Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3590 Full-Text Articles 3676 Authors 554925 Downloads 96 Institutions

All Articles in Management Information Systems

Faceted Search

3590 full-text articles. Page 1 of 111.

Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott 2016 Boise State University

Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott

Christopher L. "Kit" Scott

This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used asynchronously. We conducted an experiment with 49 students from three classes of a web development class at an American university. Our results suggest that an asynchronous tutorial can achieve the same learning outcomes as a traditional lecture format by using automated feedback for convergence. Somewhat surprisingly, we found that performance did ...


Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College of Business, Wright State University 2016 Wright State University

Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

An eleven page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon 2016 Kansas State University

Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon

Kansas Library Association College and University Libraries Section Proceedings

K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

KSU Conference on Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. The article includes a summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the article shares results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Information Technology Ethics: A Research Framework, Richard V. McCarthy, Leila Halawi, Jay E. Aronson 2016 Quinnipiac University

Information Technology Ethics: A Research Framework, Richard V. Mccarthy, Leila Halawi, Jay E. Aronson

Leila A. Halawi

Information technology has become so pervasive that opportunities for abuses abound. IT Ethics has taken on increasing importance as the size and complexity of IT issues continues to grow. This paper outlines a research framework to analyze: Do significant ethical differences exist amongst undergraduate and graduate MIS students?


Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. McCarthy 2016 Nova Southeastern University

Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy

Leila A. Halawi

We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard McCarthy 2016 Bethune-Cookman University

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Leila A. Halawi

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian 2016 Bethune-Cookman University

Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian

Leila A. Halawi

This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios.


Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. McCarthy 2016 Bethune-Cookman University

Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. Mccarthy

Leila A. Halawi

Unethical information technology (IT) conduct is estimated to cost billions of dollars in deficits for enterprises. Included in this unethical behavior are issues associated with the knowledge age. Many IT ethics concerns do not have guidelines that are well recognized or broadly accepted. This study will explore the ethical perception of a diverse group of knowledge workers. It will also examine the effects of deterrents, individual factors and external variables to determine if there are noted differences in ethical perceptions that can be explained by these variables.


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman 2016 Embry-Riddle Aeronautical University - Worldwide

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Leila A. Halawi

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two ...


A Response To The Ais Bright Ict Initiative, Glen Sagers, Douglas P. Twitchell 2016 Illinois State University

A Response To The Ais Bright Ict Initiative, Glen Sagers, Douglas P. Twitchell

Douglas Twitchell

In 2015, the President of the Associate for Information Systems introduced the Bright ICT Initiative (Lee 2015), which provides a framework for improving Internet security based on four principles: origin responsibility, deliverer responsibility, rule-based digital search warrants, and traceable anonymity. We review these principles and show that at least three of these principles are at odds with the United Nation's Universal Declaration of Human Rights and the founding principles of the Internet and may actually decrease individual security. We conclude giving suggestions for developing principles more in line with human rights.


Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard 2016 Florida A&M University

Integrate Text Mining Into Computer And Information Security Education, Hongmei Chi, Ezhil Kalaimannan, Dominique Hubbard

KSU Conference on Cybersecurity Education, Research and Practice

Insider threats has become a significant challenge to organization, due to the employees varying levels of access to the internal network. This will intern bypass the external security measures that have been put in place to protect the organization’s resources. Computer-mediated communication (CMC) is a form of communication over virtual spaces where users cannot see each other. CMC includes email and communication over social networks, amongst others. This paper focuses on the design and implementation of exercise modules, which can be integrated into cybersecurity courses. The main objectives of the paper include how to teach and integrate the CMC ...


Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer 2016 Kennesaw State University

Cover Text Steganography: N-Gram And Entropy-Based Approach, Sara M. Rico-Larmer

KSU Conference on Cybersecurity Education, Research and Practice

Steganography is an ancient technique for hiding a secret message within ordinary looking messages or objects (e.g., images), also known as cover messages. Among various techniques, hiding text data in plain text file is a challenging task due to lack of redundant information. This paper proposes two new approaches to embed a secret message in a cover text document. The two approaches are n-gram and entropy metric-based generation of stego text. We provide examples of encoding secret messages in a cover text document followed by an initial evaluation of how well stego texts look close to the plain texts ...


Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala 2016 Kennesaw State University

Hands-On Labs Demonstrating Html5 Security Concerns, Mounika Vanamala

KSU Conference on Cybersecurity Education, Research and Practice

The research is focused on the new features added in HTML5 standard that have strong implications towards the overall information security of a system that uses this implementation.A Hands-on Lab is developed to demonstrate how Web Storage and the Geo-location API of HTML5 can affect the privacy of the user.


Smart City Security, Shawn Ralko, Sathish Kumar 2016 Coastal Carolina University

Smart City Security, Shawn Ralko, Sathish Kumar

KSU Conference on Cybersecurity Education, Research and Practice

With rapid growth of technology involved and the implementation of the smart city concept, it is becoming vital to identify and implement security controls for their secure operation. Smart city security is essential for a city to incorporate the technologies into smart city cyber infrastructure and to improve the conditions of life for its citizens. In this paper, we have discussed the growth of smart city concept, their security issues. We also discuss the security solutions that needs to be implemented to keep the smart city cyber infrastructure secure. We have also pointed out the recommendations on the open issues ...


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor 2016 Georgia State University

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Conference on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy ...


Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid 2016 University of West Florida

Combining The Extended Risk Analysis Model And The Attack Response Model To Introduce Risk Analysis, Randall Reid

KSU Conference on Cybersecurity Education, Research and Practice

This paper uses the Extended Risk Analysis Model to introduce risk analysis in a classroom setting. The four responses to an attack, avoidance, transference, mitigation, and acceptance are overlaid on the Extended Risk Analysis Model to aid in the visualization of their relationship. It then expands and updates the cyber insurance portion of the Extended Risk Analysis Model.


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne 2016 University of North Georgia

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Conference on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations ...


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown 2016 Kennesaw State University

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

KSU Conference on Cybersecurity Education, Research and Practice

Occupational fraud, the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the organization’s resources or assets, is a growing concern for all organizations. While the typical organization loses at least 5% of annual revenues to fraud, current methods of detection and prevention are not fully adequate to reduce increasing occurrences. Although information systems are making life easier, they are increasingly being used to perpetrate fraudulent activities, and internal employee security threat is responsible for more information compromise than external threats.

The purpose of this research is to examine how information security policy ...


Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu 2016 Virginia Commonwealth University

Individuals' Concern About Information Privacy In Ar Mobile Games, Dapeng Liu

KSU Conference on Cybersecurity Education, Research and Practice

Augmented Reality (AR) proves to be an attractive technology in mobile games. While AR techniques energize mobile games, the privacy issue is raised to be discussed. Employing social media analytics (SMA) techniques, this research makes efforts to examines Twitter postings of “PokemonGo” case and explores individuals’ attitudes toward privacy in AR games. In this research, we examine what are the privacy concerns of individuals in AR games and what are the individuals’ sentiments toward privacy. In the interesting case of PokemonGo, this paper suggests that individuals’ concerns about privacy are emphasized on six dimensions - collection, improper access, unauthorized secondary use ...


Digital Commons powered by bepress