in the manner in which commerce is conducted today. As one watches the daily news of the high profile security breaches, it

becomes very clear of the need to understand the impact of this issue on financial reporting. The objective of this presentation is to determine if

the lack of reporting the potential for Cyber Fraud as a contingent obligation is an internal control issue, a contingent liability or a materiality

issue. This presentation seeks to answer the question: Is Cyber Fraud relevant in terms of financial reporting? To answer the question this

presentation will analyze the data breaches that occurred at Heartland Payment Systems, Target, Home Depot, Chase Bank and eBay and the

consequent unauthorized leak of customer data. Materiality is an expression of relative significance or importance of a particular matter in the

Page 19: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

19

context of financial statements. The assessment of what is material is a matter of professional judgment. Information is material if its omission

or misstatement could influence the economic decision that users take on the basis of the financial statements. We want to point out in this

presentation how these companies reported the impact of data breaches. In this presentation we will present the data that we looked at based on

the data breaches at the aforementioned businesses that resulted in unauthorized release of customer information for millions of customers. The

participants will be able to note the possible financial fraud aspects based on this analysis.

Cyber Security in the Context of Business Applications:

A Course Delivery Model

P. V. Rajkumar

Texas Southern University

[email protected]

Most business activities are seamlessly integrated with the cyber space; from inventory maintenance to enterprise resource planning, from

schedule to budget planning are being carried out using internet enabled software applications. Nowadays, it is important for the business

students, who will eventually become responsible for handling these applications, to get trained in security risks and protection techniques.

Business applications often store, transport, and share data within the cyberspace. Cyberspace consist of a large number of interconnected

subsystems placed across national boundaries, and securing business data, in this context, is a complicated task both in technical and in

management terms. With an adequate training in cyber security, business application users can be equipped to safeguard the organization’s

assets while interacting and using the cyberspace. The features of the subsystems and the type of interconnection network often decide the kind

of security measure required to protect the application data. Teaching the foundations of systems and networks is essential to develop better

understanding of cyber security. Lecturers on these topics tend to alienate the students. However, bringing the same topics after introducing a

software application and its potential security risks from the user’s perspective rather than the system’s perspective, they tend to show interest

in learning basic security principles. Even though the same security principles are applicable in variety of applications, reciting them in the

context of individual business applications would help in reinforcing the best security practice.

Page 20: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

20

Filling the Gap: Helping Students Integrate the Rationalist (Economics and Finance) and

Behavioralist (Management and Marketing) Paradigms

Dale Rude

University of Houston

[email protected]

One of the major tasks faced by business students is integrating their coursework in the rationalist paradigm (economics and finance) with that

from the behavioralist paradigm (management and marketing). The rationalist paradigm focuses on markets as a unit of analysis, assumes

expert decision makers and a dollar incentive present for all decisions. Math is its primary language. The behavioralist paradigm focuses on

individuals, groups and organizations as units of analysis. No assumptions are made about the nature of decision makers or incentives. Words

are the primary language. These differences have created conflict between the rationalist and behavioralist paradigms for over the last six

decades. The fields of behavioral finance and behavioral economics have emerged as a result. Thomas Kuhn’s groundbreaking book The

Structure of Scientific Revolutions is used as a basis for 1) describing the two paradigms and 2) integrating them. Educational materials and

exercises will be shared.

Creating a Memorable Lecture

Arash Shahi Mahdi Safa* Brenda McCabe

University of Toronto Lamar University University of Toronto

[email protected]

Majeed Safa Seokyon Hwang Steven W. McCrary

Lincoln University Lamar University Lamar University

All instructors hope that students will learn and remember what they teach in the classroom years after the lectures are over, an optimism

challenged by staggering statistics showing that students only retain 10-20% of their lecture material even three weeks after the lectures.

Despite many discouraging and demotivating statistics with respect to lecture material retention rates by students, we all have experienced at

least one instructor whose inspiring lectures have had a long lasting and transformative effect on us. One way to categorize memory is short-

term versus long-term memory. Essentially one can think of short term memory as a “supped-up” white board in one’s mind. The only way in

which this information can be stored for later recall is if it is “filed” in long term memory. In this paper, the authors aim to inspire recognition

in our role, as educators, to design effective lectures which promote optimal memory recall and learning. A number of specific strategies to

Page 21: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

21

promote long-term retention of knowledge are presented, including rehearsal and graphic representation of material, including the graphic

syllabus.

Innovations in Learning from the Ancient Traditions:

Integrating Contemplative Practices in Higher Education

Michele Simms

University of St. Thomas

[email protected]

Since 2000, what is defined as a "quiet pedagogical revolution" is occurring in the US and internationally: contemplative pedagogy (CP). This

paper defines contemplation, provides the theoretical and practical background of contemplative pedagogy and introduces several

contemplative practices applied across disciplines with a focus on the business classroom. When integrated throughout a course, contemplative

practices allow students to delve deeply into the intellectual core of course material, translate that core into personal insights, challenge implicit

assumptions and attitudes about the other, facilitate self-awareness and enable growth in cultural understanding. Of equal import is the effect on

the teacher. Personal practice is at the heart of a successful contemplative course. As with any other skill that comes with knowing one’s

discipline, we must know it well in order to teach it well to others. Therefore, integrating contemplative practices in a course serves the student

and the teacher co-equally and, by extension, the institution. Although many of the contemplative practices pull from ancient traditions, they

continue to offer innovations in student learning at a time of tremendous social and cultural change and serve as an antidote to a world of

distraction and easy fixes. The paper will be presented in a way that engages audience participation and promotes a dialogue on the topic.

Teaching Privacy Protection Concerns amidst Data Breaches

S. Srinivasan

Texas Southern University

[email protected]

Social media is full of personal information about its millions of young users. The users place their personal information such as date of birth

and address as well as their likes and dislikes on numerous topics online. Their intent is to share such information with their circle of friends

and as such they do not have any privacy concerns. Unfortunately the social media companies place such information in a central database for

rapid access. Such centralized systems attract the hackers. Some are motivated by financial greed while a large group of hackers have an

Page 22: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

22

ideological agenda. One group of users who form a significant percentage of social media users are the college students. Our focus in this talk

will be to explore the cybersecurity issues involved as well as how users could protect their online privacy. We will look at how data breaches

occur and what kinds of personal information are released to the general public by the hackers. Since United States based companies dominate

the social media, there has been a very large number of such data breaches over the past 10 years in US. First, we will highlight six of the major

data breaches within the past two years and how cybersecurity protection steps could be taken to prevent future such attacks. Second, one of the

most recent data breaches called Ashley Madison breach has embarrassed and affected the lives of thousands of individuals. Thus, our primary

goal is to focus the cybersecurity education to include awareness of practices to protect people’s privacy.

A Regression Analysis of the Most Influential Management Books of the 20th Century

Marianna Sviland*

Reginald Bell

Mohammed Hussein

Mostafa Soliman

Prairie View A&M University

[email protected]

This study finds that interest in eight of the most influential management books of the 20th century has intensified tremendously over the past

50-years, when examined 5-years at a time, for 10 periods, from 1963-1967 to 2008-2012. The investigation reveals that interest in 25 books

central to the origins of management as a field is increasing rapidly. Interest in March and Simon’s “Organizations,” Maslow’s “Personality

and Motivation,” Taylor’s “Principles of Scientific Management,” Weber’s “The Theory of Social and Economic Organization,” and Barnard’s

“The Functions of the Executive” has increased tremendously over the past 50 years. Data analysis shows differences on main effects and two-

way interaction effects for each model with large effect sizes. Therefore, the data show that there is an increasing utility for the pioneering

books contributing to principles of management. Furthermore, a reduced model shows that March and Simon’s, Taylor’s, Barnard’s, Weber’s

and Maslow’s books have gained more traction over the most recent 25 years, but differ significantly from the other four books examined in

this study concerning the increasing magnitudes of documents containing books’ titles. A stepwise multiple regression revealed the five most

influential books among the 25 books in Bedeian and Wren’s list, and eight very popular 20th century books used as a comparison sample not

on their list.

Page 23: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

23

Online Education in Chinese Universities

Heng Tan*

S. Srinivasan

Texas Southern University

[email protected]

Online education is becoming quite prevalent in Chinese universities now. Online courses are growing rapidly and have become the most

important means to promote reform of higher education in China. In order to understand the way online education is evolving in Chinese

universities, we will investigate the topic in the following ways: curriculum offerings, online course platform, curriculum development,

management and maintenance programs, and application programs. Students in most Chinese universities reside on campus. Online education

is currently used as an addendum to face-to-face education. Authorities have realized that through online education they can reach more

students at various times of the day and students have the ability to learn more information than is possible in classroom instruction. The online

instruction also allows the students to learn more about certain topics that are not offered in classroom instruction. The drawback is that

Chinese students do not have the luxury of using their own computer systems at any time of day. Only some students have access to computer

system of their own and others depend on the institutional computer labs which have restricted hours. Our analysis of the Chinese online

educational experience is based on what is present now and our recommendations might be applicable to other countries which have similar

resource constraints. The expected goal is to strengthen and improve the online course development, promote the reform of higher education

and improve the quality of student training.

Incorporating Online Simulation Tools into an MIS Curriculum

Richard G. Taylor*

Marion S. Smith

Texas Southern University

[email protected]

The use of controlled environments are an effective way to deliver hands-on experiences in typical MIS curriculum courses, such as

programming, database management, network administration, information security, and web design. Controlled environments may be

implemented in a variety of forms – the most common being dedicated computer labs or desktop virtualization technologies. However, the cost

to create such environments may be prohibitive or schools may lack the necessary on-site support to implement and maintain the controlled

environments. Even if a school has a dedicated controlled environment, students may still be required to be on site to complete their

assignments. This becomes problematic when business schools have limited after-hours access. In some cases more than one dedicated

Page 24: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

24

environment is required to accommodate the technological infrastructure requirements for specific hands-on experiences. Even in introductory

classes where Microsoft Office skills are taught, students are required to have access to the software. Software may be available in the school

labs however students benefit from having personal access from their own computer. Even if students have the software installed on their

computer, there are problematic issues such as the computer configuration, software versions or the operating system they are using. A

proposed solution to these issues is to utilize online tools that simulate the learning environment or the software that is being used for the class.

The use of simulations is grounded in action learning and is the basis for experiential learning. Evidence shows that using simulation results in

a shorter learning curve than traditional lecture-based classes.

Predictors of Academic Performance in Intermediate Accounting Courses and Beyond among

Students at an Urban Four-Year University

Chu V. Nguyen

Diana Pence

Douglas teDuits*

University of Houston - Downtown

[email protected]

This study utilized the ordered logit model to examine personal and contextual factors that may contribute to academic success in Intermediate

Accounting among students attending a large urban minority-serving institution. The accounting discipline poses additional challenges for

faculty and administrators because of the following characteristics: (i) the rigor of the subject matter, and (ii) the strict sequencing of the

courses in the program. In addition, the rigor of the accounting curriculum must strictly be adhered to given that accounting programs are

evaluated by the CPA passing rates of its graduates. The empirical results of this investigation indicate that the following factors influence

student performance in Intermediate Accounting I: gender, ethnicity, current GPA, household income level, number of courses enrolled during

the current semester, how long ago Managerial Accounting was taken, grade received in Managerial Accounting, number of out of class hours

spent on Intermediate Accounting I, use of accounting tutoring lab, and academic status of instructors.

Page 25: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

25

Teaching Machine Learning on Research Literature Review in Graduate Seminar

Haibo Wang

Texas A&M International University

[email protected]

Literature review is a time consuming task in the graduate study in all disciplines. In the past two years, I have developed a data analytics

framework combining commercial software such as EndNote and open source software R as machine learning tool to help graduate students on

extract key concepts and research developments in the seminar related topics and organize the literature based on the topology of the research

field. Graduate students can visualize the research development of topic they are interested in and discover the new research opportunities in

the field. There are three phases in this framework. At first, students use EndNote and online library database to build a pool of literature

references with abstract, keywords, author(s) and link to the full paper. In the second phase, students write the R program using its text mining

package (tm) and (wordcloud) to summarize all the important concepts in the literature, using (plyr) for data manipulation, using (syuzhet) for

sentiment analysis, and presenting these concepts in a two-dimensional graph to visualize the relationship of these concepts in the literature. In

the third phase, students can not only discover the collaboration networks of researchers, but also have a clear picture of research stems in the

field. The results of this work can help students to report a well-structured literature review instead of a simple summary of all related

publications. Talent management companies are using a similar approach to discover the technology leader based on the technology social

network.

Effective Teaching Ideas in Governmental and Not-for-Profit Accounting

Kun Wang*

Sewon O

Texas Southern University

[email protected]

Many undergraduate accounting students enter their first course in governmental accounting without much interest about the subject. This is

due, in part, to the fact that after several courses in “accounting,” the governmental course presents methods and procedures which are quite

different and are, therefore, suspect. Also, GNP is normally offered as an elective course at many institutions because the coverage of

governmental materials is being reduced in the CPA exam. Most students choose to take the course with a simple aim to get enough course

credits and graduate. However, the importance of GNP is underestimated by many accounting programs as well as students. In fact, GNP is the

largest “business” in the world. Job opportunities in public sectors have been rising as more governments are recovering from the financial

hardship. Moreover, non-profit organizations continue to show trends of growing in terms of numbers and coverage of services, especially in

Page 26: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

26

the greater Houston area. Inadequate coverage of GNP accounting materials may limit students’ choice when getting into the job market. Based

on the literature, simply using traditional approach to teach GNP accounting proves to be less effective in retaining student interests and

communicating knowledge. Most students would struggle with transformation of terminology, basis of accounting, journal entries and

presentation of the financial statements from for profit accounting. After ten years of teaching GNP accounting for undergraduates, we attempt

to propose ideas that have proved to have stimulated student interests and improved their performance.

Knowledge + Skills = Entrepreneurial Education Success: Design and Delivery of an

Entrepreneurship Curriculum for the Age of Innovation

Mary M. White*

Ramin Cooper Maysami

Donald Causey

Jackson State University

[email protected]

Entrepreneurship curricula at various institutions emphasize, alternatively, the theoretical framework for entrepreneurial success or the skills-

based approach to starting small businesses. We think combining the two is what is necessary for the success of entrepreneurs in the current

fast-evolving economic environment. This presentation will introduce the audience to the recently-designed entrepreneurship curriculum at

Jackson State University based on the review of best practices at top American entrepreneurship programs. The curriculum combines a series

of courses that form a well-integrated four-year program that starts with introducing the students to innovation and creativity and culminates

with a practical course which allows them to prepare for commercialization of their innovations. In between, the program delivers a

combination of knowledge and skills necessary for success as a potential owner of a startup, as well as for existing small business owners.

Page 27: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

27

Entrepreneurship Education: What Have We Learned So Far?

Ramin Cooper Maysami

Mary M. White*

Mercidee Curry

Jackson State University

[email protected]

The United States has traditionally been the education leader in the field of entrepreneurship. The Entrepreneur’s top 25 undergraduate and the

top 25 graduate entrepreneurship programs, for example, are all American universities. A Google search for highly-regarded entrepreneurship

education, as a matter of fact, consistently results in various listings of U.S.-based educational institutions. Entrepreneurship activities,

however, are not only alive, but are thriving worldwide. The importance that foreign governments are placing on entrepreneurship as an engine

of growth will certainly lead to increase in spending on entrepreneurship education and inevitably to entrance of non-American universities in

the ranks of top entrepreneurship programs. This article begins by reviewing the long-asked question of whether entrepreneurs are born or

taught. Based on the conclusion that nature and nurture both influence entrepreneurial tendencies and entrepreneurship success, the article then

examines the structure of entrepreneurship education in non-American universities and compares and contrasts various global approaches to

teaching entrepreneurship to the traditional innovation + risk-taking that characterizes American entrepreneurship education.

If Profiling is Right, We Don’t Want to be Wrong: Deploying the Online Student Profile to Enhance

Student and Program Success

Johnnie Williams*

Felix Ayadi

Ladelle M. Hyman

Texas Southern University

[email protected]

Profiling is a technique that has been used by businesses for decades to identify, assess and target their ideal customers. Customer profiling

allows companies to create a portrait of their customers in order to make design decisions concerning their products or services. To create a

successful marketing strategy targeting online students, higher education institutions and industry consultants have invested extensive time and

money to identify the “ideal online student.” A number of research initiatives have converged to characterize the average online student as the

following persona: female (70%), is busy and needs flexibility (68%), wants to be able to study anywhere, anytime (31%), 33 years old,

Page 28: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

28

working and earning a salary of $65,000 a year, attends part-time, etc. This persona, at least in theory, should provide considerable insight into

who consumes your product and why? This presentation will demonstrate how this profile, even if it does not reflect your student body’s

composition, provides insights for deploying a successful online program by demonstrating how and where you will need to focus your efforts

in the classroom, as well as the nodes for collaborative work across your school and university. Using key findings from the numerous studies

that yielded this insipid profile, as well as other profiling studies, including a meta-study of online education, we will help you gain an

understanding of your program’s online students’ profile. Using your own online students’ profile, we will provide you with methods and

strategies to help enhance your online students’ and program’s success.

Page 29: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

29

List of Authors

Last Name First Name Institution State Country Page

Ayadi Felix Texas Southern University TX USA 27

Bell Reginald Prairie View A&M University TX USA 10, 22

Boyd Joseph Texas Southern University TX USA 17

Briggs Charles Southern University of New Orleans LA USA 3

Catchings Gwendolyn Jackson State University MS USA 3

Causey Donald Jackson State University MS USA 26

Cavaliere Frank Lamar University TX USA 13

Chatterjee Amitava Texas Southern University TX USA 4

Conteh Nabie Southern University of New Orleans LA USA 3

Cooley Delonia Texas Southern University TX USA 16

Criner Oscar Texas Southern University TX USA 5

Curry Mercidee Jackson State University MS USA 27

Decker Phillip University of Houston-Clear Lake TX USA 12

Desai Mayur Texas Southern University TX USA 5

Desselle Bettye Texas Southern University TX USA 6

Dyson Jeff Lamar University TX USA 6

Elam Dennis Texas A&M University-San Antonio TX USA 7

Flosi Alicen Lamar University TX USA 6

Ghemri Lila Texas Southern University TX USA 8

Green Richard Texas A&M University-San Antonio TX USA 8

Hansen David Texas Southern University TX USA 9

Harvey Danny Prairie View A&M University TX USA 10

Houston Cris Prairie View A&M University TX USA 10

Hussein Mohammed Prairie View A&M University TX USA 22

Hwang Seokyon Lamar University TX USA 20

Hyman Ladelle Texas Southern University TX USA 27

Janamanchi Balaji Texas A&M International University TX USA 11

Lindenberg Martin Texas Southern University TX USA 11

Page 30: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

30

Last Name First Name Institution State Country Page

Maysami Ramin Jackson State University MS USA 26, 27

McCabe Brenda University of Toronto Canada 20

McCrary Steven Lamar University TX USA 20

Miller Steven University of Houston-Downtown TX USA 14

Milton Shirlette Texas Southern University TX USA 12

Mitchell Jordan University of Houston-Clear Lake TX USA 12

Mulvaney Toni Lamar University TX USA 13

Nealy Chynette University of Houston-Downtown TX USA 14

Nguyen Chu University of Houston-Downtown TX USA 14, 24

Nguyen Thai University of Houston-Downtown TX USA 14

O Sewon Texas Southern University TX USA 25

Owens Judith Texas Southern University TX USA 15

Parks-

Yancy Rochelle Texas Southern University TX USA 16

Patten Lynne Clark Atlanta University GA USA 16

Pence Diana University of Houston-Downtown TX USA 24

Perkins Carlton Texas Southern University TX USA 18

Pitre Richard Texas Southern University TX USA 17, 18

Raghavan Kamala Texas Southern University TX USA 5

Rajkumar P.V. Texas Southern University TX USA 19

Rude Dale University of Houston TX USA 20

Safa Mahdi Lamar University TX USA 20

Safa Majeed Lincoln University New

Zealand 20

Seawright Devlin Lamar University TX USA 13

Shahi Arash University of Toronto Canada 20

Simms Michele University of St. Thomas TX USA 21

Smith Marion Texas Southern University TX USA 23

Soliman Mostafa Prairie View A&M University TX USA 22

Srinivasan S Texas Southern University TX USA 18, 21,

23

Page 31: 23rd Annual Southwestern Business Administration Teaching ... · PDF file23rd Annual Southwestern Business Administration Teaching Conference ... and study the growth trajectory in

31

Last Name First Name Institution State Country Page

Sviland Marianna Prairie View A&M University TX USA 22

Swerdlow Marleen Lamar University TX USA 13

Tan Heng Texas Southern University TX USA 23

Taylor Richard Texas Southern University TX USA 23

teDuits Douglas University of Houston-Downtown TX USA 24

Wang Haibo Texas A&M International University TX USA 25

Wang Kun Texas Southern University TX USA 25

White Mary Jackson State University MS USA 26, 27

Williams Johnnie Texas Southern University TX USA 27

Yuan Shengli University of Houston-Downtown TX USA 8