Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3821 Full-Text Articles 4119 Authors 816979 Downloads 117 Institutions

All Articles in Management Information Systems

Faceted Search

3821 full-text articles. Page 3 of 123.

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz 2017 University of North Georgia

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit ...


Security Device Roles, Vabrice Wilder 2017 Kennesaw State University

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls ...


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins 2017 Eastern Michigan University

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang 2017 University of Tennessee at Chattanooga

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities in ...


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul III, Alberto Coustasse 2017 Marshall University

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business ...


Adapting Agile In Regulated (Pharmaceutical) Environment, Prachiben K. Shah 2017 Harrisburg University of Science and Technology

Adapting Agile In Regulated (Pharmaceutical) Environment, Prachiben K. Shah

Dissertations and Theses

Pharmaceutical software industries practice traditional approach for years, and when it comes to a change they are struggling to adapt new software methodologies such as agile; which is most commonly used by IT industries. The most significant factor required for successful agile adaptation is to make sure new practices should be aligned with the pharmaceutical regulations and the process should be validated and properly documented as per the guidelines. Apart from this, there are few challenges that Pharmaceutical companies are facing to adopt new changes. Those challenges mentioned in various research articles are highlighted in this research paper. This research ...


The Use Of Effective Risk Management In Cloud Computing Projects, Usha Kiran Marichetty 2017 Harrisburg University of Science and Technology

The Use Of Effective Risk Management In Cloud Computing Projects, Usha Kiran Marichetty

Dissertations and Theses

Project management is one of the most important procedures that promote delivery of services. Examples of such projects include cloud computing projects. Despite the potential benefits associated with cloud computing projects, there are a number of security risks that when not properly managed, can always lead into the organization suffering major loses. In the adoption of cloud computing systems, project managers should have secure and well-configured platforms to reduce and control risks associated with cloud computing systems. There is a need for adopting the best risk management tools, techniques, and operations to achieve the desired results in the process of ...


Applying Agile Lean To Global Software Development, Piyansh Gupta 2017 Harrisburg University of Science and Technology

Applying Agile Lean To Global Software Development, Piyansh Gupta

Dissertations and Theses

Although challenges of Global Software Development (GSD) are well known in the industry, practitioners and the organizations look for ways to improve results and overcome challenges. Companies have tried to implement many workable solutions possible to solve issues like poor communication, lack of trust, low morale and many other such issues prevalent in the distributed setting. With the success of agile, the methodology gained interest in leveraging its benefits to alleviate some of these challenges. Similarly, lean was also implemented in distributed software development to resolve issues. While each methodology provided some improvement in the results achieved in global software ...


Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the Fall 2017 Cohort from the Master of Science in Logistics and Supply Chain Management Program.


Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the 2017 Cohort from the Master of Information Systems Program.


Automation And The Accounting Profession, Clarence GOH, Poh Sun SEOW, Gary PAN 2017 Singapore Management University

Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Automation poses a threat to many of the tasks that are performed by accountants today. Certainly, many emerging technologies have already begun to perform tasks that have traditionally been performed by accountants. For example, advancements in cloud-based accounting software now make it much easier for small businesses to easily and accurately enter and edit financial information on their own without the input of accountants. Looking further into the horizon, newer technologies can now turn hard-copy receipts into a machine-readable format, encrypt them,and allocate them to an account without any input from a human. Such developments will continue to reduce ...


The Information Content Of Sudden Insider Silence, Claire Yurong HONG, Frank Weikai LI 2017 Singapore Management University

The Information Content Of Sudden Insider Silence, Claire Yurong Hong, Frank Weikai Li

Research Collection Lee Kong Chian School Of Business

We present evidence of investors underreacting to the absence of events in financialmarkets. Routine-based insiders strategically choose to be silent when they possessprivate information not yet reflected in stock prices. Consistent with our hypothesis,insider silence following routine sell (buy) predict positive (negative) future return aswell as fundamentals. The return predictability of insider silence is stronger amongfirms with poor information environment and facing higher arbitrage costs, and alarge fraction of abnormal returns concentrates on future earnings announcements. Along-short strategy that exploits insiders’ strategic silence behavior generates abnormalreturns of 6% to 10% annually


Inside Brokers, Frank Weikai LI, Abhiroop MUKHERJEE, Rik SEN 2017 Singapore Management University

Inside Brokers, Frank Weikai Li, Abhiroop Mukherjee, Rik Sen

Research Collection Lee Kong Chian School Of Business

We identify the broker each corporate insider trades through, and show that analystsand mutual fund managers affiliated with such “inside brokers” retain a substantialinformation advantage on the insider’s firm, even after these trades are disclosed.Affiliated analysts issue 10–20% more accurate earnings forecasts, and affiliated fundstrade the insider’s stock much more profitably than their peers, following insider tradesthrough their brokerage. Our results challenge the prevalent perception that informationasymmetry arising from insider trading is acute only before trade disclosure, andsuggest that brokers facilitating these trades are in a unique position to exploit suchan asymmetry.


Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai LI, Chengzhu SUN 2017 Singapore Management University

Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai Li, Chengzhu Sun

Research Collection Lee Kong Chian School Of Business

This paper examines expected return information embedded in investors' information acquisition activity. Using a novel dataset containing investors' access of company filings through SEC's EDGAR system, we reverse engineer their expectations over future payoffs and show that the abnormal number of IPs searching for firms' financial statements strongly predict future returns. The return predictability stems from investors allocating more effort to firms with improving fundamentals and following exogeneous shock to underpricing. A long-short portfolio based on our measure of information acquisition activity generate monthly abnormal return of 80 basis points and does not reverse over the long-run.. In addition ...


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro 2017 University of Dar Es Salaam

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against ...


An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina 2017 University of KwaZulu-Natal, South Africa

An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina

The African Journal of Information Systems

The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus ...


Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A seventeen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Return Predictability And The Real Option Value Of Segments, Pingui RAO, Heng YUE, Xin ZHOU 2017 Singapore Management University

Return Predictability And The Real Option Value Of Segments, Pingui Rao, Heng Yue, Xin Zhou

Research Collection School Of Accountancy

Theory suggests that firm value should include the value of real options; that is, firms have the option to expand more profitable businesses and liquidate less profitable businesses. In a diversified firm, each segment has its own real options. Applying real options theory to a diversified firm at the firm level neglects the value of segment-level options. If investors overlook segment-level options, mispricing will occur. Using data from 1981 to 2013, we find that a hedge portfolio buying diversified firms in the highest decile of the estimated real option value of segments (RVS) and selling those in the lowest RVS ...


Pilot, Pivot, And Pitch: Applying A Rapid Value Realization Approach To Designing Digital Solutions At Johnson & Johnson, Patricia J. Guinan, Salvatore Parise 2017 Babson College

Pilot, Pivot, And Pitch: Applying A Rapid Value Realization Approach To Designing Digital Solutions At Johnson & Johnson, Patricia J. Guinan, Salvatore Parise

Technology, Operations & Information Management Working Papers

No abstract provided.


The Need For Systems Development Capability In Design Science Research – Investigating The Role Of An Innovation Lab As Part Of The Academy, Stefan Cronholm, Hannes Göbel, Mikael Lind, Daniel Rudmark 2017 University of Borås

The Need For Systems Development Capability In Design Science Research – Investigating The Role Of An Innovation Lab As Part Of The Academy, Stefan Cronholm, Hannes GöBel, Mikael Lind, Daniel Rudmark

Stefan Cronholm

Information systems as an artefact-oriented discipline require a strong interaction between researches, developers and users regarding, design of, development of, and the study of the use of digital artefacts in social settings. During latter years performing research in a design science research spirit has gained increasing interest. In larger scale design research endeavours access to systems development capabilities becomes necessary. Such a unit, an InnovationLab, was established in 2006 in a university setting in Sweden. In this paper we are investigating the five years of experience from running this InnovationLab. Our findings point to an innovation lab being valuable for ...


Digital Commons powered by bepress