Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

858 Full-Text Articles 842 Authors 233,692 Downloads 57 Institutions

All Articles in Management Information Systems

Faceted Search

858 full-text articles. Page 1 of 21.

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson 2015 SelectedWorks

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson 2014 Northern Michigan University

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Conference Presentations

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


African E-Government Research Landscape, Jean Vincent Fonou Dombeu, Nelson Rannyai 2014 Kennesaw State University

African E-Government Research Landscape, Jean Vincent Fonou Dombeu, Nelson Rannyai

The African Journal of Information Systems

Over the past decade, African governments have followed the worldwide trends towards establishing e-government with the aim of improving public service delivery to citizens through the use of Information and Communication Technology (ICT). As a consequence, authors from academia, government departments and agencies, civil society, industry, non-governmental and international organizations have embarked into e-government research focusing on Africa. However, the state of the art of e-government research in Africa is poorly documented. This study analyzes the status of e-government research in Africa. A qualitative technique based on online searches and literature reviews is used to collect data that have addressed ...


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha 2014 Northern Michigan University

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Journal Articles

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper ...


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha 2014 SelectedWorks

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper ...


Factors For Measuring Password-Based Authentication Practices, Herbert J. Mattord, Yair Levy, Steven Furnell 2014 Kennesaw State University

Factors For Measuring Password-Based Authentication Practices, Herbert J. Mattord, Yair Levy, Steven Furnell

Faculty Publications

Organizations rely on password-based authentication methods to control access to their Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in such systems, focusing on three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. This study explores the criteria required to define these component areas and validated proposed measurement criteria by use of an expert panel from industry and academia. An opportunity sample of web-based ISs in two groups were assessed to examine the use of the Authentication Method System Index (AMSI).


Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias BM Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof 2014 Kennesaw State University

Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof

The African Journal of Information Systems

This paper reports on a study that uses a combination of techniques to formally characterize and determine the critical success factors influencing the effective usage of enterprise resource planning (ERP) systems, with special reference to higher education institutions. The thirty-seven ERP success factors identified from the literature are classified into: Critical, Active, Reactive and Inert categories. The classification of decision factors can generally support organizations to explore their current challenges and to adequately prepare decisions in a more participatory way for future endeavors. This study suggests a possible alternative that decision makers should take when a factor or a set ...


Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter 2014 University of San Francisco

Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter

Steven Alter

This paper explores how work system theory (WST) and related core ideas in various versions of the work system method (WSM) overlap with enterprise engineering and with the DEMO methodology. Based on the definition of work system, an enterprise can be viewed as a set of interacting work systems. A work system can be summarized at various levels of detail. The simplest level is basically a verb phrase. The next level is a “work system snapshot.” More detailed descriptions are based on a work system metamodel.

This paper’s contribution is in two areas, 1) establishing links between WST/WSM ...


Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong 2014 SelectedWorks

Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong

Madison Ngafeeson

In a digital era where Information and Communication Technologies (ICT) play a pivotal role in driving forward the competitiveness of nations, it is imperative to understand the factors influncing the successful diffusion and deployment of this resource. ICT has become a global resource influncing the competitiveness of not only companies, but also nations. Previous research discussed the factors \ influncing ICT effectiveness and networked readiness; nevertheless, the impact of a country´s secure communications, competitiveness, and ICT laws on global IT effectiveness has yet to be addressed. Using country-level data generated by World Bank, World Economic Forum, and UNDP, this study ...


Knowledge-Supported Design Thinking About Systems In Organizations: An Application Of Work System Theory, Steven Alter 2014 University of San Francisco

Knowledge-Supported Design Thinking About Systems In Organizations: An Application Of Work System Theory, Steven Alter

Steven Alter

This paper explains a type of knowledge-supported design thinking related to systems in organizations. It shows how work system theory (WST) provides the basis for the work system method (WSM), various versions of which have been used by many hundreds of MBA and Executive MBA students. Design thinking occurs throughout WSM and is especially prominent at the point where WST/WSM users apply their analysis and develop recommendations for improving an existing work system or creating a new work system. Knowledge support for that design thinking has been provided through the knowledge built into WSM, and can be provided in ...


Canaries In The Urban Data Mine: Analytics For Smarter City Life, Robert John Kauffman 2014 Singapore Management University

Canaries In The Urban Data Mine: Analytics For Smarter City Life, Robert John Kauffman

Research Collection School Of Information Systems

Technology-based sensors and data analytics have created unprecendented levels of informedness for consumers, corporations, the public and government agencies. The information they generated provides a basis for smarter cities and more sustainable urban living.


Structures And Relationships Between The Business Executive And Information Technology Executive At The University: A Mixed Methods Study, Angela K. Hollman 2014 University of Nebraska - Lincoln

Structures And Relationships Between The Business Executive And Information Technology Executive At The University: A Mixed Methods Study, Angela K. Hollman

Open Access Theses and Dissertations from the College of Education and Human Sciences

This study uses an explanatory mixed methods methodology to attempt to determine the reporting relationships between business and IT executives within the university. The study also explores IT and business executives thoughts on these relationships. Supporting research from organizational studies and business-IT alignmfent is combined in order to enhance the study. In the first quantitative phase, an exploratory factor analysis is used to determine organizational dimension factors while simple response and frequency analysis are used to model the top occurring organizational structures between IT and business executives. The second qualitative phase used semi-structured interviews with 12 random CIOs and CFOs ...


Elearning Cost Analysis Of On-Premise Versus Cloud-Hosted Implementation In Sub-Saharan Countries, Joel Samson Mtebe, Roope Raisamo 2014 Kennesaw State University

Elearning Cost Analysis Of On-Premise Versus Cloud-Hosted Implementation In Sub-Saharan Countries, Joel Samson Mtebe, Roope Raisamo

The African Journal of Information Systems

The cost of acquiring, managing, and maintaining ICT infrastructure is one of the main factors that hinder educational institutions in Sub-Saharan countries to adopt and implement eLearning. Recently, cloud computing has emerged as a new computing paradigm for delivering cost effective computing services that can be used to harness eLearning. However, the adoption of cloud computing in higher education in Sub-Saharan countries is very low. Although there are many factors that may influence educational institutions to adopt cloud services, cost effectiveness is often a key factor. Far too little is known on how much the use of cloud computing can ...


Barriers To Open Source Erp Adoption In South Africa, Leo Tome Mr, Kevin Allan Johnston Prof, Alison Meadows Mrs, Mphatso Nyemba-Mudenda Ms 2014 Kennesaw State University

Barriers To Open Source Erp Adoption In South Africa, Leo Tome Mr, Kevin Allan Johnston Prof, Alison Meadows Mrs, Mphatso Nyemba-Mudenda Ms

The African Journal of Information Systems

Organizations in South Africa (SA) and other economically developing countries are not maximizing the use of Enterprise Resource Planning (ERP) Systems. While the costs associated with an ERP system implementation have always been a major factor to many organizations, Open Source Software (OSS) ERP systems are available offering the benefits of an ERP system at a reduced cost to organizations. This paper investigates the adoption factors of Open Source Software Enterprise Resource Planning Systems in economically developing countries by focusing on South African organizations. Using online surveys and a focus group discussion, this empirical study found that knowledge barriers, the ...


Consumer Identity Theft Prevention And Identity Fraud Detection Behaviours: An Application Of The Theories Of Planned Behaviour And Protection Motivation, John A. Gilbert 2014 McMaster University

Consumer Identity Theft Prevention And Identity Fraud Detection Behaviours: An Application Of The Theories Of Planned Behaviour And Protection Motivation, John A. Gilbert

Open Access Dissertations and Theses

Consumer behaviour has and may increasingly have a vital role to play in protecting personal data. Understanding the behaviours of consumers in preventing identity theft and detecting identity fraud is therefore key to creating programs that minimize exposure and potential loss. In this study, based on the Theory of Planned Behaviour (TPB) and Protection Motivation Theory (PMT), an exploratory study elicited salient beliefs about identity theft prevention and detection behaviours. These beliefs were then used to create a survey to measure the strength of the salient beliefs, attitudes, intentions and behaviours, which was administered online and produced 351 valid responses ...


Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury 2014 University of Massachusetts Boston

Social Media Assimilation In Firms: Investigating The Roles Of Absorptive Capacity And Institutional Pressures, Pratyush Bharati, Chen Zhang, Abhijit Chaudhury

Pratyush Bharati

Firms are increasingly employing social media to manage relationships with partner organizations, yet the role of institutional pressures in social media assimilation has not been studied. We investigate social media assimilation in firms using a model that combines the two theoretical streams of IT adoption: organizational innovation and institutional theory. The study uses a composite view of absorptive capacity that includes both previous experience with similar technology and the general ability to learn and exploit new technologies. We find that institutional pressures are an important antecedent to absorptive capacity, an important measure of organizational learning capability. The paper augments theory ...


Teaching Evaluation (Spring 2014), Hwee-Joo Kam 2014 SelectedWorks

Teaching Evaluation (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.


Student Feedback (Spring 2014), Hwee-Joo Kam 2014 SelectedWorks

Student Feedback (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.


Towards Understanding Social Influence In On-Line Social Networks, Jerzy Surma, Małgorzata Rószkiewicz, Jacek Wójcik 2014 SelectedWorks

Towards Understanding Social Influence In On-Line Social Networks, Jerzy Surma, Małgorzata Rószkiewicz, Jacek Wójcik

Jerzy Surma

No abstract provided.


A Model To Support It Infrastructure Planning And The Allocation Of It Governance Authority, Steven M. Thompson, Peter Ekman, Daniel Selby, Jonathan W. Whitaker 2014 University of Richmond

A Model To Support It Infrastructure Planning And The Allocation Of It Governance Authority, Steven M. Thompson, Peter Ekman, Daniel Selby, Jonathan W. Whitaker

Management Faculty Publications

Information technology (IT) requires a significant investment, involving up to 10.5% of revenue for some firms. Managers responsible for aligning IT investments with their firm's strategy seek to minimize technology costs, while ensuring that the IT infrastructure can accommodate increasing utilization, new software applications, and modifications to existing software applications. It becomes more challenging to align IT infrastructure and IT investments with firm strategy when firms operate in multiple geographic markets, because the firm faces different competitive positions and unique challenges in each market.

We discussed these challenges with IT executives at four Forbes Global 2000 firms headquartered ...


Digital Commons powered by bepress