Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3610 Full-Text Articles 3698 Authors 574581 Downloads 97 Institutions

All Articles in Management Information Systems

Faceted Search

3610 full-text articles. Page 1 of 112.

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick 2017 Cleveland State University

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Susan Slotnick

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the ...


Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi 2017 Federal University of Technology, Akure

Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi

The African Journal of Information Systems

Community Based Location Service (CBLS) is the provision of information about services based on the geographical location of subscriber’s mobile phone towards the development of the community they are in. With the increase in mobile phones penetration, citizens can participate actively in providing relevant information to assist in the provision of services and infrastructure in the country through their mobile devices. This paper proposes a framework that will improve services and provide better infrastructure to developing countries. It hinges on four major technologies: location-based information, crowdsourcing, mobile communication devices and volunteerism. This framework takes into consideration the importance of ...


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman 2017 Embry-Riddle Aeronautical University - Worldwide

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi Kappers

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two ...


Cybersecurity And Development, Nir Kshetri 2016 University of North Carolina at Greensboro

Cybersecurity And Development, Nir Kshetri

Markets, Globalization & Development Review

While scholar and policymakers have realized the importance of information and communication technologies in economic development, relatively less attention has been given to the role of cybersecurity. This research sheds light on issues associated with the "dark side" of digitization in the Global South. We examine the hollowness in the Global South’s digitization initiatives that is associated with a poor cybersecurity. The article also advances our understanding of how institutional and structural characteristics of the Global South influence cybersecurity.


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia 2016 University of North Georgia

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 ...


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia III, Xavier P. Francia, Anthony M. Pruitt 2016 Jacksonville State University

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into ...


A Study Of The Factors That Influence Consumer Attitudes Towards Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan 2016 Iowa State University

A Study Of The Factors That Influence Consumer Attitudes Towards Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan

Dermot J. Hayes

Beef producers looking for a competitive edge in today's markets need information about the qualities that consumers consider most important. Using conjoint marketing analysis allowed the investigators to sort out the most relevant characteristics for meat purchasers.


Sociallyconstructed_Metrics_Acis_V7.Pdf, Sharon Coyle, João Barata 2016 Universidade de Coimbra

Sociallyconstructed_Metrics_Acis_V7.Pdf, Sharon Coyle, João Barata

João Barata


We present a method to develop socially-constructed metrics for ascertaining agile software development quality. Canonical action research (CAR) is our mode of inquiry, conducted in a key European player of healthcare information systems. The result is a set of meaningful metrics that are built according to three interrelated dimensions: (1) evidence from practice; (2) stakeholders’ expectations; and (3) stakeholders’ evaluation. Our contribution suggests simple artifacts to create socially-constructed metrics and the main guidelines for applying them. Agile teams struggle with quality measurement, often supported by a plethora of metrics that do not adhere to rapidly changing project environments. We argue ...


Cpn-Dam Business Meeting, Amanda Harlan 2016 Kansas State University

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4 ...


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh 2016 University of North Texas

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types ...


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson 2016 Knox College

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its ...


Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin 2016 The Ohio State University

Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin

Central Plains Network for Digital Asset Management

So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a ...


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez 2016 University of Missouri-Kansas City

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud 2016 Kansas State University Libraries

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust ...


Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott 2016 Boise State University

Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott

Christopher L. "Kit" Scott

This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used asynchronously. We conducted an experiment with 49 students from three classes of a web development class at an American university. Our results suggest that an asynchronous tutorial can achieve the same learning outcomes as a traditional lecture format by using automated feedback for convergence. Somewhat surprisingly, we found that performance did ...


3d Model Creation And Management In An Academic Digital Repository, Marcia McIntosh 2016 University of North Texas

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of ...


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr 2016 University of Kansas

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example ...


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness 2016 Kansas State University

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with ...


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis 2016 Washington University in St. Louis

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session will ...


Digital Commons powered by bepress