Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,272 Full-Text Articles 3,250 Authors 423,026 Downloads 88 Institutions

All Articles in Management Information Systems

Faceted Search

3,272 full-text articles. Page 1 of 103.

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. McKinney Jr. 2016 Marshall University

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Ralph E. McKinney

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in ...


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. McKinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. 2016 Marshall University

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Ralph E. McKinney

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender ...


Digital Counterfeiting: States Regulation Of Federal, Foreign & Digital, Ralph E. McKinney, Lawrence P. Shao, Dale H. Shao, Dale C. Rosenblieb Jr. 2016 Marshall University

Digital Counterfeiting: States Regulation Of Federal, Foreign & Digital, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Dale C. Rosenblieb Jr.

Ralph E. McKinney

The relatively recent appearance of Internet-based transactions necessitated the develop of digital forms of payment. These payments have evolved into various forms, including digital currency. This paper discusses the regulatory authority and/or lack of authority, of the sovereign States of the United States to regulate the counterfeiting of financial instruments used as currency, including digital currency. Federal and Foreign (non-U.S.) currencies are explicitly examined. Some digital currencies are not regulated or authorized specifically by a government. Can a currency without formal codification from a government be regulated by a State? As financial transactions have shifted historically from various ...


Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. McKinney Jr. 2016 Marshall University

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Lawrence Shao

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in ...


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. McKinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. 2016 Marshall University

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Lawrence Shao

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender ...


Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak 2016 Marshall University

Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak

Jennifer Y Mak

The purpose of this study was to identify whether there were differences in the expectations of job responsibilities between different levels of recreation and sports managers towards the same post. The problem was divided into two sub-problems: (l) to determine the relationship in the perceived importance of entry-level managers' job responsibilities between entry-level managers and middle-level managers; and (2) to determine the relationship in the perceived importance of middle-level managers job responsibilities between middle-level managers and top-level managers. Several items were found to have significant difference in the perceptions among the subjects.


The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany DeWalt, Simon Cleveland 2016 University of Missouri-St. Louis

The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany Dewalt, Simon Cleveland

Maurice Dawson

The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that ...


The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany DeWalt, Simon Cleveland 2016 University of Missouri-St. Louis

The Case For Ubuntu Linux Operating System Performance And Usability For Use In Higher Education In A Virtualized Environment, Maurice Dawson, Brittany Dewalt, Simon Cleveland

Maurice Dawson

The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that ...


Modular Service Configuration For Identifying Value-Adding Services For Internationalization, Tilo Böhmann, Michael Schermann, Helmut Krcmar 2016 Santa Clara University

Modular Service Configuration For Identifying Value-Adding Services For Internationalization, Tilo Böhmann, Michael Schermann, Helmut Krcmar

Michael Schermann

Assume that your firm needs to serve a new customer. The customer has specific needs, such as requesting you to operate an existing IT system or facilities. If you could meet these needs by predominately selecting and combining predefined services, imagine the impact on cost of sales and cost of delivery.


Smart Automotive Apps Für Kundenorientierte Dienstleistungen Im Fahrzeug, Tobias Schlachtbauer, Gerhard Stanzl, Maximilian Pühler, Michael Schermann, Helmut Krcmar 2016 Santa Clara University

Smart Automotive Apps Für Kundenorientierte Dienstleistungen Im Fahrzeug, Tobias Schlachtbauer, Gerhard Stanzl, Maximilian Pühler, Michael Schermann, Helmut Krcmar

Michael Schermann

Smart Automotive Apps, d. h. intelligente IT-basierte Anwendungen im tertiären Anwendungsbereich des Autofahrers, spielen in der Automobilindustrie eine zunehmend wichtigere Rolle für die Wertschöpfung. Jedoch sind die Fachexperten der unterschiedlichen Anwendungsdomänen nur selten in der Lage ihre Visionen, Anforderungen und Einschränkungen vollständig zu explizieren, wenn es um die Entwicklung innovativer Softwareanwendungen geht. Die besonderen Herausforderungen in der Automotive-Domäne, aufgrund der hohen Anforderungen an die Software im Fahrzeug, erhöhen zudem die Komplexität in der Entwicklung von Smart Automotive Apps. Hierbei kann die schnelle Entwicklung und Evaluierung von Prototypen mit Hilfe der graphischen Modellierungssprache ASML (Automotive Services Modelling Language) zusammen mit der ...


Information Technology Risks: An Interdisciplinary Challenge, Michael Schermann, Manuel Wiesche, Stefan Hoermann, Helmut Krcmar 2016 Santa Clara University

Information Technology Risks: An Interdisciplinary Challenge, Michael Schermann, Manuel Wiesche, Stefan Hoermann, Helmut Krcmar

Michael Schermann

This chapter introduces students to general concepts and theoretical foundations of managing risks induced by developing and using information technology (IT risks). This chapter first provides an overview of the broad nature of IT risks. We introduce categories of IT risks to illustrate its diverse and heterogeneous causes and consequences as well as possible strategies required to balance the risks and benefits of information systems. Second, we illustrate the interdisciplinary challenges that come with managing IT risks on the most researched form of IT risk, namely IT project risks. We discuss the subjectivity of IT risks, various IT risk assessment ...


A Structural Framework For Analyzing Information Technology, Daniel Pfeiffer, Michael Schermann, Jörg Becker, Helmut Krcmar 2016 Santa Clara University

A Structural Framework For Analyzing Information Technology, Daniel Pfeiffer, Michael Schermann, Jörg Becker, Helmut Krcmar

Michael Schermann

With the rise of technological advance, organizations require methods and tools to analyze technologies regarding their fit to the needs of an institution. Research on the evaluation and selection of technologies has mainly adopted a process perspective so far. We argue that it is crucial to consider the inner structure of technologies as well and describe its elements and connections. Hence, in this paper we propose a framework for analyzing information technology by reconstructing its inner structure. We transfer concepts of philosophical Structuralism to technologies by analyzing the striking proximity in the assembly of theories and technologies as conceptual networks ...


Anforderungen An Theorien In Der Wirtschaftsinformatik, Teil 1, Steffen Greiffenberg, Michael Schermann 2016 Santa Clara University

Anforderungen An Theorien In Der Wirtschaftsinformatik, Teil 1, Steffen Greiffenberg, Michael Schermann

Michael Schermann

No abstract provided.


The Business Value Of Cloud Computing In South Africa, Kevin Allan Johnston Prof, Muzaffar Loot Mr, Maxine P. Esterhuyse Miss 2016 University of Cape Town

The Business Value Of Cloud Computing In South Africa, Kevin Allan Johnston Prof, Muzaffar Loot Mr, Maxine P. Esterhuyse Miss

The African Journal of Information Systems

Cloud computing is a prominent trend in the field of Information Technology (IT). Existing research presents the benefits and challenges of cloud computing, however few articles take a corporate approach. Moreover, considering that cloud computing provides numerous benefits, no research has aided the understanding of the business value associated with the technology and the context within which benefits and barriers are realised. The issues in South Africa make it difficult to prove the business value of cloud computing.

The aim of this paper is to provide insight into the business value of cloud computing using qualitative evidence extracted from an ...


A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew van der Poll, Jan H. Kroeze PhD 2016 University of South Africa

A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew Van Der Poll, Jan H. Kroeze Phd

The African Journal of Information Systems

Software migrations are mostly performed by organisations using migration teams. Such migration teams need to be aware of how sensitive information ought to be handled and protected during the implementation of the migration projects. There is a need to ensure that sensitive information is identified, classified and protected during the migration process.

This paper suggests how sensitive information in organisations can be handled and protected during migrations, by using the migration from proprietary software to open source software to develop a management framework that can be used to manage such a migration process. The research employed a sequential explanatory mixed ...


Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr 2016 University of KwaZulu-Natal

Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr

The African Journal of Information Systems

Changing academics’ perceptions of information and communications technology (ICT) in developing countries has always been a challenge. A university in Zimbawe has witnessed an about-turn in lecturers’ perceptions and beliefs about technology, from being negative (technophobic) to positive (technologically savvy) users of technology. This paper reports on the interplay of factors that resulted in lecturers’ buy-in to the use of e-learning as a mode of instructional delivery. The study employed actor network theory (ANT) as both a methodological and analytical framework to trace the trajectory of the e-learning programme at this university. The conspicuous actors were followed using questionnaires, participant ...


The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr 2016 Central University of Technology, Department of Business Support StudiesBloemfontein

The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr

The African Journal of Information Systems

While Universities of Technologies (UoTs) regard the adoption of educational technology for the creation of effective learning environments as one of their defining features, there is limited research on these universities’ innovative use of technologies to transform their curricula design and delivery. This research explores the extent to which educational technology has been integrated into the implementation of new and recurriculated educational programmes under the Strategic Transformation of Educational Programmes and Structures (STEPS) at a UoT. The research employed document analysis and interview data from middle level managers (Deans), curriculum designers and educational technologists. The findings suggest that, except for ...


Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters 2016 University of Nebraska-Lincoln

Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters

Extension Farm and Ranch Management

No abstract provided.


Understanding User’S Acceptance Of Personal Cloud Computing: Using The Technology Acceptance Model, Maurice Dawson 2016 University of Missouri - St Louis

Understanding User’S Acceptance Of Personal Cloud Computing: Using The Technology Acceptance Model, Maurice Dawson

Maurice Dawson

Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users' acceptance of PCC. The population sample consisted of individual users within the United States between ...


Genetic Algorithm Based Model In Text Steganography, Christine Mulunda, Peter Wagacha, Alfayo Adede 2016 University of Nairobi

Genetic Algorithm Based Model In Text Steganography, Christine Mulunda, Peter Wagacha, Alfayo Adede

Christine K Mulunda

Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used ...


Digital Commons powered by bepress