College of Business: Faculty Presentations (1988-2021)

 

About the Collection

Collection preserves presentations by current and former faculty and staff.

Need Help?

Have a question about GS Commons? Need additional description, text alternatives, or captions for GS Commons resources? Contact us or request accessible formats (opens in new tab).

Follow


from 2015

Cleaning Up After Fraudsters, Thomas A. Buckhoff

Cleaning Up After Fraudsters, Thomas A. Buckhoff

Conducting Effective Fraud Investigations, Thomas A. Buckhoff

How to Tell if Someone is Lying, Thomas A. Buckhoff

Introduction to Fraud Examination and Forensic Accounting, Thomas A. Buckhoff

The Top 20 Fraud Schemes, Thomas A. Buckhoff

The Top Five Fraud Schemes, Thomas A. Buckhoff

Why Internal Controls Often Fail, Thomas A. Buckhoff

The Capacious Model of Leadership Identities Construction: Contributions and Implications, Constance Campbell

Link

A Systematic Program Analysis of Undergraduate HR Education: The Pursuit of Quality and Innovation, Steven D. Charlier, Lisa A. Burke-Smalley, and Sandra L. Fisher

Link

Overcome the Challenge to Supply Chain Collaboration, Chung-Yean Chiang and Zhengyu Liu

Using Auditing to Improve Project Management Performance, Michael J. Cuellar

Link

Dealing with Difficult Co-Workers, Luther T. Denton and Constance Campbell

A Capacious Fluid Model of Leader(ship) Identities, Chrys Egan, Constance Campbell, S. Lynn Shollen, Kelly Fisher, Wendy Fox-Kirk, and Brionne G. Neilson

A Bioecological Approach to Leadership Identity Construction, Kelly Fisher, Wendy Fox-Kirk, Chrys Egan, S. Lynn Shollen, Constance Campbell, Karen A. Longman, and Brionne G. Neilson

Link

The New Online Professor, Sara J. Grimes, Michael P. McDonald, and John Leaptrott

The Impact of Exchange Rate Deviations From PPP Equilibrium on the U.S. Demand for Foreign Equity Securities, Axel Grossmann, Chris Paul, and Marc W. Simpson

A Longitudinal Analysis: When/How Older Adults Decide and Use a Technology, Hyo-Joo Han and Dong-Yup Han

Using Delphi Technique to Explorer Critical Factors in Cloud Security Auditing, Hyo-Joo Han and Jungwoo Ryoo

Link

Can Information Technology Overcome Perils of Supply Chain Complexity?, Akhadian S. Harnowo, Gerard Burke, Alan W. Mackelprang, and Cheryl L. Aasheim

Link

Hire Someone Like Me, or Someone I Need? Entrepreneur Identity and Early Stage Hiring in Small Firms, Robert C. Hoell and Steven A. Stewart

Link

Emergent Supply Chain Sustainability Strategies of Top Sustainable Manufacturers, Mohammed Anas Irfan, Gerard Burke, and Amit Arora

An Exploratory Look at Indian Millennials’ Media Perceptions, Rajesh Iyer, Jacqueline K. Eastman, Heather Monteiro, and Seema Singh Zokarkar

Link

Social Media Marketing Use in Georgia’s Institutions of Higher Education, James Kelly, Lindsay Larson, and Luther Trey Denton

Link

Contingency Factors of Bargaining Power in a Supplier's Network of Major Customers, Yoon Hee Kim