Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3607 Full-Text Articles 3984 Authors 783393 Downloads 116 Institutions

All Articles in Management Information Systems

Faceted Search

3607 full-text articles. Page 3 of 116.

Not Merely A Matter Of Drawing Arrows: The Empirical Consequences Of Measurement Model Specification And Recommendations For Practice, Elisa K. Chan, Michael C. Sturman, Sanghee Park, Chelsea Vanderpool 2017 Ecole hôtelière de Lausanne

Not Merely A Matter Of Drawing Arrows: The Empirical Consequences Of Measurement Model Specification And Recommendations For Practice, Elisa K. Chan, Michael C. Sturman, Sanghee Park, Chelsea Vanderpool

Michael C. Sturman

Understanding measurement model specification is especially important for hospitality research due to its cross-disciplinary nature and the prevalence of measures used in the field which are often central to the formative versus reflective debate (e.g., SERVQUAL, socioeconomic status). The current study contributes to this topic by providing empirically based prescriptive advice to drive better measurement model specification. Specifically, the decision-making procedures developed by this study can complement theoretical reasons for a model choice as well as help determine a correct model choice when theories are equivocal or non-existent. This study combines actual and simulated data to show that model ...


Marketing Strategy Of School Of Professional Studies In China, Jiahui Liu, Jing Wang, Shuo An, Wengxing Wang, Yiwei Wang 2017 Clark University

Marketing Strategy Of School Of Professional Studies In China, Jiahui Liu, Jing Wang, Shuo An, Wengxing Wang, Yiwei Wang

School of Professional Studies

Chinese students are the most visible international presence at many universities across the United States, and the number continues to grow. Since 2010, The number of graduate students studying abroad has entered the period in which the increase has been declining. Under the circumstance of the weak global economy and high cost of education, the administration needs to attract the attention of Chinese students. In the process of competing for applicants, how to develop marketing strategies to attract students’ eyeballs has become an important means of trying to increase school income through Chinese students. The marketing strategy mentioned in this ...


Understanding The Information-Based Transformation Of Strategy And Society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, Thomas A. WEBER 2017 Singapore Management University

Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman, Thomas A. Weber

Research Collection School Of Information Systems

The world economy is undergoing dramatic changes, largely driven by the new availability of fine-grained information. Innovative ways of using data—large and small—have also prompted a rethinking of the boundaries for the combination and use of knowledge. The strategic design of information flows in the economy has the upside of higher economic rents and competitive advantage, as well as the downsides of wealth inequality and abuse of power. This has brought a wide range of regulatory challenges. To understand the nature of these sweeping changes, it is important to examine the new ways information is used, and how ...


Not Merely A Matter Of Drawing Arrows: The Empirical Consequences Of Measurement Model Specification And Recommendations For Practice, Elisa K. Chan, Michael C. Sturman, Sanghee Park, Chelsea Vanderpool 2017 Ecole hôtelière de Lausanne

Not Merely A Matter Of Drawing Arrows: The Empirical Consequences Of Measurement Model Specification And Recommendations For Practice, Elisa K. Chan, Michael C. Sturman, Sanghee Park, Chelsea Vanderpool

Articles and Chapters

Understanding measurement model specification is especially important for hospitality research due to its cross-disciplinary nature and the prevalence of measures used in the field which are often central to the formative versus reflective debate (e.g., SERVQUAL, socioeconomic status). The current study contributes to this topic by providing empirically based prescriptive advice to drive better measurement model specification. Specifically, the decision-making procedures developed by this study can complement theoretical reasons for a model choice as well as help determine a correct model choice when theories are equivocal or non-existent. This study combines actual and simulated data to show that model ...


Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson 2017 University of Missouri - St Louis

Hyper-Connectivity: Intricacies Of National And International Cyber Securities (Part 1), Maurice Dawson

Maurice Dawson

This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets; 1. Security Solutions for Hyperconnectivity and the Internet of Things, 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 4. International Journal of Business Continuity and Risk Management, 5. Handbook of ...


Leadership In Information Technology: Leadership Theories, Perspectives And Ethical Dilemmas, Douglas B. Malcolm 2017 Kennesaw State University

Leadership In Information Technology: Leadership Theories, Perspectives And Ethical Dilemmas, Douglas B. Malcolm

The Siegel Institute Journal of Applied Ethics

This paper will describe various leadership theories and how they were formed, current leadership perspectives for information technology (IT) and the impact they can have on an IT workforce due to negative impressions and conditions. It will then relate current ethical issues faced by Information Technology to the key driving forces behind IT today along with detailing the current ethical issues faced by IT Leadership. Finally it will recommend some future research to help IT Leadership navigate the ethical and leadership issues faced today and to prepare for the future issues that will appear as technology advances.


The Analysis Of Antecedents Of Customer Loyalty In The Australian Mobile Telecommunication Market, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan 2017 RMIT University

The Analysis Of Antecedents Of Customer Loyalty In The Australian Mobile Telecommunication Market, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan

Siddhi Pittayachawan

Marketing mix factors such as price product value, facilitating conditions, and social influence; and factors such as customer satisfaction, customer experience, habit, hedonic motivation, performance expectancy, effort expectancy are the major antecedents of customer loyalty. As, loyal customers may buy more services and have a positive word-of-mouth effect. Moreover, it is evident from previous literature that the cost of selling service to new customers is much higher than the cost of retaining existing customers. Furthermore, it is evident fact from telecommunication industry ombudsman Australia reports that companies are still losing customers at a formidable rate. In this context, the main ...


Towards The Investigation Of The Effect Of Customer Satisfaction And Customer Experience On Behavioural Intention In Mobile Telecommunication Services In Australia, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan 2017 RMIT University

Towards The Investigation Of The Effect Of Customer Satisfaction And Customer Experience On Behavioural Intention In Mobile Telecommunication Services In Australia, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan

Siddhi Pittayachawan

Mobile services become more pervasive and complex, customer experience is becoming a key competitive differentiator. Given that intense rivalry in the mobile telecommunication service industry, customer experience and customer satisfaction have become a vital concern for the mobile service providers. However, determinants of behavioural intention such as customer experience and customer satisfaction are overlooked in many studies. Extensive literature review indicated that the nine factors influencing behavioural intention and repurchase behaviour are: the facilitating conditions, effort expectancy, performance expectancy, social influence, customer satisfaction and customer experience. Therefore, this paper examines key antecedents effect on behavioural intention. An online survey has ...


Impact Of Erp Implementation On The Quality Of Work Life Of Users: A Sub-Saharan African Study, Liam Bailey, Lisa F. Seymour, Jean-Paul Van Belle 2017 University of Cape Town

Impact Of Erp Implementation On The Quality Of Work Life Of Users: A Sub-Saharan African Study, Liam Bailey, Lisa F. Seymour, Jean-Paul Van Belle

The African Journal of Information Systems

ERP implementations have a disruptive impact on users and in sub-Saharan African (SSA) countries are more problematic than in developed countries. Extant ERP literature has not focused on the impact of implementations on users work life. Therefore this research aimed to confirm this impact on SSA users’ work life. A theoretical framework and survey was developed from Dooyeweerd’s “Down-To-Earth” aspects and the Easton and Van Laar Work-Related Quality of Life scale. Responses from users from 7 countries working for one case organisation were analysed. The significant effect of an ERP implementation on work life quality was confirmed. Cultural differences ...


A Student Perspective Into Information Quality Of Web Sites, Pat Mavetera, Sam Lubbe, Jan A. Meyer PhD (Pr.M) 2017 North West University (Mafikeng Campus)

A Student Perspective Into Information Quality Of Web Sites, Pat Mavetera, Sam Lubbe, Jan A. Meyer Phd (Pr.M)

The African Journal of Information Systems

As organisations have become aware of the strategic importance of web sites, the trend to use web sites for various purposes has increased in domains such as education, health, government and business. However, organisations seeking to obtain benefits from their web sites need to create and maintain web sites that are supporting the interaction and communication of the organisation with their users. The purpose of the study was to investigate the information quality of a web site. A set of information quality indicators, including accuracy, timelines, easy understanding, organisation, consistent representation and easy navigation, were divided into four categories and ...


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo MO, Jian-feng MA, Ximeng LIU, Qi LI 2017 Singapore Management University

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR ...


Quality, Pricing, And Release Time: Optimal Market Entry Strategy For New Software-As-A-Service Vendors, Haihang Feng, Zhengrui Jiang, Dengpan Liu 2017 Tianjin University

Quality, Pricing, And Release Time: Optimal Market Entry Strategy For New Software-As-A-Service Vendors, Haihang Feng, Zhengrui Jiang, Dengpan Liu

Supply Chain and Information Systems Publications

As a new software licensing model, software-as-a-service (SaaS) is gaining tremendous popularity across the globe. In this study, we investigate the competition between a new entrant and an incumbent in a SaaS market, and derive the optimal market entry strategy for the new entrant. One interesting finding is that, when its product quality is significantly lower than that of the incumbent, the new entrant should adopt an instant-release strategy, i.e., releasing its product at the start of the planning horizon. If the initial quality gap of the two products is small, the new entrant is better off adopting a ...


Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala 2017 University of Hawaii at Manoa

Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala

Atlantic Marketing Journal

In this research, an online experiment was conducted to investigate the effect of the mere presence of digital third-party organization (TPO) endorsement and the quality of information conveyed by a digital TPO, referred to as the endorsement information value effect. Involvement and institution-based trust were tested as moderators of the endorsement information value effect. The results confirm the intuitive belief of managers that the mere presence of a digital TPO endorsement benefits websites by reducing risk perceptions, improving attitudes and increasing choice likelihood. The findings from this research revealed that effectiveness of digital TPO endorsement information value was contingent upon ...


How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore 2017 University of Michigan-Flint

How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore

Journal of Cybersecurity Education, Research and Practice

Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important ...


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis 2017 University of Washington Bothell

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure ...


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia III, Greg Randall, Jay Snellen 2017 Jacksonville State University

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the ...


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord 2017 Kennesaw State University

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the third issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston, Ryan Fortenberry 2017 Georgia Southern University

High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston, Ryan Fortenberry

Russell F. Thackston

The commercial cloud computing (CCC) industry has reached a level of maturity to make it a truly viable alternative to the traditional, in-house data center. Although there are many notable examples of CCC platforms and technologies being piloted for high performance computing (HPC) tasks, it has yet to enter the mainstream. A variety of obstacles exist which have slowed or hindered adoption of CCC platforms, including implementation complexity, cost confusion, and security concerns. This paper describes the author’s experiences in using CCC for various HPC tasks and compares the results to the same tasks being executed on in-house computing ...


A Study Of The Factors That Influence Consumer Attitudes Towards Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan 2017 Iowa State University

A Study Of The Factors That Influence Consumer Attitudes Towards Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan

Steven M. Lonergan

Beef producers looking for a competitive edge in today's markets need information about the qualities that consumers consider most important. Using conjoint marketing analysis allowed the investigators to sort out the most relevant characteristics for meat purchasers.


A Study Of The Factors That Influence Consumer Attitudes Toward Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan 2017 Iowa State University

A Study Of The Factors That Influence Consumer Attitudes Toward Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan

Steven M. Lonergan

This study utilizes an analysis technique commonly used in marketing, the conjoint method, to examine the relative utilities of a set of beef steak characteristics considered by a national sample of 1,432 U.S. consumers, as well as additional localized samples representing undergraduate students at a business college and in an animal science department. The analyses indicate that among all respondents, region of origin is by far the most important characteristic; this is followed by animal breed, traceability, the animal feed used, and beef quality. Alternatively, the cost of cut, farm ownership, the non-use of growth promoters, and whether ...


Digital Commons powered by bepress