Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,450 Full-Text Articles 5,918 Authors 3,133,614 Downloads 161 Institutions

All Articles in Management Information Systems

Faceted Search

4,450 full-text articles. Page 110 of 153.

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani 2014 Arkansas Technical University

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani

Journal of International Technology and Information Management

In the information-driven and application rich environment of smartphones, power is closer to the user than ever before and it has the potential of helping them become more effective and efficient. Smartphones have become increasingly important for companies to create strategic opportunities and competitive advantage by adding value for its stakeholders and improving efficiency. Technological advances in smartphones have led to increased mobile applications and implications for theory and practice since they create strategic opportunities and competitive advantage by adding value for customers and improving efficiency through the use of mobile technologies. Understanding the factors that influence the continuance in …


Limitations Of Nonfinancial Metrics Reported By Social Media Companies, Rob Weitz, Theresa Henry, David Rosenthal 2014 Seton Hall University

Limitations Of Nonfinancial Metrics Reported By Social Media Companies, Rob Weitz, Theresa Henry, David Rosenthal

Journal of International Technology and Information Management

Publicly traded companies in the U.S. are required by the Securities and Exchange Commission (SEC) to file annual and quarterly financial statements (form 10-K and form 10-Q respectively). The Management Discussion and Analysis (MD&A) section of these reports, as per SEC requirements, should include the identification and discussion of nonfinancial performance metrics that are critical to management and important to investors. This paper examines a set of common nonfinancial metrics reported by some well-known social media companies. These metrics include such quantities as number of registered users, monthly average users, and number of unique visitors. The definition and use of …


Developing A Mobile Learning Environment: An Axiomatic Approach, Walter Rodriguez, Ngan Nguyen-Huynh, Arnold Fernandez, James Royal, Victor Fernandez 2014 Florida Gulf Coast University

Developing A Mobile Learning Environment: An Axiomatic Approach, Walter Rodriguez, Ngan Nguyen-Huynh, Arnold Fernandez, James Royal, Victor Fernandez

Journal of International Technology and Information Management

A new mobile environment for learning has been designed via an axiomatic approach. And by simultaneously designing both tools (software) and processes (pedagogy), the resulting environment matches the functional requirements of the instructional program. This paper describes the axioms established for mobile learning as well as development of the mobile computing environment. The paper discusses the developmental evolution and system architecture as well as the requirements of the portable training programs being offered via this new system. Apps are designed to connect learners, instructors and practitioners as well as to facilitate collaborative learning from a variety of mobile devices, anywhere …


A Conflict Resolution Tool For Project Managers: Evaporating Cloud, Mahesh C. Gupta, Sharon A. Kerrick 2014 University of Louisville

A Conflict Resolution Tool For Project Managers: Evaporating Cloud, Mahesh C. Gupta, Sharon A. Kerrick

Journal of International Technology and Information Management

Today’s ever changing business environment requires managers to interact globally with people across functional areas with conflicting points of view. A preliminary literature review suggests that a generic tool to understand and resolve conflicts is desirable. This paper demonstrates how a theory of constraints-based logical tool, an evaporating cloud, can enable IT managers to better understand conflicts underlying most problems. Using a commonly encountered conflict as an example, we show how this tool verbalizes a problem through the logic of cause and effect, surfaces the assumptions causing the conflicting actions and decisions, and presents injections – potential solutions – that …


The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon 2014 Ball State University

The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon

Journal of International Technology and Information Management

Competitive priorities are the critical operational dimensions a process or supply chain must possess to satisfy its internal or external customers. The concept of competitive priorities is very important to organizations because it helps them set up achievable goals and it has long been known to be associated with organizational performance. This research introduces an alternative theory to explain the mechanism by which the buying firms and suppliers adopt different competitive priorities as they enter into buyer-supplier relationships and to explore further how technology choices influence the competitive priority adaptation. Using empirical data collected from the Society of Manufacturing Engineer’s …


The Influence Of Digital Self-Services On Patient’S Experience In A Polyclinic Context: A Framework Construction, Gabriela Labres Mallmann, Marco Plaisier, Johan Versendaal, Pascal Ravesteyn 2014 Federal University of Rio Grande do Sul, Porto Alegre

The Influence Of Digital Self-Services On Patient’S Experience In A Polyclinic Context: A Framework Construction, Gabriela Labres Mallmann, Marco Plaisier, Johan Versendaal, Pascal Ravesteyn

Journal of International Technology and Information Management

The healthcare sector has done significant investments in technology in order to improve their processes; however there is evidence showing that new technology is not optimally used in certain healthcare settings. In this paper we present a framework to analyse how digital self- service (DSS) can optimize processes and improve patient experience in a polyclinic context. The framework consists of five digital self-service types and seven patient's experience factors, both taken from literature and validated for experts. The framework aims to show the influence of DSS in patient’s experience. The results show a positive impact of self-service diagnosis, treatment and …


Determinants Of Digital Distraction: A Cross-Cultural Investigation Of Users In Africa, China And The U.S., Leida Chen, Ravi Nath, Robert Insley 2014 California Polytechnic State University San Luis Obispo

Determinants Of Digital Distraction: A Cross-Cultural Investigation Of Users In Africa, China And The U.S., Leida Chen, Ravi Nath, Robert Insley

Journal of International Technology and Information Management

No abstract provided.


Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long 2014 Texas State University

Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long

Journal of International Technology and Information Management

Efficient information retrieval is essential to enrich user experience when searching for documents in dataspaces. With the continued growth in the volume and complexity of documents, the efficient information retrieval for searches has become increasingly challenging. To improve users’ search experience, faceted search combines direct keyword search methods with faceted browsing using a predefined set of categories (facets). This paper studies a faceted search approach that integrates dynamic facets generation with search. To further enhance the faceted search, alternative indexers based on pre-defined ontology for data repositories within dataspaces are evaluated in terms of execution time and data size. Experimental …


Electronic Health Records: Challenges And Opportunities, Jaymeen R. Shah, Mirza B. Murtaza, Emmanuel Opara 2014 Texas State University

Electronic Health Records: Challenges And Opportunities, Jaymeen R. Shah, Mirza B. Murtaza, Emmanuel Opara

Journal of International Technology and Information Management

During the last three decades, healthcare expenditure in the U.S. has substantially increased. If this pace of increase is not controlled, it will lead to disastrous results for the healthcare system. An effective use of health information technology would not only improve the quality of healthcare but help reduce healthcare costs considerably. However, risks of privacy and security of patient electronic health records are great. It is recommended that healthcare organizations use IT management best practices, follow proper risk assessment and management guidelines, and keep up with latest technological advances to ensure the privacy and security of patient data.


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North 2014 Kennesaw State University

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …


Uncovering The Nuances Of Referral Hiring: How Referrer Characteristics Affect Referral Hires’ Performance And Likelihood Of Voluntary Turnover, Jenna R. Pieper 2014 University of Nebraska-Lincoln

Uncovering The Nuances Of Referral Hiring: How Referrer Characteristics Affect Referral Hires’ Performance And Likelihood Of Voluntary Turnover, Jenna R. Pieper

Department of Management: Faculty Publications

The literature on employee referral hiring gives little attention to referrers. Synthesizing two theories in the literature (the better match and social enrichment accounts), through the lens of social resources theory, I provide a conceptual and empirical breakdown of the effects of referrer quality (referrer performance at hire and referrer tenure at hire) and post-hire accessibility (referrer employment and referrer-referral hire job congruence) on referral hire performance and likelihood of voluntary turnover. I tested my hypotheses with longitudinal data from 386 referrer-referral hire pairs at the same job level in a U.S. call center over a 2-year period. Across analyses …


Disciplinarity And Trandisciplinarity In The Study Of Knowledge, Jay H. Bernstein 2014 CUNY Kingsborough Community College

Disciplinarity And Trandisciplinarity In The Study Of Knowledge, Jay H. Bernstein

Publications and Research

Scholarly inquiry about the nature and significance of knowledge has been shaped by disciplinary traditions and priorities that define “knowledge” differently and result in disconnected literatures. In the mid to late twentieth century, library science educator Jesse Shera sought to bridge the conceptual gap between epistemological and sociological approaches to knowledge in proposing a new discipline he called social epistemology. Around the same time, long-term projects by the economist Fritz Machlup and the physical chemist turned philosopher of science Michael Polanyi did not merely combine existing disciplinary approaches but transcended conventional frameworks for conceptualizing knowledge. These scholars can be viewed …


Rethinking Fs-Isac: An It Security Information Sharing Model For The Financial Services Sector, Charles Liu, Humayun Zafar, Yoris A. Au 2014 University of Texas at San Antonio

Rethinking Fs-Isac: An It Security Information Sharing Model For The Financial Services Sector, Charles Liu, Humayun Zafar, Yoris A. Au

Faculty and Research Publications

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


Management Information Systems: An Information Portal For A Major With Limitless Interpretations, Benjamin Richard Lahue 2014 University of Northern Iowa

Management Information Systems: An Information Portal For A Major With Limitless Interpretations, Benjamin Richard Lahue

Honors Program Theses

Management Information Systems often referred to as MIS is the people-oriented use of computers in business. MIS is both a field of study and a career path. It combines the foundations of computing, analysis, and business in to one field of study. MIS is a major that is growing in popularity; however, it is still unknown to many undergraduates. This thesis includes both research and creative aspects. The information gathered by research was used to generate the requirements for an information portal relating to the MIS program at the University of Northern Iowa (UNI). A portal is a one stop …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr 2014 Georgia Southern University

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Role Of Digital Collections In The Cultural Heritage Institution: Pathways For Strengthening Social Identity, Kimberly A. Arleth 2014 Hamline University

Role Of Digital Collections In The Cultural Heritage Institution: Pathways For Strengthening Social Identity, Kimberly A. Arleth

School of Business Student Theses and Dissertations

According to the theory of social identity, the more connected an individual feels to other group members, the more likely they are to feel a part of this group. The stronger the connection is, the more likely the individual is to become an active member. Cultural collections illustrate the shared history of a group. By increasing access to these collections via online access, organizations expose more users to these shared histories. Viewing such shared history, individuals will experience stronger connections to the history and members of the group resulting in an increase in social identity. When this connection solidified, users …


Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. CLEMONS, Robert John KAUFFMAN, Thomas A. WEBER 2014 Singapore Management University

Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. Clemons, Robert John Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

This mini-track is informed by the most modern thinking in information economics and competitive strategy, and includes many interdisciplinary applications of IS and technology.


How Can Substitution And Complementarity Effects Be Leveraged For Broadband Internet Services Strategy?, Gwangjae JUNG, Young Soo KIM, Robert J. Kauffman 2014 Singapore Management University

How Can Substitution And Complementarity Effects Be Leveraged For Broadband Internet Services Strategy?, Gwangjae Jung, Young Soo Kim, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

With growth in mobile Internet services, the relationship between mobile and fixed broadband has become an issue in telecom firm strategy. Previous research focused on aggregate penetration for mobile and fixed broadband services. Our research analyzes the economic relationship between mobile and fixed broadband services at the household level, as a basis for how senior managers should rethink their strategy approach. Using data on broadband services subscriptions, we examine how changes that occur for mobile broadband services bandwidth (MBB) affect changes in fixed broadband bandwidth (FBB) services subscriptions, inclusive of new subscriptions - and vice versa. We explore the different …


Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle 2014 Brigham Young University

Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle

Faculty Publications

Users' perceptions of risks have important implications for information security, as the actions of individual users can compromise entire systems. Therefore, there is a critical need to understand how users perceive and respond to information security risks. Previous research on perceptions of information security risk has chiefly relied on self-reported measures. Although these studies are valuable, risk perceptions are often associated with feelings—such as fear or doubt—that are difficult to measure accurately using survey instruments. Additionally, it is unclear how these self-reported measures map to actual security behavior. This paper contributes by demonstrating that risk-taking behavior is effectively predicted using …


Principles Of Information Security, 5th Edition (Forthcoming), M. Whitman, Herbert Mattord 2013 Kennesaw State University

Principles Of Information Security, 5th Edition (Forthcoming), M. Whitman, Herbert Mattord

Herbert J. Mattord

No abstract provided.


Digital Commons powered by bepress