Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,261 Full-Text Articles 3,959 Authors 957,188 Downloads 123 Institutions

All Articles in Management Information Systems

Faceted Search

3,261 full-text articles. Page 1 of 102.

Development Of An It Balanced Scorecard, Theophilus B. A. Addo, Chee W. Chow, Kamal M. Haddad 2019 San Diego State University

Development Of An It Balanced Scorecard, Theophilus B. A. Addo, Chee W. Chow, Kamal M. Haddad

[STREAMING^TV] DIJON PSG MATCH EN DIRECT LIVE DU MARDI

There is a generally acknowledged dearth of metrics for effectively measuring organizational performance. This is particularly true of the IT function, whose contribution to a firm's "bottom line" has been frequently called to question. This paper describes the development of a performance measurement tool called the Balanced Scorecard, which can be used to assess IT performance within the cordetU of overall corporate strategy and financial performance. Data for the scorecard was obtained via a sur^'ey of senior IT executives in various organizations. The paper concludes with a set of guidelines for successfully implementing an IT Balanced Scorecard, as ...


Online Word-Of-Mouth And Mobile Product Reviews:An Experimental Investigation Of The Mediating Role Of Mobile Self Efficacy, Christopher P. Furner, Robert A. Zinko, Zhen Zhu, William McDowell, Adam Dalton 2019 College of Business, East Carolina University, USA

Online Word-Of-Mouth And Mobile Product Reviews:An Experimental Investigation Of The Mediating Role Of Mobile Self Efficacy, Christopher P. Furner, Robert A. Zinko, Zhen Zhu, William Mcdowell, Adam Dalton

Adam Dalton

Online word-of-mouth (WOM) has been studied extensively by electronic commerce researchers, particularly in the realm of online product reviews. As mobile computing becomes more and more common, difference in navigation and the ability to foster focus may lead to changes in the way in which consumers read and react to mobile product reviews compared to online reviews. We use research related to mobile computing limitations, Mobile Self Efficacy and information overload to outlines a study in which two common online review outcomes, trust in the review and purchase intention are evaluated in a mobile environment.


Business Value Creation Through Open Source Engagement, Vinod Kumar Ahuja 2019 Updated - AIS

Business Value Creation Through Open Source Engagement, Vinod Kumar Ahuja

Student Research and Creative Activity Fair

In open source software development, individuals voluntarily contribute to the development of software. Recently, corporations like Microsoft, IBM, and others invest in open source by making their proprietary software freely available, by providing funding, and by dedicating their full-time employees to work in open source projects. This raises questions such as: Why do corporations dedicate money and resources to open source? What do they gain from it? How does this add value for their business? In sum, how do they make money engaging in open source? Literature provides various business models that companies adopted for their engagement in open source ...


The Suitability Of Agile Principles In Iot Development, Wouter Moedt, Margeret Hall, Sachin Pawaskar, Reinhard Bernsteiner, Ann Fruhling 2019 University of Nebraska at Omaha

The Suitability Of Agile Principles In Iot Development, Wouter Moedt, Margeret Hall, Sachin Pawaskar, Reinhard Bernsteiner, Ann Fruhling

Student Research and Creative Activity Fair

Agile software development is a popular approach which focuses on creating (small) working pieces of software in iterations. One of the major benefits is that it allows the customer to provide feedback and change requirements during the development phase. The enhanced and transparent collaboration with the customer therefore leads to outcomes that better match their specifications, which can save time and money when compared to traditional approaches, such as plan-driven development.

Another new paradigm is the Internet of Things (IoT), which is starting to become one of the largest technological industry segments worldwide. With the rise of agile software development ...


Cloud Control And Monitoring: Personal Food Computer Version 2.0, Deepika Angelene Jantz 2019 University of Nebraska at Omaha

Cloud Control And Monitoring: Personal Food Computer Version 2.0, Deepika Angelene Jantz

Student Research and Creative Activity Fair

Trends in Agricultural development and growth rates in crop yields have slowed down due to harsh weather conditions. Also, use of pesticides, fertilizers and genetically modified organisms in food(GM0) has caused attenuation of nutrition, thus giving rise to Food Crisis. To address this concern, Caleb Harper, Principal Research Scientist at MIT shares his vision of “Food Computer” through an initiative called OpenAg, that dwells upon the concept of Controlled Environment for the growth of the plant. The objective of this research is to bring awareness in the young minds – the kids at K12 level to get familiar with current ...


Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat 2019 University of Nebraska at Omaha

Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat

Student Research and Creative Activity Fair

The field of Exploratory data analysis and Visualization is revolutionizing the way we perceive things. At times, Visualization is seen as a subset of Exploratory data analysis and then there are branches in Visualization, types, technologies, tools which makes one feel that Visualization is a standalone pillar. Either way, they both work well together to extract meaningful information from almost any kind of data. These fields can very well be the stepping stone for in-depth or conclusive research. They can direct research based on facts and observations rather than one’s intuition or even a brute force technique. This project ...


Utilizing Technology To Empower Girls, Kelleyanne Jensen, Kent Campbell, Shamrose Makandar 2019 University of Nebraska at Omaha

Utilizing Technology To Empower Girls, Kelleyanne Jensen, Kent Campbell, Shamrose Makandar

Student Research and Creative Activity Fair

As early as 10 years of age, girls begin to become more sedentary, their activity levels drop as much as 83 percent as they transition through adolescence. By age 14, only 1 in 10 girls are doing enough physical activity to benefit their health, compared with roughly twice the number of boys of the same age. The mission of FITGirl, Inc. is to empower young girls as they develop and mature by demonstrating positive lifestyle choices; physical, mental, relational and nutritional. The Spring 2019 (Section 1) MIS Capstone class is working with FITGirl, Inc. to enhance the EmpowerU web application ...


Community Partnership Initiative (Cpi), Deepika Angelene Jantz, Joseph Nabiry, Doris Uwaezuoke 2019 University of Nebraska at Omaha

Community Partnership Initiative (Cpi), Deepika Angelene Jantz, Joseph Nabiry, Doris Uwaezuoke

Student Research and Creative Activity Fair

UNO is committed to community involvement. The Community Partnership Initiative (CPI) was created with the goal of combining community partners with campus groups in order to work together to serve communities nationwide. The CPI application was designed to give partners and users a way to create and manage their projects online. Additionally, the tool was designed as a way for the CPI office to highlight the ways they are working to benefit the community and create a more dynamic way to analyze, track, and display the projects, partners, and communities they are working in. The CPI application is currently being ...


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf 2019 Illinois State University

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on ...


Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan 2019 Roosevelt University

Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan

Communications of the IIMA

The evolution of the economy has gone through the agricultural era, followed by the industrial era focusing on the production of goods and the postindustrial era accentuated by information and services. The new economy of the 21stcentury is characterized by knowledge and relationships. Galbreath (2002) described the transition to a new economic order driven by knowledge and based on the value of relationships. Customer knowledge management (CKM) synthesizes the customer knowledge and relationships assets in the extended enterprise to create advantages for companies in a very competitive market. Technologies have changed alongside the economy. Big Data and Cloud ...


Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler 2019 California State University - San Bernardino

Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler

Communications of the IIMA

Cybersecurity is a national concern for the United States, yet the cybersecurity workforce is currently understaffed. Military capability planning can be used as a framework to evaluate and establish cybersecurity workforce development models, such as the National Initiative for Cybersecurity Education (NICE) Framework. These models can be used in a way that provides the nation a methodology to enhance human resource capabilities and fill the cybersecurity workforce deficit. Furthermore, this report discusses the importance of establishing and enhancing strategic recruitment initiatives that can be utilized for building a cybersecurity pipeline.


Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye 2019 University of East London, London, United Kingdom

Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye

Communications of the IIMA

Over the past few decades, most of the existing methods for analysing large growing knowledge bases, particularly Big Data, focus on building algorithms and/or technologies to help the knowledge-bases automatically or semi-automatically extend. Indeed, a vast number of such systems that construct the said large knowledge-bases continuously grow, and most often, they do not contain all of the facts about each process instance or elements that can be found within the process base. As a consequence, the resultant process models tend to be vague or missing value datasets. In view of such challenge, the work in this paper demonstrates ...


The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi 2019 University of Oulu

The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi

The African Journal of Information Systems

Manual invoicing is a major business document that the supplier uses to request payments from a purchaser for services rendered. It contains the contact information of the seller, the list of goods or the services provided and the payment instructions. Attention is being shifted from manual invoicing these days because of some factors like increased man-hours, risks of human error and risks of high carbon footprint. The study applied Unified Theory of Acceptance and Use of Technology (UTAUT) to investigate the need for green Companies in Nigeria. Empirical data were collected from Nigerian companies to measure intention-behavior for electronic invoicing ...


E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe 2019 University of Cape Town

E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe

The African Journal of Information Systems

The ever growing size of the public sector has been a contention in theory and practice. In parallel, the public sector use of Information Communication Technologies (ICTs), otherwise known as Electronic Government has had a transformative potential. Inspired by these competing interests, this paper set out to study the relationship between investments in e-Government and the size of public sector. Informed by Banks-Weingast model of bureaucratic discretion drawn upon political science, the research estimated the linkage. Using a balanced panel data of Kenya’s key ministries for a 10 year period (2004-2014), e-Government expenditure, consumer price indices (CPI) and gross ...


Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles 2019 Univ of New Brunswick Fredericton

Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles

Journal of International Technology and Information Management

This paper features the use of blockchain technology in the healthcare industry, with special focus on healthcare data exchange and interoperability; drug supply chain integrity and remote auditing; and clinical trials and population health research. This study uses the research method of analyzing the published case studies, academic articles, trade articles, and videos on MEDRec, Patientory, and the AmerisourceBergen/Merck alliance with SAP/CryptoWerk. The “blockchain” concept was introduced around October 2008 when a proposal for the virtual currency, bitcoin, was offered. Blockchain is a much broader concept than bitcoin and has the following key attributes: distributed database; peer-to-peer transmission ...


Exploring A New Determinant Of Task Technology Fit: Content Characteristics, ChongWoo Park 2019 Augusta University

Exploring A New Determinant Of Task Technology Fit: Content Characteristics, Chongwoo Park

Journal of International Technology and Information Management

Although task technology fit has received academic attention as a measure of information systems success, compared to other popular information systems success models it has received less empirical testing in the information systems field. One reason might be a relatively low explanatory power for the main construct, i.e., task technology fit, in the model. In this study, we suggest content characteristics as a new determinant of fit, and empirically test it along with the two existing determinants, task and technology characteristics with 105 users of a web-based learning management system. In order to verify the contribution of content characteristics ...


Inside The Black Box Of Dictionary Building For Text Analytics: A Design Science Approach, Qi Deng, Michael J. Hine, Shaobo Ji, Sujit Sur 2019 Carleton University

Inside The Black Box Of Dictionary Building For Text Analytics: A Design Science Approach, Qi Deng, Michael J. Hine, Shaobo Ji, Sujit Sur

Journal of International Technology and Information Management

The purpose of this paper is to develop and demonstrate a dictionary building process model for text analytics projects following the design science methodology. Using inductive consensus-building, we examined prior research to develop an initial process model. The model is subsequently demonstrated and validated by using data to develop an environmental sustainability dictionary for the IT industry. To our knowledge, this is an initial attempt to provide a normalized dictionary building process for text analytics projects. The resulting process model can provide a road map for researchers who want to use automated approaches to text analysis but are currently prevented ...


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye 2019 University of East London

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis ...


External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona 2019 University of Cape Town

External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona

The African Journal of Information Systems

The paper examines external actors in the formulation of national Information and Communication Technology (ICT) policies. It questions how external actors overtly or covertly influence formulation of national ICT policies following that, of the nearly 84% of the countries in Africa that have formulated national ICT policies, most of which have been influenced by external actors. The paper uses Bourdieu’s Theory of Practice to analyze the effects of external actors’ influences in developing countries by using Malawi as a case study. Document analysis is used to analyse external actors’ influences in policy documents, the minutes of policy actors’ meetings ...


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord 2018 Kennesaw State University

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Digital Commons powered by bepress