Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3482 Full-Text Articles 3545 Authors 455185 Downloads 93 Institutions

All Articles in Management Information Systems

Faceted Search

3482 full-text articles. Page 1 of 106.

Virtual World Affordances: Enhancing Brand Value, SoRa Park, Fiona Fui-Hoon Nah, David DeWester, Brenda Eschenbrenner, Sunran Jeon 2016 Butler University

Virtual World Affordances: Enhancing Brand Value, Sora Park, Fiona Fui-Hoon Nah, David Dewester, Brenda Eschenbrenner, Sunran Jeon

Fiona Fui-Hoon Nah

Virtual worlds are three-dimensional, computer-generated worlds that are a natural extension of the existing Internet. Although many businesses are jumping on the bandwagon to maintain a presence in virtual worlds, there is no well-established knowledge or theory to guide businesses in their involvement in these environments. In this paper, we identify affordances in the virtual worlds that can be used to increase the state of flow experienced in a business virtual site, which in turn may enhance brand equity, or the perceived added value of a brand to customers. We present a conceptual model that can be used to guide ...


Perceptions Of Avatars In 3d Virtual Worlds: Impact Of Task And Gender Stereotypicality, David DeWester, Fiona Fui-Hoon Nah, Sarah J. Gervais, Keng Siau 2016 University of Nebraska – Lincoln

Perceptions Of Avatars In 3d Virtual Worlds: Impact Of Task And Gender Stereotypicality, David Dewester, Fiona Fui-Hoon Nah, Sarah J. Gervais, Keng Siau

Fiona Fui-Hoon Nah

Virtual worlds are growing in importance and popularity in businesses. As the use of virtual worlds increases, it becomes increasingly important to understand the behavioral and perceptual issues in virtual worlds. Although gender stereotypes have been widely studied in the real world along with their effects on trust perceptions, very little such research has been conducted in virtual worlds. We propose a research model to study the interaction effects of gender stereotypicality of male and female avatars and gender typicality of tasks on trust perceptions. An experiment is proposed to examine the effects of gender stereotypes on trust perceptions in ...


3-D Virtual Worlds: Education And Learning, Xiaofeng Chen, Keng Siau, Fiona Fui-Hoon Nah 2016 University of Nebraska-Lincoln

3-D Virtual Worlds: Education And Learning, Xiaofeng Chen, Keng Siau, Fiona Fui-Hoon Nah

Fiona Fui-Hoon Nah

3-D virtual worlds are increasing in popularity as a medium for higher education. In this research, we assess the efficacy of two instruction strategies in a virtual world environment, Second Life, and their effects on interactivity, social presence, and perceived learning. The two instruction strategies are direct and interactive instruction strategies. Our findings suggest that the interactive instruction strategy is more effective than the direct instruction strategy in increasing perceived learning, social presence, and classroom interactivity in the virtual world environment. The study also captured data on perceived ease of use and usefulness of the virtual world environment for education ...


Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci 2016 Penn State University - Berks

Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci

Journal of Cybersecurity Education, Research and Practice

Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments ...


From The Editors, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

From The Editors, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the inaugural issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Enterprise Resource Planning Systems In Family Firms, James Nathan Smith 2016 Nova Southeastern University

Enterprise Resource Planning Systems In Family Firms, James Nathan Smith

Doctor of Business Administration Dissertations

For organizations that have them, an enterprise resource planning (ERP) system is an organization’s most wide-reaching information system, sitting at the heart of its accounting and operational structure. Thus, successful implementation of an ERP is critical to an organization’s success. Organizations have long struggled with achieving successful implementations of large-scale information systems, and family influenced firms are no exception. In light of unique considerations for family influenced firms as compared with non-family influenced firms, this research examines the relation between the influence of family ownership in family business and success in implementing an ERP system. This research presents ...


Collecting, Integrating, And Disseminating Patient-Reported Outcomes For Research In A Learning Healthcare System, Christopher A. Harle, Gloria Lipori, Robert W. Hurley 2016 Indiana University Richard M. Fairbanks School of Public Health

Collecting, Integrating, And Disseminating Patient-Reported Outcomes For Research In A Learning Healthcare System, Christopher A. Harle, Gloria Lipori, Robert W. Hurley

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Introduction: Advances in health policy, research, and information technology have converged to increase the electronic collection and use of patient-reported outcomes (PROs). Therefore, it is important to share lessons learned in implementing PROs in research information systems.

Case Description: The purpose of this case study is to describe a novel information system for electronic PROs and lessons learned in implementing that system to support research in an academic health center. The system incorporates freely available and commercial software and involves clinical and research workflows that support the collection, transformation, and research use of PRO data. The software and processes that ...


Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin 2016 Kennesaw State University

Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin

Doctor of Business Administration Dissertations

The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies and procedures in performing their job tasks. In many cases, this encompasses employees who mean no harm, but choose not to comply with IT policies and procedures. The present study frames such compliance behavior as non-malicious IT misuse. Non-malicious IT misuse by an employee occurs when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their assigned tasks. As expressed, they do not intend to cause internal control ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr. 2016 Rochester Institute of Technology

3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr.

Articles

No abstract provided.


The Impact Of Mobile Technology On Micro And Small Enterprises In Zimbabwe In The Post-Hyperinflation Economic Era, Gamuchirai B. Perekwa, Tania Prinsloo, JP van Deventer 2016 Dept Informatics, University of Pretoria

The Impact Of Mobile Technology On Micro And Small Enterprises In Zimbabwe In The Post-Hyperinflation Economic Era, Gamuchirai B. Perekwa, Tania Prinsloo, Jp Van Deventer

The African Journal of Information Systems

This paper investigates the impact of mobile technology on Micro and Small Enterprises (MSEs) in the developing world in the post-hyperinflation era. Data was collected from a multi-staged sample of 114 MSE owners within the capital province of Zimbabwe, namely Harare. The data was collected and analysed using descriptive quantitative survey methods, which comprised of hard-copy questionnaires, structured interviews and online questionnaires.

The findings suggest that mobile technology has incremental, transformational and production influence on MSEs in Zimbabwe. The findings show that mobile technology amplifies communication and relations with customers, MSE’s productivity and MSE’s revenues. Mobile technology is ...


Social Media Marketing Communications Effect On Attitudes Among Millennials In South Africa, Rodney G. Duffett Mr, Myles Wakeham Dr 2016 Cape Peninsula University of Technology

Social Media Marketing Communications Effect On Attitudes Among Millennials In South Africa, Rodney G. Duffett Mr, Myles Wakeham Dr

The African Journal of Information Systems

Online interpersonal interaction and communication has become an important aspect of social activities, especially among Millennials (young adults). However, the African continent has the lowest Internet access across the globe, but the development and rapid adoption of mobile technology has led to a major increase in the usage of Internet and new online Information and Communications Technology (ICT) channels, which are collectively referred to as social media. Social media platforms have become an integral part of everyday life and marketing communications via these digital channels has become one of the latest trends in South Africa (SA). The most commonly used ...


Exploring The Impact Of Information And Communication Technology (Ict) On Intermediation Market Structure In The Microfinance Industry, Frederick Riggins, David Weber 2016 North Dakota State University

Exploring The Impact Of Information And Communication Technology (Ict) On Intermediation Market Structure In The Microfinance Industry, Frederick Riggins, David Weber

The African Journal of Information Systems

The microfinance industry provides financial services to the world’s poor in hopes of moving individuals and families out of poverty. In 2013 there were 4.7 million active microfinance borrowers in Africa. This represents a smaller percentage of the population compared to other regions of the world, indicating the potential for rapid growth of microfinance in Africa. However, microfinance is maturing, in part due to the adoption of information and communication technologies (ICTs). This research examines how ICTs are changing the microfinance industry given recent advancements in mobile banking, Internet usage, and connectivity. By examining the microfinance market structure ...


Critical Success Factors (Csf) Of Health Care Is And Firm Performance At Jordanian Health Sector, 2016 Selected Works

Critical Success Factors (Csf) Of Health Care Is And Firm Performance At Jordanian Health Sector

Rae'd Masa'deh

Although the importance of investing in health technology has increased in the presence of electronic channels such as the Internet, there is lack of studies in how Jordanian hospitals are implementing such services. This research will examine the critical success factors of health care quality implementations as part of e-services models of the Jordanian health service sector. The researcher will adopt across triangulation methodology for research including survey by using drop and collect questionnaires in Jordan; and conducting interviews with Jordanian managers and executives in the adopted sector. This is to develop and empirically test a comprehensive causal model regarding ...


Privacy And Security Issues Of Cloud Computing Environment, Huda Karajeh, Mahmoud Maqableh, Rae'd Masa'deh 2016 King Abdullah II School for Information Technology

Privacy And Security Issues Of Cloud Computing Environment, Huda Karajeh, Mahmoud Maqableh, Rae'd Masa'deh

Rae'd Masa'deh

Cloud computing is a new computing paradigm that benefit from the distributed resources to solve large scale computing problems. During the last few years, cloud computing has grown rapidly as promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. Unfortunately, there are several issues reduce the cloud computing growth such as loss of security, privacy, and control. The security problem is considered a major factor that could prevent the development of cloud computing. In this paper, we explored the cloud computing classification, challenges, and opportunities. Moreover, we review and discuss ...


Digital Commons powered by bepress