Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,887 Full-Text Articles 4,938 Authors 2,124,973 Downloads 148 Institutions

All Articles in Management Information Systems

Faceted Search

3,887 full-text articles. Page 1 of 128.

Meta-Analysis Of Factors Influencing Student Acceptance Of Massive Open Online Courses For Open Distance Learning, Cecilia Temilola Olugbara, Moeketsi Letseka, Ropo Ebenezer Ogunsakin, Oludayo Olufolorunsho Olugbara 2021 University of South Africa, South Africa

Meta-Analysis Of Factors Influencing Student Acceptance Of Massive Open Online Courses For Open Distance Learning, Cecilia Temilola Olugbara, Moeketsi Letseka, Ropo Ebenezer Ogunsakin, Oludayo Olufolorunsho Olugbara

The African Journal of Information Systems

This study aimed to apply the meta-analysis methodology to systematically synthesize results of primary studies to discover the main significant factors influencing student acceptance of massive open online courses (MOOCs) for open distance learning (ODL). An abundance of studies on MOOCs exists, but there is a lack of meta-analysis research on student acceptance of MOOCs, which is a novel contribution of the current study. The meta-analysis methodology was applied to investigate effect sizes, statistical heterogeneity, and publication bias across 36 primary studies involving 14233 participating students. The study findings show satisfaction to be the main significant factor influencing student acceptance ...


The Impact Of Computerized Management Information Systems On The Performance Of Employees In Mobile Telecommunications Company, Abdelkader Msalem 2021 Jinan University

The Impact Of Computerized Management Information Systems On The Performance Of Employees In Mobile Telecommunications Company, Abdelkader Msalem

Al Jinan الجنان

This study aimed to identify the impact of computerized management information systems on the performance of employees In the mobile communications company, and to achieve the objectives of the study was designed, developed a questionnaire consisting of (3) items for the purpose of data collection and measurement variables of the study. It was relying on the statistical package SPSS, using the following statistical methods: descriptive statistics measurements, multiple regression analysis, Spearman correlation coefficient and analysis of variance. The study reached the following findings and having the effect of a statistically significant with the requirements of the operation and management of ...


Exploring The Correlation Between Information And Communication Technology Maturity And Value Of Listed Companies In The Nigerian Stock Exchange, Victor Akinbola Olutayo, Godspower Osaretin Ekuobase 2021 Joseph Ayo Babalola University, Ikeji

Exploring The Correlation Between Information And Communication Technology Maturity And Value Of Listed Companies In The Nigerian Stock Exchange, Victor Akinbola Olutayo, Godspower Osaretin Ekuobase

The African Journal of Information Systems

A fundamental issue within the Nigerian economy that has resulted in information and communication technology (ICT) mis-planning is the uncertainty surrounding how ICT value relates to ICT maturity. In response, the value-added intellectual coefficient model has been used to measure the value of ICT across sectors in the Nigerian stock exchange while their ICT maturity has been measured using the ICT maturity model for small-and-medium scale enterprises. The result has shown that the Nigerian economy is web based in ICT maturity with an index of about 0.67. The ICT value index has been estimated to be about 5.65 ...


Law Helps Ensure Safety Of The Supply Chain, Kenneth Maxik, Craig Kimble, Alberto Coustasse 2021 Marshall University

Law Helps Ensure Safety Of The Supply Chain, Kenneth Maxik, Craig Kimble, Alberto Coustasse

Management Faculty Research

The Drug Quality and Security Act was signed into law on November 27, 2013, and included the Title 2 Drug Supply Chain and Security Act (DSCSA). This legislation was introduced to enact a federal prescription drug safety standard to decrease contamination, counterfeiting, diversion, and otherwise harmful illicit activities. It also improves the detection and elimination of potentially unsafe drugs from the drug supply chain to protect US consumers.


The Impact Of Adaptive Learning In Principles Of Microeconomics, Doris S. Bennett, Cynthia S. McCarty, Michael S. Carter 2021 Jacksonville State University

The Impact Of Adaptive Learning In Principles Of Microeconomics, Doris S. Bennett, Cynthia S. Mccarty, Michael S. Carter

Southwestern Business Administration Journal

Abstract

The spread of Covid-19, which forced almost all learning to move to online in March, 2020, abruptly increased the number of undergraduates taking at least one online course by approximately 177% between the fall of 2019 and the spring of 2020 (Koksal, 2020; Carey, 2020; National Center for Education Statistics, 2020). Even without the Covid-19 disruption, online education has become increasing prevalent due to the decreasing allocation of resources to higher education and the pressure on college administrators to make a college education effective, affordable, and accessible for more students. Originally online instruction differed from in-class instruction only be ...


Teaching, Learning And Academic Integrity During The Pandemic, william saunders, Carlton Perkins 2021 Texas Southern University

Teaching, Learning And Academic Integrity During The Pandemic, William Saunders, Carlton Perkins

Southwestern Business Administration Journal

Abstract

The COVID 19 pandemic is responsible for instructional delivery changes in the higher education environment. The forced closing of many traditional classrooms, and teaching virtually, is taking the transfer of knowledge to students into a different realm. Adjustments must be made by students and professors alike to ensure that students continue to learn. However, as institutions transition away from the face to face classroom setting to the virtual platform, opportunities for cheating increases and changes to teaching and assessment should be implemented. Included among the innovations and adjustments must be testing and assessment methods that will hopefully guarantee learning ...


Utilizing Social Media In A Supply Chain B2b Setting: A Knowledge Perspective, Raj Shekhar Agnihotri, Ashish Kalra, Haozhe Chen, Patricia J. Daugherty 2021 Iowa State University

Utilizing Social Media In A Supply Chain B2b Setting: A Knowledge Perspective, Raj Shekhar Agnihotri, Ashish Kalra, Haozhe Chen, Patricia J. Daugherty

Supply Chain Management Publications

While social media has become an integral part of modern-day life, it is a largely overlooked topic in supply chain business-to-business setting. This study utilizes dyadic survey data collected from both supplier account managers and their customers to explore social media's impacts in the digitalized supply chain context. Drawing upon the knowledge-based view of the firm, the study proposes and tests a conceptual model. Results indicate that supplier account manager's social media use can increase his or her product and competitor knowledge, which can positively influence customer outcome. Further, the moderation test suggests that when perceived customer demandingness ...


Coding Ivey Publishing: Building Sustainable Values For Tomorrow's Business Leaders, B. Pick 2021 Western University

Coding Ivey Publishing: Building Sustainable Values For Tomorrow's Business Leaders, B. Pick

Undergraduate Student Research Internships Conference

A reflection on the future of sustainability in business as it pertains to Ivey Publishing's case collection and the coding system developed through the USRI program.


Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga 2021 University of Johannesburg

Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga

The African Journal of Information Systems

This paper contemporizes evolving information security (IS) governance practices during the coronavirus pandemic (Covid-19) in South Africa. Using post-structuralism as a lens, we offer distinct insights regarding how information systems and technologies are evolving and the impact they present to the governance of IS systems during intermittent lockdowns. An online self-administered questionnaire was designed and distributed using Google forms to elicit data around evolution. A link was emailed to 160 respondents fitting pre-defined criteria. Data was exported to a statistical analysis software for analysis. Our results present an important relationship between technology evolutions and IS threats and that changes in ...


Digital Media And Information Literacy: A Way To Paperless Society, Subaveerapandiyan A, Anuradha Maurya 2021 Regional Institute of Education Mysore

Digital Media And Information Literacy: A Way To Paperless Society, Subaveerapandiyan A, Anuradha Maurya

Library Philosophy and Practice (e-journal)

ABSTRACT

Purpose - The study's main objective was to find out the possibility of a paperless library and society with particular reference to Top 60 Universities from QS world University ranking 2021 and their library professionals. ICT knowledge and skills of these LIS professionals and evaluated their digital literacy skills was another aim of this study.

Design/methodology/approach - The researchers used the survey method for this study using a structured questionnaire, distributed through the google form to library professionals of world-famous universities, ranked as top 60 in QS World University Ranking. 206 responses were received. The information collected from ...


Crafting Electronic Medical Record Ontology For Interoperability, Esingbemi Princewill Ebietomere, Ukeme Nse, Betty Ukhuegbe Ekuobase, Godspower Osaretin Ekuobase 2021 University of Benin, Benin City

Crafting Electronic Medical Record Ontology For Interoperability, Esingbemi Princewill Ebietomere, Ukeme Nse, Betty Ukhuegbe Ekuobase, Godspower Osaretin Ekuobase

The African Journal of Information Systems

Clinical information system (CIS) whose core component is the electronic medical record (EMR), is critical to efficient health care delivery. However, patient mobility and CIS heterogeneity have strengthened the interoperability problem of EMRs. Although ontology is a panacea to this problem, creating interoperable EMR ontology is still esoteric. This paper explicates how an interoperable EMR ontology was crafted for a tertiary health facility in Nigeria. The ontology named EMRONT was created using the Noy and McGuiness’ methodology and Protégé. EMRONT has been evaluated for quality using competency questions and OntoQA and subsequently refined for interoperability by manual mapping to both ...


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame 2021 California State University, San Bernardino

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage endpoints ...


Investigating The Ransomware Infection Rate Of K12 School Districts During The Covid Pandemic, Gil Abraham Lopez 2021 California State University, San Bernardino

Investigating The Ransomware Infection Rate Of K12 School Districts During The Covid Pandemic, Gil Abraham Lopez

Electronic Theses, Projects, and Dissertations

Ransomware attacks have become part of the normal vernacular, as more organizations get attacked and must deal with the outcome in the media. School districts are in a unique position because of COVID and the sudden shift to online or hybrid learning. Over the past few years, ransomware attacks on K12 school districts have been widely reported in the news, leading to questions on whether K12 school districts are more vulnerable to these attacks. This project focused on: the prevalence of ransomware attacks in K12 School Districts in the USA in general and in the Inland Empire in particular, examining ...


Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte 2021 University of South Florida

Advances In Global Services And Retail Management: Volume 2, Cihan Cobanoglu, Valentina Della Corte

University of South Florida M3 Center Publishing

This is the second volume of the Advances in Global Services and Retail Management Book Series. This volume has the following parts:

  • Part 1: Hospitality and Tourism
  • Part 2: Marketing, E-marketing, and Consumer Behavior
  • Part 3: Management
  • Part 4: Human Resources Management
  • Part 5: Retail Management
  • Part 6: Economics
  • Part 7: Accounting and Finance
  • Part 8: Sustainability and Environmental Issues
  • Part 9: Information Technology

ISBN: 978-1-955833-03-5

Hospitality and Tourism


Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne 2021 Texas Southern University

Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne

Southwestern Business Administration Journal

We explored an undergraduate business program’s navigation of an unplanned change, response to the Covid-19 pandemic-occasioned move to online learning, and the resilience of its curriculum by following cohorts of students through two consecutive courses from the end of 2019 through 2020 up to summer 2021. The exploration was aimed at the assessment of the impact of the pandemic-induced disruptions, i.e., how the school’s curriculum fared through the pandemic. Premised on the school’s accreditor, AACSB’s agility-cultivating curriculum guideline, the curriculum should adapt and stabilize post-pandemic. To identify the appropriate cohort for observation, we scrutinized the ...


Administering Online Exams From Hesitantly To Innovatively - A Personal Perspective Through An Action Research, Minh Q. Huynh 2021 Southeastern Louisiana University

Administering Online Exams From Hesitantly To Innovatively - A Personal Perspective Through An Action Research, Minh Q. Huynh

Southwestern Business Administration Journal

In the midst of COVID-19, university campuses were shut down and faculty had to move their classes online. The abrupt change opened up many challenges. One of them was how to handle online exams. This paper recounted how one instructor had managed the exams online. The paper presents this experience from an action research perspective. At the core is the narrative that captures the exam design process, the tools used, and the proctoring setup. The results are based on the interpretation of the phenomenon through a lens of the unified theory of acceptance and use of technology (UTAUT). The insights ...


Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach 2021 University of Johannesburg

Factors That Influence The Acceptance And Use Of Formative Feedback In An Online Undergraduate Module, Jameson Goto, Jacqueline Batchelor, Geoffrey Lautenbach

The African Journal of Information Systems

The focus of the study was to determine the factors that influence the acceptance and use of online feedback in an undergraduate module using the modified unified theory of acceptance and use of technology (UTAUT2). The participants were third-year pre-service teachers in the Bachelor of Education degree who were taking a fully online Teaching Studies module, in addition to their specialist subject areas at one of the universities in South Africa. A survey instrument was developed from the original UTAUT2 instrument and modified where appropriate, to fit the formative feedback context. Exploratory factor analysis was used to validate the instrument ...


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, ChunSheng Xin 2021 Princess Anne High School, Virginia Beach

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

Journal of Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps ...


Secure Coding In Five Steps, Mini Zeng, Feng Zhu 2021 Jacksonville University

Secure Coding In Five Steps, Mini Zeng, Feng Zhu

Journal of Cybersecurity Education, Research and Practice

Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that ...


Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford 2021 University of Pittsburgh

Observations, Evaluations, And Recommendations For Deterlab From An Educational Perspective, Ahmed Ibrahim, Vitaly Ford

Journal of Cybersecurity Education, Research and Practice

DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for producing more usable and effective cybersecurity educational resources by investigating and examining several projects, we examined DETERLab as a prospective platform to use in the classroom. Throughout our experimentation, we faced challenges that we decided to document in order to help other educators use the ...


Digital Commons powered by bepress