Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,591 Full-Text Articles 1,838 Authors 390,834 Downloads 84 Institutions

All Articles in Management Information Systems

Faceted Search

1,591 full-text articles. Page 1 of 40.

The Role Of Motivational Systems And Emotions In Virtual Work, Steven A. Murphy, Michael J. Hine, Sandra Kiffin-Petersen Dr 2016 Ryerson University, Toronto, Ontario

The Role Of Motivational Systems And Emotions In Virtual Work, Steven A. Murphy, Michael J. Hine, Sandra Kiffin-Petersen Dr

Communications of the IIMA

The purpose of this paper is to examine the role of the behavioural activation system (BAS), the behavioural inhibition system (BIS) and emotions in virtual work. BIS was found to have significant positive relationships with anger, anxiety, annoyance, nervousness, and distress. There were indications of emotional contagion between research confederates and participants. Self-report skill knowledge and the skill role of the research confederate both had significant relationships with performance. Self-report skill knowledge was fully mediated by the skill role played by the research confederate. Managers of virtual teams need to be aware of individual differences such as motivational systems and ...


Big Data Customer Knowledge Management, Joseph O. Chan 2016 Roosevelt University

Big Data Customer Knowledge Management, Joseph O. Chan

Communications of the IIMA

Knowledge management (KM) and customer relationship management (CRM) are dominant strategies for value creation for businesses in the new economy. Customer knowledge management (CKM) results in the merging of KM and CRM, where the knowledge management process is applied to customer knowledge, and customer knowledge is applied to customer relationship management operations. With the emergence of big data as the latest phase in the evolution of technology in business, CKM strategies need to be adjusted to meet the new challenges, changing from an internal organizational focus to new external channels such as social media and machine communications. This paper explores ...


Measurement And Test Performance For Integrated Digital Loop Carrier For White Noise Impairment Using Interleaved Mode, Sarhan M. Musa, Emmanuel U. Opara, Mohammed A. Shayib, J D. Oliver 2016 Prairie View A&M University

Measurement And Test Performance For Integrated Digital Loop Carrier For White Noise Impairment Using Interleaved Mode, Sarhan M. Musa, Emmanuel U. Opara, Mohammed A. Shayib, J D. Oliver

Communications of the IIMA

This paper presents results of measurement and test performance for integrated digital loop carrier (IDLC) technology. The study focuses on cable modem termination systems (CMTSs) that are reported on assortments of operating parameters to the end user based on upstream and downstream modes that are incorporated with statistical analysis approach. The study focuses on the statistical analytical measurement for noise margins on a particular type of loops – “white noise impairment.”


Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin 2016 Hunan Normal University, China

Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin

Communications of the IIMA

China’s aged population has increased dramatically. Because of the one child policy, China now has fewer and fewer children able to support the elderly. The care of China’s elderly is a huge challenge which requires the exploration of all kinds of elderly care models through intelligence and information management technology advances. With the evolving field of Information Management and with the development of newer and cheaper technology, the time has come for a paradigm shift to be explored. A shift in the way China is managing its technology and culture expectations is necessary to address this unique need ...


Mcneil, A Johnson & Johnson Subsidiary Fda Case Study, Warren Adis 2016 Hagan School of Business, Iona College

Mcneil, A Johnson & Johnson Subsidiary Fda Case Study, Warren Adis

Communications of the IIMA

This case study provides a detailed five-year review of one of Johnson & Johnson’s important subsidiaries, McNeil Consumer Healthcare. The research presents summaries from the Food and Drug Administration (FDA) inspection reports, out-of-compliance findings, and warning letters for the period between 2007 and 2011. It also relies on a class action lawsuit and a judicial consent decree within this timeframe to further understand the relationship between Johnson & Johnson and McNeil. The case study focusses on problems in the manufacturing and quality assurance at McNeil, and how Johnson & Johnson may have exacerbated McNeil’s production failures.


Business Intelligence And Big Data Analytics: An Overview, Xin James He 2016 Fairfield University

Business Intelligence And Big Data Analytics: An Overview, Xin James He

Communications of the IIMA

This research investigates the current status of big data business analytics and critical skills necessary to create business value. Business analytics refers to the skills, technologies, applications and practices for continuous iterative exploration and investigation of past business performance to provide actionable insights. Business analytics focuses on developing new insights and understanding of business performance based on data and statistical methods. Big data is used to characterize data sets that are large, diverse and rapidly-changing, as seen by ever- increasing numbers of organizations. Big data require database management systems with capabilities beyond those seen in standard SQL-based systems. According to ...


From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle 2016 Colby College

From The Classroom To The Bigs: Dan Meyer's Analytical Skills Are In Demand In Major League Baseball, Gerry Boyle

Colby Magazine

No abstract provided.


Using Heider’S Epistemology Of Thing And Medium For Unpacking The Conception Of Documents: Gantt Charts And Boundary Objects, Sebastian K. Boell, Florian Hoof 2016 The University of Sydney Business School

Using Heider’S Epistemology Of Thing And Medium For Unpacking The Conception Of Documents: Gantt Charts And Boundary Objects, Sebastian K. Boell, Florian Hoof

Proceedings from the Annual Meeting of the Document Academy

Documents play a central role for many organizational processes. Current conceptualizations of documents predominantly engage with documents in two different ways. One sees documents as things with specific properties, and a second sees documents as medium enabling communication across different groups of actors. What is currently not well understood is how documents are perceived either as thing or as medium. This chapter engages with this issue by drawing from Fritz Heider’s epistemology of thing and medium, a concept stemming from social and media theory. According to Heider things are uniform and medium are multiform. Applying this concept to documents ...


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar 2016 University of Missouri - St Louis

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls ...


Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione 2016 University of RIchmond

Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione

Scott T. Allison

In this chapter, we discuss the basic elements of heroic leadership, showing how heroism and exemplary leadership are deeply intertwined. We then describe six paradoxical truths about heroic leadership that are often unrecognized and unappreciated. We believe that ignorance of these counterintuitive truths and paradoxes about heroic leadership can lead to misunderstandings about leaders, leadership, and leadership development. Most of these paradoxes are a central part of the hero’s journey as described by comparative mythologist Joseph Campbell (1949). We will discuss the genesis of these paradoxical truths, and we will suggest ways that an awareness of these principles can ...


Prediction Modeling And Pattern Recognition For Patient Readmission, Davood Golmohammadi, PhD 2015

Prediction Modeling And Pattern Recognition For Patient Readmission, Davood Golmohammadi, Phd

Davood Golmohammadi

Readmission is a major source of cost for healthcare systems. Hospital-specific readmission rates are considered an indicator of hospital performance and generate public interest regarding the health care quality. We aimed to identify those patients who are likely to be readmitted to the hospital. The identified patients can then be considered by health care personnel for application of preventive alternative measures such as: providing intensive post-discharge care, managing the conditions of the most vulnerable in their home, supporting self-care, and integrating health services and information technology systems to avoid unnecessary readmissions. Neural Network, Classification and Regression model and Chi-squared Automatic ...


Glis 649 Digital Curation Syllabus, Eun G. Park 2015

Glis 649 Digital Curation Syllabus, Eun G. Park

Group 6 649

This course covers the life-cycle and value-added management of digital content for future use, re-use and access. It addresses strategies, principles, and practices of digital preservation, digital curation, institutional repositories, trusted digital repositories, metadata, and file format, and other digital content management at cultural heritage institutions. The course consists of lectures, guest lectures, tours, student presentations, and group discussion.


Glis 649 W2016 Presentation On Metadata, Eun G Park 2015

Glis 649 W2016 Presentation On Metadata, Eun G Park

Group 6 649

Class lecture/presentation on Metadata


His Standardization In Developing Countries: Use Of Boundary Objects To Enable Multiple Translations, Edwin E. Nyella Mr., Honest Kimaro Dr. 2015 University of Oslo, Norway

His Standardization In Developing Countries: Use Of Boundary Objects To Enable Multiple Translations, Edwin E. Nyella Mr., Honest Kimaro Dr.

The African Journal of Information Systems

Standardization and integration of Health Information Systems (HIS) in most developing countries has been reported as a complex undertaking due to poverty, multiplicity of diseases and diverse actors working in various initiatives within the healthcare context. The need for collaborative investments in HIS strengthening is highlighted by major actors such as WHO, as significant to achieve an integrated HIS. However, despite the fact that involvement of multiple partners is desirable as a vehicle to attain an integrated HIS, entailed challenges should be understood and well managed. By drawing on the concept of translation from actor network theory supplemented by the ...


We Want To Do It Our Way: The Neutralisation Approach To Managing Information Systems Security By Small Businesses, Kennedy Njenga, Pierre Jordaan 2015 University of Johannesburg

We Want To Do It Our Way: The Neutralisation Approach To Managing Information Systems Security By Small Businesses, Kennedy Njenga, Pierre Jordaan

The African Journal of Information Systems

Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exists in the country. A large number of these businesses can be found in the province of Gauteng due to the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of Information Systems (IS) by small businesses across the Gauteng province and in South Africa generally, there is increasingly constant exposure to information security risks. Interestingly, standards such as NISTIR 7621 specifically tailored to small businesses and which could offer great ...


A Use Intention Model For Location-Based Mobile Advertising, Moses M. Thiga, Joseph Siror, Jason Githeko, Kageni Njagi 2015 Kabarak University

A Use Intention Model For Location-Based Mobile Advertising, Moses M. Thiga, Joseph Siror, Jason Githeko, Kageni Njagi

The African Journal of Information Systems

The use of location-based mobile advertising to deliver context specific information from businesses to clients has the potential to help them increase revenues, personalize offerings and reduce marketing costs. However, there is a lack of adoption of this emergent mode of advertising among micro-enterprises. This study examined the underlying reasons for this lack of adoption using an exploratory factor analytic study based on an adaptation of the Technology Acceptance Model with the choice of technology as an additional factor. Data was collected in a survey involving 304 micro-enterprises by means of structured questionnaires and interview schedules. A majority of micro-enterprises ...


Factors Influencing Perceptions And Attitudes Of Nurses Towards The Use Of Ict In Patient Care In Kwazulu Natal Province, South Africa, Stephen M. Mutula 2015 University of KwaZulu Natal, South Africa

Factors Influencing Perceptions And Attitudes Of Nurses Towards The Use Of Ict In Patient Care In Kwazulu Natal Province, South Africa, Stephen M. Mutula

The African Journal of Information Systems

This paper presents the results of a study to determine factors influencing perceptions and attitudes of nurses towards the use of ICT in 16 hospitals in KwaZulu-Natal (KZN) province, South Africa. Data were collected through a survey questionnaire and factor analysis performed to extract relevant variables. Overall, results revealed positive dispositions of nurses towards the use of ICT. Results further revealed self-efficacy, adoption of computers to improve nursing care, confidence in using computers; usefulness; interactability and knowledgeability were major factors influencing perceptions and attitudes of nurses towards use of ICT at the work place. Findings may inform institutional and provincial ...


Isscm Newsletter, Volume 9, December 22, 2015, Raj Soin College of Business, Wright State University 2015 Wright State University

Isscm Newsletter, Volume 9, December 22, 2015, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A thirteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Five Seemingly Insurmountable Challenges Related To Attaining Long-Term Value From Theorizing About Information Systems, Steven Alter 2015 University of San Francisco

Five Seemingly Insurmountable Challenges Related To Attaining Long-Term Value From Theorizing About Information Systems, Steven Alter

Business Analytics and Information Systems

Recent articles such as Avison and Malaurent (2014) and Grover and Lyytinen (2015) question taken-for-granted assumptions about the centrality of theory in research published in leading journals and the near necessity of following repetitive scripts that sometimes are an obstacle to creativity. This paper goes a step further by providing examples and observations that illustrate five seemingly insurmountable challenges related to attaining long-term value from theorizing about information systems.

1) Divergent definitions of basic terms makes it extremely difficult to accumulate IS knowledge.

2) The IS discipline seems to take for granted that knowledge must take the form of theory ...


A Work System Perspective On Adoption Entities, Adoption Processes, And Post-Adoption Compliance And Noncompliance, Steven Alter 2015 University of San Francisco

A Work System Perspective On Adoption Entities, Adoption Processes, And Post-Adoption Compliance And Noncompliance, Steven Alter

Business Analytics and Information Systems

This conceptual contribution responds to the invitation to the DIGIT 2015 Call for Papers “to reflect on and move forward from the dominant stream of research work on technology acceptance.” The dominant stream of research is basically about antecedents and correlates of adoption and continuation of use for hardware/software artifacts. This paper uses work system theory and several of its extensions to identify directions for adoption research that have been realized partially, but not nearly to the extent possible. It focuses on three general issues:

1) what adoption means in the context of work systems,

2) how adoption occurs ...


Digital Commons powered by bepress