Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3524 Full-Text Articles 3583 Authors 455185 Downloads 93 Institutions

All Articles in Management Information Systems

Faceted Search

3524 full-text articles. Page 1 of 108.

Celebrating 50 Years Of Management Information Systems (Mis) Research And Teaching, Daniel Power, Rassule Hadidi, Kevin P. Scheibe 2016 University of Northern Iowa

Celebrating 50 Years Of Management Information Systems (Mis) Research And Teaching, Daniel Power, Rassule Hadidi, Kevin P. Scheibe

Kevin P. Scheibe

No abstract provided.


The Economic Impact Of Public Beta Testing: The Power Of Word-Of-Mouth, Zhengrui Jiang, Kevin P. Scheibe, Sree Nilakanta 2016 Iowa State University

The Economic Impact Of Public Beta Testing: The Power Of Word-Of-Mouth, Zhengrui Jiang, Kevin P. Scheibe, Sree Nilakanta

Kevin P. Scheibe

The advent of the Internet has brought many fundamental changes to the way business is conducted. Among others, a growing number of software firms are relying on public beta testing to improve the quality of their products before release. While the benefits resulting from improved software reliability have been widely recognized, the influences of public beta testers on the diffusion of a new software product have not been documented. Through their word-of-mouth effect, public beta testers can speed up the diffusion of a software product after release, and hence increase the time-discounted revenue per adopter. In this research, we take ...


The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany DeWalt, Simon Cleveland 2016 University of Missouri-St. Louis

The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany Dewalt, Simon Cleveland

Simon Cleveland, Ph.D.

The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that ...


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. McFarlin, Paul B. Sweeney 2016 University of Dayton

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Paul B. Sweeney

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development.

The data showed that the CIOs who ...


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman 2016 University of Dayton

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

Michael F. Gorman

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman 2016 University of Dayton

Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman

Michael F. Gorman

We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function.

Our results from test cases show with high confidence that current prices are not optimal, as indicated by a ...


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. McFarlin, Paul B. Sweeney 2016 University of Dayton

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Harvey Enns

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development.

The data showed that the CIOs who ...


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. McDonagh 2016 University of Dayton

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

Harvey Enns

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via ...


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns 2016 University of Dayton

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Harvey Enns

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating ...


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn 2016 University of Dayton

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

William D Salisbury PhD

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is ...


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns 2016 University of Dayton

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating ...


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn 2016 University of Dayton

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Thomas Ferratt

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is ...


Virtual World Affordances: Enhancing Brand Value, SoRa Park, Fiona Fui-Hoon Nah, David DeWester, Brenda Eschenbrenner, Sunran Jeon 2016 Butler University

Virtual World Affordances: Enhancing Brand Value, Sora Park, Fiona Fui-Hoon Nah, David Dewester, Brenda Eschenbrenner, Sunran Jeon

Fiona Fui-Hoon Nah

Virtual worlds are three-dimensional, computer-generated worlds that are a natural extension of the existing Internet. Although many businesses are jumping on the bandwagon to maintain a presence in virtual worlds, there is no well-established knowledge or theory to guide businesses in their involvement in these environments. In this paper, we identify affordances in the virtual worlds that can be used to increase the state of flow experienced in a business virtual site, which in turn may enhance brand equity, or the perceived added value of a brand to customers. We present a conceptual model that can be used to guide ...


Perceptions Of Avatars In 3d Virtual Worlds: Impact Of Task And Gender Stereotypicality, David DeWester, Fiona Fui-Hoon Nah, Sarah J. Gervais, Keng Siau 2016 University of Nebraska – Lincoln

Perceptions Of Avatars In 3d Virtual Worlds: Impact Of Task And Gender Stereotypicality, David Dewester, Fiona Fui-Hoon Nah, Sarah J. Gervais, Keng Siau

Fiona Fui-Hoon Nah

Virtual worlds are growing in importance and popularity in businesses. As the use of virtual worlds increases, it becomes increasingly important to understand the behavioral and perceptual issues in virtual worlds. Although gender stereotypes have been widely studied in the real world along with their effects on trust perceptions, very little such research has been conducted in virtual worlds. We propose a research model to study the interaction effects of gender stereotypicality of male and female avatars and gender typicality of tasks on trust perceptions. An experiment is proposed to examine the effects of gender stereotypes on trust perceptions in ...


3-D Virtual Worlds: Education And Learning, Xiaofeng Chen, Keng Siau, Fiona Fui-Hoon Nah 2016 University of Nebraska-Lincoln

3-D Virtual Worlds: Education And Learning, Xiaofeng Chen, Keng Siau, Fiona Fui-Hoon Nah

Fiona Fui-Hoon Nah

3-D virtual worlds are increasing in popularity as a medium for higher education. In this research, we assess the efficacy of two instruction strategies in a virtual world environment, Second Life, and their effects on interactivity, social presence, and perceived learning. The two instruction strategies are direct and interactive instruction strategies. Our findings suggest that the interactive instruction strategy is more effective than the direct instruction strategy in increasing perceived learning, social presence, and classroom interactivity in the virtual world environment. The study also captured data on perceived ease of use and usefulness of the virtual world environment for education ...


Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci 2016 Penn State University - Berks

Using A Virtual Computing Laboratory To Foster Collaborative Learning For Information Security And Information Technology Education, Abdullah Konak, Michael R. Bartolacci

Journal of Cybersecurity Education, Research and Practice

Virtual computer laboratories have been an excellent technological solution to the problem of providing students with hands-on experimentation in information technology fields such as information security in a cost effective and secure manner. A virtual computer laboratory was utilized in this work as a collaborative environment for student learning with the goal of measuring its effect on student learning and attitudes toward laboratory assignments. Experiments were carried out utilizing specially-designed computer-based laboratory activities that included student assessments and surveys upon their completion. The experiments involved both small groups and individual students completing their respective laboratory activities and subsequent assessments ...


From The Editors, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

From The Editors, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the inaugural issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Enterprise Resource Planning Systems In Family Firms, James Nathan Smith 2016 Nova Southeastern University

Enterprise Resource Planning Systems In Family Firms, James Nathan Smith

Doctor of Business Administration Dissertations

For organizations that have them, an enterprise resource planning (ERP) system is an organization’s most wide-reaching information system, sitting at the heart of its accounting and operational structure. Thus, successful implementation of an ERP is critical to an organization’s success. Organizations have long struggled with achieving successful implementations of large-scale information systems, and family influenced firms are no exception. In light of unique considerations for family influenced firms as compared with non-family influenced firms, this research examines the relation between the influence of family ownership in family business and success in implementing an ERP system. This research presents ...


Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin 2016 Kennesaw State University

Management And Organizational Influences On The Compliance Behavior Of Employees To Reduce Non-Malicious It Misuse Intention, Randy G. Colvin

Doctor of Business Administration Dissertations

The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies and procedures in performing their job tasks. In many cases, this encompasses employees who mean no harm, but choose not to comply with IT policies and procedures. The present study frames such compliance behavior as non-malicious IT misuse. Non-malicious IT misuse by an employee occurs when the employee improvises, takes short cuts, or works around IT procedures and guidelines in order to perform their assigned tasks. As expressed, they do not intend to cause internal control ...


Collecting, Integrating, And Disseminating Patient-Reported Outcomes For Research In A Learning Healthcare System, Christopher A. Harle, Gloria Lipori, Robert W. Hurley 2016 Indiana University Richard M. Fairbanks School of Public Health

Collecting, Integrating, And Disseminating Patient-Reported Outcomes For Research In A Learning Healthcare System, Christopher A. Harle, Gloria Lipori, Robert W. Hurley

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Introduction: Advances in health policy, research, and information technology have converged to increase the electronic collection and use of patient-reported outcomes (PROs). Therefore, it is important to share lessons learned in implementing PROs in research information systems.

Case Description: The purpose of this case study is to describe a novel information system for electronic PROs and lessons learned in implementing that system to support research in an academic health center. The system incorporates freely available and commercial software and involves clinical and research workflows that support the collection, transformation, and research use of PRO data. The software and processes that ...


Digital Commons powered by bepress