Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,450 Full-Text Articles 5,918 Authors 3,555,608 Downloads 161 Institutions

All Articles in Management Information Systems

Faceted Search

4,450 full-text articles. Page 2 of 153.

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter 2024 University of New South Wales

The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter

KSU Proceedings on Cybersecurity Education, Research and Practice

In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …


Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin 2024 University of Sydney, Australia

Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin

KSU Proceedings on Cybersecurity Education, Research and Practice

Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …


New Insights On Economic Theories Of The Family Firm, James J. Chrisman, Chevy-Hanqing Fang, Silvio Vismara, Zhenyu Wu 2024 Missouri University of Science and Technology

New Insights On Economic Theories Of The Family Firm, James J. Chrisman, Chevy-Hanqing Fang, Silvio Vismara, Zhenyu Wu

Business and Information Technology Faculty Research & Creative Works

Research attention to family firms has significantly increased in recent years, with a growing application of economic theories such as agency theory and resource-based theory to explain differences between family firms and nonfamily firms and heterogeneity among family firm populations. Despite this progress, the formulation of an economic theory of family business remains notably absent. Merely applying existing economic theories of the firm to the realm of family business is inadequate, as these general theories fail to incorporate the idiosyncratic aspects of family firms, such as the pursuit of socioemotional wealth. This paper seeks to advance economic theories specific to …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin 2024 Pace University - New York

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi 2024 California State University, Sacramento

Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi

Journal of International Technology and Information Management

This article draws from the social network theory and examines how a social network approach can contribute to our understanding of the variation in the adoption of innovative, organization-wide information systems that can help businesses achieve sustainable competitive advantage. It highlights how the extant explanations for the adoption of information systems are limited in the way that they primarily assume organizations make innovation adoption decisions in isolation. It does so by building on growing research which recognizes that organizations are not isolated from one another; rather, they are interrelated through their inter-organizational networks which provide unique learning opportunities that are …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström 2024 Åbo Akademi University

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath 2024 Georgia Gwinnett College

An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath

Journal of International Technology and Information Management

ABSTRACT

The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco 2024 California Polytechnic State University, San Luis Obispo

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Development Of A Safety Performance Decision-Making Tool For Flight Training Organizations, Marisa Aguiar Ph.D., Carolina L. Anderson Ph.D., Dothang Truong Ph.D., Gregory S. Woo Ph.D., Kenneth Byrnes Ph.D. 2024 Purdue University

Development Of A Safety Performance Decision-Making Tool For Flight Training Organizations, Marisa Aguiar Ph.D., Carolina L. Anderson Ph.D., Dothang Truong Ph.D., Gregory S. Woo Ph.D., Kenneth Byrnes Ph.D.

Journal of Aviation/Aerospace Education & Research

The purpose of the research was to create and validate a safety performance decision-making tool to transform a reactive safety model into a predictive, decision-making tool, specific to flight training organizations, to increase safety and aid in operational decision-making. Using Monte Carlo simulation, the study conducted simulation runs based on operational ranges to simulate the operating conditions with varying levels of controllable resources in terms of personnel (Aviation Maintenance Technicians and Instructor Pilots) and expenditures (active flight students and available aircraft). Four What-if Scenarios were conducted by manipulating the controllable inputs. Changes to the controllable inputs are reflected by variations …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard Ph.D., Austin T. Walden Ph.D., Paul J. Thomas Ph.D. 2024 Kansas State University

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard Ph.D., Austin T. Walden Ph.D., Paul J. Thomas Ph.D.

Journal of Aviation/Aerospace Education & Research

Increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations: 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) developing an embedded machine learning framework. Data cleanup and …


An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper 2023 Northern Michigan University

An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper

International Journal for Business Education

This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …


The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, sancoko sancoko, Armeyta Widya Oryza, niko grataradirga 2023 Universitas Indonesia

The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga

Jurnal Administrasi Bisnis Terapan (JABT)

This study intend to evaluate the use of the Human Resources Information System (HRIS) in private organization. User satisfaction is one of the conditions for the successful implementation of information systems. To evaluate this system information, the author uses the conceptual Delone and Mclean information system success model(ISSM). This study employs a quantitative methodology and a survey method. The research sample consists of employees in private organizations engaged in software engineering. To analyze, SPSS is employed by the author in two stages: first validity-reliability examination, second multiple regression tests. The result demonstrated that quality system has a significant affect on …


Social Engineering Cyber Threats, Young B. Choi, Josh Rubin 2023 Regent University, Virginia Beach, USA

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman 2023 University of Southern Maine

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim 2023 Old Dominion University

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz 2023 California State University - San Bernardino

Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz

Electronic Theses, Projects, and Dissertations

Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …


E-Commerce Digital Information Transparency And Satisfaction. Can We Have Too Much Of A Good Thing?, Slava Ferguson 2023 Clemson University

E-Commerce Digital Information Transparency And Satisfaction. Can We Have Too Much Of A Good Thing?, Slava Ferguson

All Dissertations

Despite core product and service quality improvements and advances in shopping processes and technology, customers often report being unsatisfied with their online purchases. One plausible reason for lower customer satisfaction rates is too much or too little information that is shared with the customers about their orders. We show that when forming their perceptions about the purchases, customers form digital information satisfaction (DIS) levels as they evaluate supplementary informational services in addition to the core product being purchased. We believe that DIS is one of the dimensions of overall customer satisfaction. We also show that supplementary informational services are essential …


Exploration Of The Implementation Of An Integrated Electronic Laboratory Information Management System On Quality Diagnostics Service Indicators At A County Level Public Hospital In Western Kenya., Kelly Allen 2023 SIT Graduate Institute/SIT Study Abroad

Exploration Of The Implementation Of An Integrated Electronic Laboratory Information Management System On Quality Diagnostics Service Indicators At A County Level Public Hospital In Western Kenya., Kelly Allen

Capstone Collection

Underinvestment in pathology and laboratory capacity caused by low visibility in research and in prioritization by public health leaders results in limited effective healthcare coverage and an estimated 1.1 million premature deaths annually in Low-and-Middle-Income Countries. Kenya’s public health laboratories provide a median 41% of the Essential Diagnostic List to their patients and in Kisumu County, as much as 44.2% of the population has little to no access to essential diagnostics. The government of Kisumu implemented the county Health Laboratory Strategic Plan 2018-2022 to address this public health challenge. Little information exists on the effectiveness of these initiatives and the …


Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu 2023 University of Surrey

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi 2023 Nelson Mandela University

The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi

The African Journal of Information Systems

This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of …


Digital Commons powered by bepress