College of Business: Faculty Presentations (1988-2021)
About the Collection
Collection preserves presentations by current and former faculty and staff.
Need Help?
Have a question about GS Commons? Need additional description, text alternatives, or captions for GS Commons resources? Contact us or request accessible formats (opens in new tab).
from 2015
Cleaning Up After Fraudsters, Thomas A. Buckhoff
Cleaning Up After Fraudsters, Thomas A. Buckhoff
Conducting Effective Fraud Investigations, Thomas A. Buckhoff
How to Tell if Someone is Lying, Thomas A. Buckhoff
Introduction to Fraud Examination and Forensic Accounting, Thomas A. Buckhoff
The Top 20 Fraud Schemes, Thomas A. Buckhoff
The Top Five Fraud Schemes, Thomas A. Buckhoff
Why Internal Controls Often Fail, Thomas A. Buckhoff
The Capacious Model of Leadership Identities Construction: Contributions and Implications, Constance Campbell
A Systematic Program Analysis of Undergraduate HR Education: The Pursuit of Quality and Innovation, Steven D. Charlier, Lisa A. Burke-Smalley, and Sandra L. Fisher
Overcome the Challenge to Supply Chain Collaboration, Chung-Yean Chiang and Zhengyu Liu
Using Auditing to Improve Project Management Performance, Michael J. Cuellar
Dealing with Difficult Co-Workers, Luther T. Denton and Constance Campbell
A Capacious Fluid Model of Leader(ship) Identities, Chrys Egan, Constance Campbell, S. Lynn Shollen, Kelly Fisher, Wendy Fox-Kirk, and Brionne G. Neilson
A Bioecological Approach to Leadership Identity Construction, Kelly Fisher, Wendy Fox-Kirk, Chrys Egan, S. Lynn Shollen, Constance Campbell, Karen A. Longman, and Brionne G. Neilson
The New Online Professor, Sara J. Grimes, Michael P. McDonald, and John Leaptrott
The Impact of Exchange Rate Deviations From PPP Equilibrium on the U.S. Demand for Foreign Equity Securities, Axel Grossmann, Chris Paul, and Marc W. Simpson
A Longitudinal Analysis: When/How Older Adults Decide and Use a Technology, Hyo-Joo Han and Dong-Yup Han
Using Delphi Technique to Explorer Critical Factors in Cloud Security Auditing, Hyo-Joo Han and Jungwoo Ryoo
Can Information Technology Overcome Perils of Supply Chain Complexity?, Akhadian S. Harnowo, Gerard Burke, Alan W. Mackelprang, and Cheryl L. Aasheim
Hire Someone Like Me, or Someone I Need? Entrepreneur Identity and Early Stage Hiring in Small Firms, Robert C. Hoell and Steven A. Stewart
Emergent Supply Chain Sustainability Strategies of Top Sustainable Manufacturers, Mohammed Anas Irfan, Gerard Burke, and Amit Arora
An Exploratory Look at Indian Millennials’ Media Perceptions, Rajesh Iyer, Jacqueline K. Eastman, Heather Monteiro, and Seema Singh Zokarkar
Social Media Marketing Use in Georgia’s Institutions of Higher Education, James Kelly, Lindsay Larson, and Luther Trey Denton
Contingency Factors of Bargaining Power in a Supplier's Network of Major Customers, Yoon Hee Kim