Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,238 Full-Text Articles 3,783 Authors 816,979 Downloads 122 Institutions

All Articles in Management Information Systems

Faceted Search

3,238 full-text articles. Page 1 of 100.

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


The Digital Global Supply Chain: The Growing Case For Blockchain Technology Expansion Within Global Supply Chain, Jonathan Chichoni, Scott Webb 2018 Brigham Young University

The Digital Global Supply Chain: The Growing Case For Blockchain Technology Expansion Within Global Supply Chain, Jonathan Chichoni, Scott Webb

Marriott Student Review

In a competitive global market place, technology adoption and application in supply chain is becoming increasingly important as companies seek to acquire competitive advantages. Since blockchain’s advent to the global stage of modern disruptive technologies, several questions remain unanswered pertaining to the benefits that blockchain adoption poses to global supply chains. I apply a typology analysis to a corpus of company filings, press releases and industry studies to better understand the reasons for which global supply chains industry wide are adopting blockchain technology and the specific benefits which they seek to exploit through the use of blockchain. I characterize ...


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos 2018 San Jose State University

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in ...


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding 2018 The University of West Florida

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins 2018 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz 2018 University of North Georgia

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue ...


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth 2018 Kennesaw State University

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Improving The Assessment (Assurance Of Learning) Processes, Chittibabu Govindarajulu, Jim Murphy 2018 Metropolitan State University of Denver

Improving The Assessment (Assurance Of Learning) Processes, Chittibabu Govindarajulu, Jim Murphy

Communications of the IIMA

Strategically located in downtown Denver, this state university is a popular destination for working adults and traditional students alike to get a quality education. The university’s College of Business was first accredited by the Association to Advance Collegiate Schools of Business International (AACSB) in spring 2016. Five undergraduate programs and one graduate program in Accounting were accredited; an undergraduate program in Economics was excluded from AACSB review. Since the initial accreditation, the college added three undergraduate degree programs and a second graduate program (MBA). AACSB standards stipulate assessing general knowledge & skills and subject-specific knowledge & skills for each program. University ...


Trust And Distrust Scale Development: Operationalization And Instrument Validation, John D. Rusk 2018 Kennesaw State University

Trust And Distrust Scale Development: Operationalization And Instrument Validation, John D. Rusk

Doctor of Business Administration Dissertations

Trust and distrust have been studied at great length by researchers in the field of information systems and various other fields over the past few decades without reaching consensus on conceptualization and measurement. The goal of this study was to determine if individual trust and distrust are separate constructs or opposite ends of the same continuum. To this end, based on theoretical rationale, an aggregation of extant, validated trust and distrust instruments combined with newly created trust and distrust items were used as input into a rigorous Q-sorting procedure. The Q-sorting process led to the first contribution of this research ...


Isscm Alumni Newsletter, Summer 2018, Raj Soin College of Business, Wright State University 2018 Wright State University

Isscm Alumni Newsletter, Summer 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page alumni newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe PhD 2018 University of Dar es Salaam

Development Of Digital Diary For Enhanced Parental School Involvement In Tanzania, Sekione R. Jeremiah, Joel S. Mtebe Phd

The African Journal of Information Systems

The study examined the use of digital diary as a tool for enhancing parental school involvement in Tanzania. The development of the digital diary followed eXtreme Programming agile method where 87 parents and 6 teachers from St. Florence school were involved. Parents and teachers were given six months to use the tool before testing for its effectiveness using data from 7 teachers and 156 parents through semi-structured interviews and questionnaires respectively. The study found that the majority of respondents (84.4% of parents and 96.7% of teachers) indicated that the digital diary was useful tool as enabled them to ...


Framework Towards Enhancing Adoption Of Electronic Payment In A Developing Economy: A Case Of Uganda, Samuel Eelu, Agnes Nakakawa 2018 Makerere University Business School

Framework Towards Enhancing Adoption Of Electronic Payment In A Developing Economy: A Case Of Uganda, Samuel Eelu, Agnes Nakakawa

The African Journal of Information Systems

Usage of electronic payment (e-payment) in developing economies is still limited, yet literature reveals several models and research efforts that explain adoption of innovations associated with information and communication technologies. This paper investigates issues hindering increased adoption of e-payment systems in a developing economy (specifically Uganda), and suggests possible strategic capabilities or interventions that key stakeholders can actualize to address the issues and enhance e-payment adoption. To achieve this, participatory action research was adopted and instantiated by: conducting an exploratory survey to gain relevant insights from target users of e-payment, devising a framework basing on survey findings and a literature-based ...


Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello 2018 United States International University-Africa

Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello

The African Journal of Information Systems

Although there is a steady use of information technology in institutions of higher learning, little is known about the level of information security awareness (ISA) amongst students joining universities in developing countries and more specifically Africa. The purpose of this study was to investigate ISA amongst undergraduate students at a higher education institution in Kenya. The study made use of a quantitative survey approach. Overall, the study findings indicate that majority of the students surveyed did not possess adequate understanding of ISA. Consequently, we submit that there is a strong need to cultivate ISA culture amongst students joining universities in ...


Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis 2018 North-West University

Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis

The African Journal of Information Systems

We are told that university students are Digital Natives and the diffusion of digital technologies into education holds prospective advantages. However, will students in Africa be prepared to engage with and accept the technology? This study aimed to determine the applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) model within a South African higher education setting and to clarify the factors that are influencing students’ intentions to make use of two digital technologies: an eBook and SLMS. 738 ICT students completed a questionnaire to gauge their responses to Performance expectancy (PEx), Effort expectancy (EfEx), Facilitating conditions ...


The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland 2018 Nova Southeastern University

The Case For It Training Within Guinea’S Ministry Of Agriculture: Evaluating Performance And Usability, Simon Cleveland

Simon Cleveland, Ph.D.

This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample ...


Dynamic Capabilities In Small Service Firms, Gabriel Beltran, Balasubramaniam Ramesh 2018 Georgia State University (GSU)

Dynamic Capabilities In Small Service Firms, Gabriel Beltran, Balasubramaniam Ramesh

Engaged Management ReView

ABSTRACT

In constantly shifting service environments managers face the challenge to renew, modify, and reconfigure their firm’s service offerings as to effectively respond to industry turbulence. Dynamic capabilities have been proposed as a primary means by which firms reconfigure their operational processes to generate such new service offerings. While the role of dynamic capabilities in large organizations has been extensively investigated, their role in small organizations has not received much attention. We explore how dynamic capabilities manifest in small service firms and how they use IT capabilities to achieve these capabilities. Using a multi-site case study in four small ...


Isscm Newsletter, Vol. 25, May 3, 2018, Raj Soin College of Business, Wright State University 2018 Wright State University

Isscm Newsletter, Vol. 25, May 3, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A thirteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Blockchain: Is It The Future Of Business?, Stuart Welsch 2018 University of Arkansas, Fayetteville

Blockchain: Is It The Future Of Business?, Stuart Welsch

Information Systems Undergraduate Honors Theses

Blockchain is one of these new and disruptive technologies being developed; it is predicted to change the landscape of business in an extremely similar fashion as the Internet did. In lay terms, blockchain is a new technology designed to secure privacy (Collins, 2016), cut out unnecessary middleman costs (Eha, 2017), dramatically lower the cost of transactions (Iansiti & Lakhani, 2009), lower transaction time (Underwood, 2016), and assist in making assets become more liquid and appealing (like cash) because they are more easily transferable (Paech, 2016). Blockchain functions like a ledger; it is able to keep track of an asset’s ownership by recording transactions made. It is likely that this is the direction the businesses are heading towards. Blockchain’s many applications across nearly every industry is simply too good of an opportunity ...


Effectual Versus Predictive Logics In Entrepreneurial Decision-Making: Differences Between Experts And Novices In The State Of Maine, Rebecca Lynn Hatt 2018 University of Maine

Effectual Versus Predictive Logics In Entrepreneurial Decision-Making: Differences Between Experts And Novices In The State Of Maine, Rebecca Lynn Hatt

Honors College

This study is a replication of research done by Dew et al. (2009) that aims to confirm that expert entrepreneurs use effectual logic framework as opposed to the casual, or predicitive, logic utilized by novices. In order to test this theory we provided 5 expert entrepreneurs and 5 novices with a case statement that provided information of an imaginary new venture and asked them to think aloud continuously as they solved decision-making problems relevant to this, and any, new venture while we recorded them. We coded the transcriptions of these recordings according to the scheme of the Dew et al ...


Digital Commons powered by bepress