Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,191 Full-Text Articles 3,613 Authors 816,979 Downloads 124 Institutions

All Articles in Management Information Systems

Faceted Search

3,191 full-text articles. Page 3 of 99.

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi 2018 Walden University

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows ...


Achieving Meaningful Use Of Electronic Health Records: Prospects For Blockchain In Ontario's Health Care System, Amitha Carrnadin 2018 University of Windsor

Achieving Meaningful Use Of Electronic Health Records: Prospects For Blockchain In Ontario's Health Care System, Amitha Carrnadin

Major Papers

Over the past decade, the Government of Ontario has devoted significant resources to the digitization of patient health records with the goal of improving data storage, management, transfers and, ultimately, patient care. Adoption rates for digitized records, known as electronic health records (EHR), and accompanying systems, has been high among health care providers in Ontario. Yet, research has demonstrated that a number of barriers appear to inhibit the effective use of EHRs among clinicians. These barriers can impede or delay meaningful use of EHRs and accordingly, limit their ability improve information exchanges, service delivery and patient care.

This paper reviews ...


Information Technology Use In West African Agriculture – Challenges And Opportunities: A Panel Discussion, Maurice Dawson, Damon Walker, Ashley Moss 2017 University of Missouri - St Louis

Information Technology Use In West African Agriculture – Challenges And Opportunities: A Panel Discussion, Maurice Dawson, Damon Walker, Ashley Moss

Maurice Dawson

Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they ...


International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson 2017 Roosevelt University

International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson

Maurice Dawson

Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in ...


Battlefield Cyberspace: Exploitation Of Hyperconnectivity And Internet Of Things, Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette 2017 Colorado Technical University

Battlefield Cyberspace: Exploitation Of Hyperconnectivity And Internet Of Things, Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette

Maurice Dawson

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current ...


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland 2017 Plymouth University, U.K.

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements ...


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell 2017 Arkansas Tech University

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a ...


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi 2017 University of Alabama, Birmingham

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer 2017 Nova Southeastern University

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2017 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou 2017 Brigham Young University

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou

Marriott Student Review

Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.


The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee 2017 University of South Africa

The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee

The African Journal of Information Systems

There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between ...


Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul OKEKE 2017 University of Wales Trinity Saint David (UWTSD)

Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke

The African Journal of Information Systems

This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current ...


Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, oludayo Olufolorunsho olugbara Prof, Alveens Singh Dr. 2017 Durban University of Technology

Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr.

The African Journal of Information Systems

This paper presents the findings of a study that uses the advanced impact analysis (ADVIAN®) method to derive critical success factors (CSFs) of enterprise resource planning implementation in higher education institution. Through analysis of CSFs, the paper contributes towards assisting higher education institution to reduce some of the plethora of challenges in this domain as highlighted in the literature. The ADVIAN® method classified 20 factors into categories of integration, criticality and stability as well as ranked them by measures of precarious, driving and driven. The results of the classification and ranking show 5 factors that are ideal for intervening activities ...


Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo 2017 University of Pretoria

Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo

The African Journal of Information Systems

The South African ICT industry is struggling with high turnover despite the relatively high remuneration packages it offers to its gender and racially diverse IT professionals. This study explored pay satisfaction levels and its relationship with job satisfaction, organizational commitment, and turnover intentions. Survey responses from 158 IT professionals were subjected to descriptive, correlation and regression analysis. The results show that, irrespective of gender or race, employees generally have low pay satisfaction, low organizational commitment, and only moderate job satisfaction levels. However, black ethnic groups did show a difference in their appraisals of pay satisfaction, expressing slightly lower pay satisfaction ...


Predicting And Improving Academic Success And Student Retention: An Action Research, Shu Schiller 2017 Wright State University - Main Campus

Predicting And Improving Academic Success And Student Retention: An Action Research, Shu Schiller

Shu Schiller

This participatory action research aims to demonstrate how information systems scholars, practitioners, and administrators of higher education collaborate to develop, implement, and evaluate effective predictive models and in turn create and adopt policies and procedures that improve student academic success and retention in a business college. This research takes a novel perspective by focusing on predicting student success and retention, informed by activity theory as the fundamental theoretical framework to understand the interactions among various stakeholders in the communities.


Implementing Geographic Information Systems In The College Of Business, Amanda Fishel 2017 Iowa State University

Implementing Geographic Information Systems In The College Of Business, Amanda Fishel

Honors Projects and Posters

"The purpose of this project is to design a week-long module for an introductory Management Information Systems class that teaches students about Geographic Information Systems (GIS). The module includes objectives for the students to learn, lesson plans with corresponding powerpoint slides, an in-class activity, and a homework assignment.

While researching GIS, I focused the lesson plans on answering what GIS is, why, how, and who uses GIS. GIS helps businesses to make better decisions using geography. The information from the lesson plans help students complete the in-class activity and homework assignment. Through the in-class activity and homework assignment, students gain ...


Is It Time For New Accounting Of R&D Costs?, Anne M. Clem, Cynthia G. Jeffrey 2017 Iowa State University

Is It Time For New Accounting Of R&D Costs?, Anne M. Clem, Cynthia G. Jeffrey

Cynthia Jeffrey

The mismatch between today's "high-tech economy" and the double-entry accounting system has raised serious questions about the quality of earnings. The Securities and Exchange Commission (SEC) has targeted overly aggressive earnings management, focusing on acquired in-process research and development (IPR&D). Some people are concerned that the SEC crackdown on IPR&D valuations has the potential to slow the pace of mergers and acquisitions significantly, hamper the formation of new companies, and decrease the value of a company's stock. Financial managers on either side of the debate will need a clear understanding of the issues when evaluating potential ...


How Decision Makers Learn To Choose Organizational Performance Measures, AnneMarie N. Hooge 2017 University of the Incarnate Word

How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge

Theses & Dissertations

This study, framed by decision making, program theory, and performance measurement theory, explored the knowledge and experience that enable decision makers to identify organizational performance measures. It used a mixed method, exploratory sequential research design to discover the experience, knowledge, and skills (EKS) senior decision makers felt were important in learning to choose organizational performance measures. From the analyzed interviews, a survey was designed to measure the importance of the EKS characteristics. Qualitative analysis identified 55 life, work, or educational experience; knowledge; or skill characteristics and 23 effective measure characteristics. Regression analysis and PCA were used to extract 6 components ...


Digital Commons powered by bepress