Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,308 Full-Text Articles 3,895 Authors 816,979 Downloads 121 Institutions

All Articles in Management Information Systems

Faceted Search

3,308 full-text articles. Page 1 of 103.

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley 2018 Kennesaw State University

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady 2018 University of North Georgia

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy 2018 Nova Southeastern University

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black 2018 University of South Alabama

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley 2018 Kennesaw State University

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau 2018 Norfolk State University

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur sandhu, Kweku Muata A. Osei-Bryson 2018 Virginia Commonwealth University

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best ...


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards 2018 Jacksonville State University

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address ...


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros 2018 Oklahoma State University - Main Campus

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased ...


Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh 2018 Babson College

Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh

KSU Proceedings on Cybersecurity Education, Research and Practice

Using cybersecurity risk assessment techniques, organizations can gain a holistic and prioritized view of information security objectives. However, with current methods, cybersecurity risk assessments are cost-prohibitive for small and medium sized businesses (SMB). These organizations experience increased vulnerability to adverse cyber events, are stuck in a reactive cycle and scramble to meet compliance goals.

The ongoing research seeks to create a risk assessment tool using the NIST Cybersecurity Framework in conjunction with complementary innovations to reduce the cost of a cyber risk assessment exercise for SMBs and enable the effective communication of security controls to various stakeholders in small and ...


Car Hacking: Can It Be That Simple?, Bryson Payne 2018 University of North Georgia

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy 2018 Nova Southeastern University

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr. 2018 Oklahoma State University - Main Campus

Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr.

KSU Proceedings on Cybersecurity Education, Research and Practice

Increasing the number of security breaches caused by humans, scholars are interested in exploring contributed factors of information security threats. There are several studies regarding security violations by malicious insiders and intentional behaviors; however, studies which focus on important factors and antecedents of human’s unintentional misbehaviors are rare. To this end, we aim to investigate human traits which lead to unintentional information security misbehaviors. Particularly, we study individual’s risk-taking behavior by applying Dual System Theory (DST). We have developed a theoretical model to find how individuals’ risk-taking behavior relates to online information security misbehaviors. Our hypothesized model consists ...


Isscm Alumni Newsletter, October 12, 2018, Raj Soin College of Business, Wright State University 2018 Wright State University

Isscm Alumni Newsletter, October 12, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page alumni newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui 2018 University of La Verne

Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui

Communications of the IIMA

Despite significant increases in the growth of online education, a review of research reveals few studies of faculty perceptions of the use of technology in classrooms in higher education. Research can explore and illuminate how to bridge the gap between faculty perceptions and institutional goals and objectives for online programs. The study at hand presents the views of full-time and adjunct faculty across the colleges, both on- and off-campus, and the online community, at the University of La Verne, a private Tier II doctoral degree-granting institution located in Southern California.


Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim 2018 Central Connecticut State University

Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim

Communications of the IIMA

As digital media continues to expand, competition between cable television and online streaming services increases. Acquiring customers today takes more than just advertising; it requires tailoring business objectives to the needs and wants of consumers. Numerous studies have examined the connection between the adoption of cable and online media, and key variables such as cost, ease of use, and social trends. In this study, we explore a number of factors which consumers consider when choosing cable television and online streaming options. Sample data was collected through a survey questionnaire at a large public university. Multivariate regression models were developed to ...


Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida 2018 University of Texas at Tyler

Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida

Communications of the IIMA

What effect does a financial news article have on stock price? To answer this question we investigate stock price movements within the minutes following financial news releases, broken down by media outlet, time of release and article sentiment. Our data shown a Sharpe ratio (a measure for calculating risk-adjusted return) of 1.18 versus a random dataset of ‑0.06, indicating significant price movement immediately following article release. Second, we found that articles released through WSJ, Reuters – UK Focus, NYT and FT all experienced significant positive returns, whereas articles in Barrons, MarketWatch, Forbes and Bloomberg experienced significant negative returns. Third ...


What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard 2018 Quinnipiac University

What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard

Communications of the IIMA

Consumers are expanding the types of goods they are exchanging in consumer-to-consumer e-commerce. There appears to be a subset called collaborative consumption. Collaborative consumption is a dynamic concept given that an individual must develop mechanisms to trust others with transporting, sharing, and consuming goods/services. This study develops a trust model for collaborative consumption with three expected influences -- natural propensity to trust (NPT), others’ trust of buyer/seller (OTBS), and objective trust (perceived website quality (PWSQ) and third party recognition (TPR)) -- on an individual’s trust in collaborative consumption. Regression analysis is utilized to assess the proposed model. The study ...


Digital Commons powered by bepress