Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3637 Full-Text Articles 3727 Authors 589362 Downloads 99 Institutions

All Articles in Management Information Systems

Faceted Search

3637 full-text articles. Page 1 of 113.

Focus On Non-Functionals! The Effect Of Focussing On Non- Functional Requirements On The Maturity Of The Requirements Engineering Process, David Vermeulen, Mark de Weger, Pascal Ravesteyn 2017 Spir-IT

Focus On Non-Functionals! The Effect Of Focussing On Non- Functional Requirements On The Maturity Of The Requirements Engineering Process, David Vermeulen, Mark De Weger, Pascal Ravesteyn

Communications of the IIMA

When developing IT systems it is important to know the requirements of the system. Requirements can be classified into different categories. In this study we look at functional and non-functional requirements. Respectively these describe the behaviour of the system (functional requirements) and the criteria under which the system works (the non-functional requirements). Furthermore this paper contributes to the understanding of the relation between the focus on non-functional requirements and the maturity of the requirements engineering process. The research question this paper addresses is: "How does the focus on non-functional requirements influence the maturity of the requirements engineering process?” The method ...


Cultural Impacts On Cognitive Dissonance And Ewom/Enwom, Kungpo Tao, Yan Jin 2017 Elizabeth City State University

Cultural Impacts On Cognitive Dissonance And Ewom/Enwom, Kungpo Tao, Yan Jin

Communications of the IIMA

The purpose of this study is to contrast individualist culture (e.g., United States) with collectivist culture (e.g., China) in regards to the Internet-involved customer purchase process (IICPP), specifically the customer’s involvement before purchase, the cognitive dissonance after purchase and the post-purchase behavior in terms of the online world of mouth (eWOM) and online negative word of mouth (eNWOM). This study also explores the influences of culture on product attributes that are associated in IICPP. Based on the related literature, this study applies the existing concepts to the Internet context. The study adopts 40 cases of online customer ...


A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek 2017 Washington State University

A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek

Communications of the IIMA

Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably effective IT systems remains a significant challenge. This paper presents a light weight IT effectiveness model for small businesses to assess their IT and formulate strategies for improvement. Employing an action research approach we investigate a mixed method analysis of 120 survey responses from small family businesses and user participation in 10 semi-structured interviews. We then conduct critical reflection to identify refinements which are validated using 72 survey responses from university students. The results present compelling evidence that employees’ normative patterns (norms) are a significant driver ...


Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin 2017 University of La Verne

Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin

Communications of the IIMA

The KPI-centric Strategic Model regarding the Role of Information Technology developed in this research is based on specific details from the University of La Verne’s participation in the 2014 Educause Center for Analysis and Research (ECAR) Study of Undergraduate Students and Information Technology as a benchmarking participant. It also draws on the experience and directions of other institutions such as California State University, University of California. As one of the participating 213 institutions, the University of La Verne’s undergraduate student responses generally mirror the majority view of students enrolled in all institutions of higher education in the United ...


An Integrated Perspective Of Multitasking And Multiple Team Membership, Shoshana Altschuller, Raquel Benbunan-Fich 2017 Iona College

An Integrated Perspective Of Multitasking And Multiple Team Membership, Shoshana Altschuller, Raquel Benbunan-Fich

Communications of the IIMA

Workers in today’s business environments are confronted with heavy workloads that reflect not only their regular job expectations but also their involvement in multiple teams at the same time. The majority of the current literature has studied these two topics (multitasking and multiple-team membership) independently. The goal of this paper is to integrate both conceptual outlooks by examining relevant works in both streams of research and merging them into an integrated framework. By analyzing new data collected from focus groups, and taking an individual worker’s perspective, the results of this study suggest that participating in multiple teams simultaneously ...


It Security Governance: A Framework Based On Iso 38500, Suchit Ahuja, Yolande E. Chan 2017 Queen’s School of Business Queen’s University, Kingston, Canada

It Security Governance: A Framework Based On Iso 38500, Suchit Ahuja, Yolande E. Chan

Suchit Ahuja

ISO 38500 is an international standard for IT governance. The guidelines of ISO 38500 can also be applied at the IT security functional level in order to guide the governance of IT security. This paper proposes the use of a strategic information security management (ISM) framework to implement guidelines of ISO 38500. This approach provides several strategic advantages to the organization by 1) aligning IT security initiatives to business strategy; 2) providing a mechanism for establishing and tracking security metrics; and 3) enhancing the overall maturity of business, IT and IT security processes. The framework also leverages tools such as ...


Isscm Newsletter, Volume 16, January 31, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Volume 16, January 31, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A seven page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Innovative Collaboration At The Open Group Security Forum: Fruit From The Open Group Academic Program, Stephen M. Jerbic 2017 San Jose State University

Innovative Collaboration At The Open Group Security Forum: Fruit From The Open Group Academic Program, Stephen M. Jerbic

Stephen M. Jerbic

This presentation developed an economic cost-benefit analysis of information security and privacy policy regarding online connections of home dialysis machines. Two students John Linford and Sushmitha Kasturi contributed to his project that explored how prohibiting online connections between home dialysis machines and physicians in Norway on privacy and security grounds was likely not economically inefficient now but raises new questions about the value of telemedicine in general. Continuing to prohibit online connections between patient information systems and the health care system in Norway likely has significant cost-benefit consequences that need to be further researched.


Measuring The Organizational Impact Of Security Breaches: Patterns Of Factors And Correlates, Kevin P. Gallagher, Xiaoni Zhang, Vickie Coleman Gallagher 2017 Cleveland State University

Measuring The Organizational Impact Of Security Breaches: Patterns Of Factors And Correlates, Kevin P. Gallagher, Xiaoni Zhang, Vickie Coleman Gallagher

Kevin Gallagher

As the use of technology permeates organizations, as well as our personal and professional lives, organizational research has aimed to report the incidence of security breaches. However, self-reporting in survey research is flawed given that organizations are hesitant to admit to loss of sensitive data and other security breaches. Furthermore, there are gradients of breaches, rather than binomial occurrences, or lack of occurrences. Hence, a more comprehensive and less obtrusive measure of the nature and impact of breaches is necessary in order to advance theory and practice. As such, we tested a new measure of impact with representatives from over ...


Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta 2017 Cleveland State University

Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta

Lori Peterson

Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1 ...


Sellers In Online Auction Markets: Introducing A Feedback-Based Classification, Radha Appan, Zhangxi Lin 2017 Cleveland State University

Sellers In Online Auction Markets: Introducing A Feedback-Based Classification, Radha Appan, Zhangxi Lin

Radha Appan

Trading in the online consumer-to-consumer (C2C) auction market necessitates buyers and sellers to engage in transactions with anonymous counterparts. The sequence of paying first and then taking delivery introduces a great amount of risk for potential buyers. In order to assist buyers in dealing with this risk, online auction markets (OAMs) are employing reputation-scoring systems and traders can be classified in terms of their online reputation scores. A review of the literature suggests a conspicuous absence of the study on any standard classification of sellers in OAMs. Lack of such a classification hinders systematic research and theory development. Therefore, a ...


Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley 2017 Clemson University

Buyer Perceptions Of Supply Disruption Risk: A Behavioral View And Empirical Assessment, Scott C. Ellis, Raymond M. Henry, Jeff Shockley

Raymond Henry

As supply chains become more complex, firms face increasing risks of supply disruptions. The process through which buyers make decisions in the face of these risks, however, has not been explored. Despite research highlighting the importance of behavioral approaches to risk, there is limited research that applies these views of risk in the supply chain literature. This paper addresses this gap by drawing on behavioral risk theory to investigate the causal relationships amongst situation, representations of risk, and decision-making within the purchasing domain. We operationalize and explore the relationship between three representations of supply disruption risk: magnitude of supply disruption ...


A Formalism For Plan – A Big Data Personal Learning Assistant For University Students, Timothy Arndt, Angela Guercio 2017 Cleveland State University

A Formalism For Plan – A Big Data Personal Learning Assistant For University Students, Timothy Arndt, Angela Guercio

Timothy Arndt

Big Data-based methods of learning analytics are increasingly relied on by institutions of higher learning in order to increase student retention by identifying at risk students who are in need of an intervention to allow them to continue on in their educational endeavors. It is well known that e-Learning students are even more at risk of failing out of university than are traditional students, so Big Data learning analytics are even more appropriate in this context. In this paper, we present our approach to this problem. We wish to place control of a student’s learning process in his own ...


Organizing For Post-Implementation Erp, Kevin P. Gallagher, Vickie C. Gallagher 2017 Cleveland State University

Organizing For Post-Implementation Erp, Kevin P. Gallagher, Vickie C. Gallagher

Vickie Gallagher

PURPOSE: The importance of involving subject matter experts (SMEs) in ERP implementations is well established. SMEs' knowledge of business and system processes are critical to conducting gap analyses and configuring enterprise systems. But what happens to SMEs on completion of the implementation phase? Prior qualitative research found that some organizations return SMEs to their old department, which can contribute to knowledge transfer; while other organizations retain the services of SMEs, to assist in ongoing efforts with support and enhancement of the systems. The purpose of this study is to understand post‐implementation organizational choices – when SMEs are retained and returned ...


Measuring The Organizational Impact Of Security Breaches: Patterns Of Factors And Correlates, Kevin P. Gallagher, Xiaoni Zhang, Vickie Coleman Gallagher 2017 Cleveland State University

Measuring The Organizational Impact Of Security Breaches: Patterns Of Factors And Correlates, Kevin P. Gallagher, Xiaoni Zhang, Vickie Coleman Gallagher

Vickie Gallagher

As the use of technology permeates organizations, as well as our personal and professional lives, organizational research has aimed to report the incidence of security breaches. However, self-reporting in survey research is flawed given that organizations are hesitant to admit to loss of sensitive data and other security breaches. Furthermore, there are gradients of breaches, rather than binomial occurrences, or lack of occurrences. Hence, a more comprehensive and less obtrusive measure of the nature and impact of breaches is necessary in order to advance theory and practice. As such, we tested a new measure of impact with representatives from over ...


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick 2017 Cleveland State University

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Walter Rom

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the ...


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick 2017 Cleveland State University

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Susan Slotnick

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the ...


Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi 2017 Federal University of Technology, Akure

Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi

The African Journal of Information Systems

Community Based Location Service (CBLS) is the provision of information about services based on the geographical location of subscriber’s mobile phone towards the development of the community they are in. With the increase in mobile phones penetration, citizens can participate actively in providing relevant information to assist in the provision of services and infrastructure in the country through their mobile devices. This paper proposes a framework that will improve services and provide better infrastructure to developing countries. It hinges on four major technologies: location-based information, crowdsourcing, mobile communication devices and volunteerism. This framework takes into consideration the importance of ...


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman 2017 Embry-Riddle Aeronautical University - Worldwide

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi Kappers

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two ...


Technology Mergers And Acquisitions In The Presence Of An Installed Base: A Strategic Analysis, QIU-HONG WANG, Kai-Lung HUI 2017 Singapore Management University

Technology Mergers And Acquisitions In The Presence Of An Installed Base: A Strategic Analysis, Qiu-Hong Wang, Kai-Lung Hui

Research Collection School Of Information Systems

We study the strategic benefits of M&A when competing IT vendors sell different generations of the same product with different quality. We assume the new product arrives unexpectedly when an installed base of old product exists. We show that the combination of consumers' purchase history and heterogeneity leads to new demand complexity that gives rise to innovative product strategies. We find that shelving the old product is an important motivation for M&A. The acquirer may exercise static or intertemporal price discrimination depending on whether it can exercise upgrade pricing. M&A may speed up or slow down new ...


Digital Commons powered by bepress