Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3838 Full-Text Articles 4126 Authors 816979 Downloads 118 Institutions

All Articles in Management Information Systems

Faceted Search

3838 full-text articles. Page 1 of 123.

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


Supplemental Readings And Practice Problems For "What Counts And What Gets Counted", Jeremiah Bentley 2018 University of Massachusetts Amherst

Supplemental Readings And Practice Problems For "What Counts And What Gets Counted", Jeremiah Bentley

Accounting Educational Materials

“What Counts and What Gets Counted” (Bloomfield 2016)[1] is an innovative way of teaching managerial accounting. The 1st edition of the book won the 2014 Jim Bulloch Award for Innovations in Management Accounting Education, and has only gotten better since then. However, the book suffers from two significant limitations. First, the book was intended primarily for MBA students, not for accounting undergrads. As a result, the book doesn’t go into sufficient depth on some of the technical topics that accounting majors need to understand. Second, the book lacks a bank of practice problems and solutions for students ...


2018 Updated Tables And Figures For Ec 846 Nebraska Cash Corn Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters 2018 University of Nebraska-Lincoln

2018 Updated Tables And Figures For Ec 846 Nebraska Cash Corn Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters

Extension Farm and Ranch Management

No abstract provided.


Isscm Newsletter, Vol. 23, January 31, 2018, Raj Soin College of Business, Wright State University 2018 Wright State University

Isscm Newsletter, Vol. 23, January 31, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A thirteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Strategic Excellence In Post-Digital Ecosystems: A B2c Perspective, Edin Güçlü Sözer, Mustafa Emre Civelek, Murat Çemberci 2018 Okan University

Strategic Excellence In Post-Digital Ecosystems: A B2c Perspective, Edin Güçlü Sözer, Mustafa Emre Civelek, Murat Çemberci

Zea E-Books

The basic production of the digital economy is knowledge. As it becomes more important, traditional factors like labor and capital become less so. As technological innovation changes the nature of employment, the conversion of labor to consumption becomes increasingly difficult. E-commerce is the most important driving force of the digital economy. Using technology and information networks effectively allows brands or companies to effect rapid changes in competitive markets. The emergence of neo-consumers calls for a higher order of information exchange and interaction. Companies must reasses their complete business processes in a holistic way to ensure market prominence in an economy ...


Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker 2018 University of Louisville

Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker

Thomas F. Gattiker

In this paper, we discuss a project in which we developed a spreadsheet-based system that interfaces with a no-fee driving-directions application programming interface to quickly and accurately build a travel time and distance matrix and then rapidly determine near-optimal delivery-route schedules using a modified genetic algorithm. To the best of our knowledge, the method we used to create the travel matrix had not been employed previously in an academic study. The tool was tested and refined in a humanitarian setting—a local branch of the Meals on Wheels Association of America (now Meals on Wheels America), an organization that combats ...


Institutional Environment And Ipo Strategy: A Study Of Chinext In China, Jing Zhang, Wei Zhang, Andreas Schwab, Sipei Zhang 2018 Old Dominion University

Institutional Environment And Ipo Strategy: A Study Of Chinext In China, Jing Zhang, Wei Zhang, Andreas Schwab, Sipei Zhang

Andreas Schwab

Taking an institution-based view, we investigate how entrepreneurs respond to immature regulatory environments in order to be listed on stock markets in countries with an emerging economy. Unlike stock markets in developed countries, in emerging markets, gaining government approval for listing is a critical and more unpredictable process for entrepreneurs. Hence, entrepreneurs who are preparing for a public offering might give substantially discounted shares to venture capital (VC) investors. This will lead to higher investment returns in pre-IPO deals than those at earlier stages, which distorts the risk-return tradeoff found in developed markets. In particular, the VC investors affiliated with ...


2018 Updated Tables And Figures For Ec 844 Nebraska Wheat Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf 2018 University of Nebraska - Lincoln

2018 Updated Tables And Figures For Ec 844 Nebraska Wheat Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf

Extension Farm and Ranch Management

No abstract provided.


Battlefield Cyberspace: Exploitation Of Hyperconnectivity And Internet Of Things, Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette 2017 Colorado Technical University

Battlefield Cyberspace: Exploitation Of Hyperconnectivity And Internet Of Things, Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette

Maurice Dawson

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current ...


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland 2017 Plymouth University, U.K.

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements ...


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell 2017 Arkansas Tech University

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a ...


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2017 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou 2017 Brigham Young University

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou

Marriott Student Review

Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.


The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee 2017 University of South Africa

The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee

The African Journal of Information Systems

There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between ...


Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul OKEKE 2017 University of Wales Trinity Saint David (UWTSD)

Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke

The African Journal of Information Systems

This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current ...


Digital Commons powered by bepress