Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3607 Full-Text Articles 3984 Authors 783393 Downloads 116 Institutions

All Articles in Management Information Systems

Faceted Search

3607 full-text articles. Page 2 of 116.

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang 2017 University of Tennessee at Chattanooga

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities in ...


Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the Fall 2017 Cohort from the Master of Science in Logistics and Supply Chain Management Program.


Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the 2017 Cohort from the Master of Information Systems Program.


Automation And The Accounting Profession, Clarence GOH, Poh Sun SEOW, Gary PAN 2017 Singapore Management University

Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Automation poses a threat tomany of the tasks that are performed by accountants today. Certainly, manyemerging technologies have already begun to perform tasks that havetraditionally been performed by accountants. For example, advancements incloud-based accounting software now make it much easier for small businesses toeasily and accurately enter and edit financial information on their own withoutthe input of accountants. Looking further into the horizon, newer technologiescan now turn hard-copy receipts into a machine-readable format, encrypt them,and allocate them to an account without any input from a human. Such developmentswill continue to reduce the reliance of businesses on accountants.


The Information Content Of Sudden Insider Silence, Claire Yurong HONG, Frank Weikai LI 2017 Singapore Management University

The Information Content Of Sudden Insider Silence, Claire Yurong Hong, Frank Weikai Li

Research Collection Lee Kong Chian School Of Business

We present evidence of investors underreacting to the absence of events in financialmarkets. Routine-based insiders strategically choose to be silent when they possessprivate information not yet reflected in stock prices. Consistent with our hypothesis,insider silence following routine sell (buy) predict positive (negative) future return aswell as fundamentals. The return predictability of insider silence is stronger amongfirms with poor information environment and facing higher arbitrage costs, and alarge fraction of abnormal returns concentrates on future earnings announcements. Along-short strategy that exploits insiders’ strategic silence behavior generates abnormalreturns of 6% to 10% annually


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul III, Alberto Coustasse 2017 Marshall University

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business ...


Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai LI, Chengzhu SUN 2017 Singapore Management University

Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai Li, Chengzhu Sun

Research Collection Lee Kong Chian School Of Business

This paper examines expected return information embedded in investors' information acquisition activity. Using a novel dataset containing investors' access of company filings through SEC's EDGAR system, we reverse engineer their expectations over future payoffs and show that the abnormal number of IPs searching for firms' financial statements strongly predict future returns. The return predictability stems from investors allocating more effort to firms with improving fundamentals and following exogeneous shock to underpricing. A long-short portfolio based on our measure of information acquisition activity generate monthly abnormal return of 80 basis points and does not reverse over the long-run.. In addition ...


Inside Brokers, Frank Weikai LI, Abhiroop MUKHERJEE, Rik SEN 2017 Singapore Management University

Inside Brokers, Frank Weikai Li, Abhiroop Mukherjee, Rik Sen

Research Collection Lee Kong Chian School Of Business

We identify the broker each corporate insider trades through, and show that analystsand mutual fund managers affiliated with such “inside brokers” retain a substantialinformation advantage on the insider’s firm, even after these trades are disclosed.Affiliated analysts issue 10–20% more accurate earnings forecasts, and affiliated fundstrade the insider’s stock much more profitably than their peers, following insider tradesthrough their brokerage. Our results challenge the prevalent perception that informationasymmetry arising from insider trading is acute only before trade disclosure, andsuggest that brokers facilitating these trades are in a unique position to exploit suchan asymmetry.


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro 2017 University of Dar Es Salaam

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against ...


An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina 2017 University of KwaZulu-Natal, South Africa

An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina

The African Journal of Information Systems

The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus ...


Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A seventeen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Information Technology Is Transforming The Heartland: Making The Case For Midwest United States, Rassule Hadidi, Daniel Power, Joey F. George 2017 University of Illinois at Springfield

Information Technology Is Transforming The Heartland: Making The Case For Midwest United States, Rassule Hadidi, Daniel Power, Joey F. George

Daniel Power

No abstract provided.


Implications Of The Sharing Economy For Online And Blended Education, Rassule Hadidi, Daniel Power 2017 University of Illinois at Springfield

Implications Of The Sharing Economy For Online And Blended Education, Rassule Hadidi, Daniel Power

Daniel Power

The sharing economy phenomenon is disrupting traditional organizations. Sharing concepts coupled with e-Learning can and likely will disrupt higher education. We explore the sharing phenomenon and compare and contrast it with online and blended education. We conclude more effective use of sharing technologies and better course content, innovative instructional technology, and good teaching can help accredited institutions of higher education provide better learning environments as well as stronger degree programs and certifications.


Academic Panel: Privacy, Technology And Surveillance In The Digital Age: The Big Brother Scenario, Mari Buche, Joey F. George, Deepak Khazanchi, Daniel Power, Michael Zimmer 2017 Michigan Technological University

Academic Panel: Privacy, Technology And Surveillance In The Digital Age: The Big Brother Scenario, Mari Buche, Joey F. George, Deepak Khazanchi, Daniel Power, Michael Zimmer

Daniel Power

This panel starts a MWAIS community conversation about privacy, technology and surveillance in the digital age: the Big Brother scenario. The Big Brother metaphor captures many of our concerns about a future scenario that is increasingly possible. Issues to be discussed by the panel include: 1. How do we define ‘privacy’ in the digital age? 2. Who gathers our information online, and why? 3. What is the scope of surveillance in our culture – governmental, corporate, and interpersonal? 4. How much can be learned about us from our online presence? 5. What are the risks, and how can we protect ourselves ...


Building Virtual Iowa In Second Life: A Case Study, Daniel Power, Susan Wurtz, Dale Cyphert, Leslie Duclos 2017 University of Northern Iowa

Building Virtual Iowa In Second Life: A Case Study, Daniel Power, Susan Wurtz, Dale Cyphert, Leslie Duclos

Daniel Power

Linden Research’s Second Life is a three dimensional world created by its residents. In this world is an island called Iowa that was envisioned, built, developed and is operated by Iowans, both faculty and citizens from other walks of life. This case study discusses the design and development process, the current content of the island called Iowa and operational issues. Virtual Iowa is a work in progress like many web pages were in the early days of the World Wide Web. The design process was driven by a vision and by funding realities, the building of the 3D space ...


Building Virtual Iowa In Second Life: A Case Study, Daniel Power, Susan Wurtz, Dale Cyphert, Leslie Duclos 2017 University of Northern Iowa

Building Virtual Iowa In Second Life: A Case Study, Daniel Power, Susan Wurtz, Dale Cyphert, Leslie Duclos

Leslie K. Wilson

Linden Research’s Second Life is a three dimensional world created by its residents. In this world is an island called Iowa that was envisioned, built, developed and is operated by Iowans, both faculty and citizens from other walks of life. This case study discusses the design and development process, the current content of the island called Iowa and operational issues. Virtual Iowa is a work in progress like many web pages were in the early days of the World Wide Web. The design process was driven by a vision and by funding realities, the building of the 3D space ...


Return Predictability And The Real Option Value Of Segments, Pingui RAO, Heng YUE, Xin ZHOU 2017 Singapore Management University

Return Predictability And The Real Option Value Of Segments, Pingui Rao, Heng Yue, Xin Zhou

Research Collection School Of Accountancy

Theory suggests that firm value should include the value of real options; that is, firms have the option to expand more profitable businesses and liquidate less profitable businesses. In a diversified firm, each segment has its own real options. Applying real options theory to a diversified firm at the firm level neglects the value of segment-level options. If investors overlook segment-level options, mispricing will occur. Using data from 1981 to 2013, we find that a hedge portfolio buying diversified firms in the highest decile of the estimated real option value of segments (RVS) and selling those in the lowest RVS ...


The Need For Systems Development Capability In Design Science Research – Investigating The Role Of An Innovation Lab As Part Of The Academy, Stefan Cronholm, Hannes Göbel, Mikael Lind, Daniel Rudmark 2017 University of Borås

The Need For Systems Development Capability In Design Science Research – Investigating The Role Of An Innovation Lab As Part Of The Academy, Stefan Cronholm, Hannes GöBel, Mikael Lind, Daniel Rudmark

Stefan Cronholm

Information systems as an artefact-oriented discipline require a strong interaction between researches, developers and users regarding, design of, development of, and the study of the use of digital artefacts in social settings. During latter years performing research in a design science research spirit has gained increasing interest. In larger scale design research endeavours access to systems development capabilities becomes necessary. Such a unit, an InnovationLab, was established in 2006 in a university setting in Sweden. In this paper we are investigating the five years of experience from running this InnovationLab. Our findings point to an innovation lab being valuable for ...


Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout 2017 Brigham Young University

Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout

Marriott Student Review

This article attempts to inform the audience of the importance of market analysis in management consulting. The article states that consulting firms can utilize the power of market analysis as they commit to understand technology, collaborate with researchers to conduct action research, and align market strategies within the consulting firm. This article concludes that by doing these steps consulting firms will lead in their market.


Interfirm Strategic Information Flows In Logistics Supply Chain Relationships, Richard Klein, Arun Rai 2017 Clemson University

Interfirm Strategic Information Flows In Logistics Supply Chain Relationships, Richard Klein, Arun Rai

Richard Klein

This paper focuses on strategic information flows between buyers and suppliers within logistics supply chain relationships and on subsequent relationship-specific performance outcomes. Our analysis of dyadic data collected from 91 buyer–supplier logistics relationships finds that buyer and supplier strategic information flows positively impact the relationship-specific performance of both sharing and receiving parties. Specifically, each party gains financially from improved management of assets, reduced costs of operations, and enhanced productivity. Moreover, each benefits operationally from improved planning, control, and flexibility of resources. Buyer dependence on the supplier increases buyer strategic information flows to the supplier. Additionally, buyer IT customization and ...


Digital Commons powered by bepress