Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3552 Full-Text Articles 3912 Authors 730365 Downloads 112 Institutions

All Articles in Management Information Systems

Faceted Search

3552 full-text articles. Page 5 of 113.

Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian WU, Akshat KUMAR, Daniel SHELDON 2017 Singapore Management University

Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian Wu, Akshat Kumar, Daniel Sheldon

Research Collection School Of Information Systems

Stochastic network design is a general framework for optimizing network connectivity. It has several applications in computational sustainability including spatial conservation planning, pre-disaster network preparation, and river network optimization. A common assumption in previous work has been made that network parameters (e.g., probability of species colonization) are precisely known, which is unrealistic in real- world settings. We therefore address the robust river network design problem where the goal is to optimize river connectivity for fish movement by removing barriers. We assume that fish passability probabilities are known only imprecisely, but are within some interval bounds. We then develop a ...


Isscm Newsletter, Volume 16, January 31, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Volume 16, January 31, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A seven page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Innovative Collaboration At The Open Group Security Forum: Fruit From The Open Group Academic Program, Stephen M. Jerbic 2017 San Jose State University

Innovative Collaboration At The Open Group Security Forum: Fruit From The Open Group Academic Program, Stephen M. Jerbic

Stephen M. Jerbic

This presentation developed an economic cost-benefit analysis of information security and privacy policy regarding online connections of home dialysis machines. Two students John Linford and Sushmitha Kasturi contributed to his project that explored how prohibiting online connections between home dialysis machines and physicians in Norway on privacy and security grounds was likely not economically inefficient now but raises new questions about the value of telemedicine in general. Continuing to prohibit online connections between patient information systems and the health care system in Norway likely has significant cost-benefit consequences that need to be further researched.


Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta 2017 Cleveland State University

Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta

Lori Peterson

Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1 ...


The Impact Of Analyst-Induced Misinformation On The Requirements Elicitation Process, Radha Appan, Glenn J. Browne 2017 Cleveland State University

The Impact Of Analyst-Induced Misinformation On The Requirements Elicitation Process, Radha Appan, Glenn J. Browne

Radha Appan

Information requirements determination (IRD) is concerned with developing accurate requirements for a proposed system, primarily by eliciting information from users and other organizational stakeholders. In this paper we build and test theory concerning a significant threat to the accuracy of information requirements, termed the misinformation effect. Misinformation is distorted, false, or other erroneous or misleading information that does not reflect the true state of the world or state of mind of the person communicating the information. The misinformation effect refers to the tendency of people to recall misleading or false information introduced to them following an event instead of original ...


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick 2017 Cleveland State University

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Walter Rom

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the ...


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick 2017 Cleveland State University

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Susan Slotnick

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the ...


Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi 2017 Federal University of Technology, Akure

Conceptual Framework Of Community Based Location Specific Services For Improved Service Delivery, Folasade Dahunsi

The African Journal of Information Systems

Community Based Location Service (CBLS) is the provision of information about services based on the geographical location of subscriber’s mobile phone towards the development of the community they are in. With the increase in mobile phones penetration, citizens can participate actively in providing relevant information to assist in the provision of services and infrastructure in the country through their mobile devices. This paper proposes a framework that will improve services and provide better infrastructure to developing countries. It hinges on four major technologies: location-based information, crowdsourcing, mobile communication devices and volunteerism. This framework takes into consideration the importance of ...


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman 2017 Embry-Riddle Aeronautical University - Worldwide

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi Kappers

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two ...


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz 2017 Oklahoma State University

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater success? This ...


2017 Updated Tables And Charts For Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf 2017 UNL

2017 Updated Tables And Charts For Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf

Extension Farm and Ranch Management

No abstract provided.


2017 Updated Tables And Figures For Ec 844 Nebraska Wheat Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf 2017 UNL

2017 Updated Tables And Figures For Ec 844 Nebraska Wheat Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf

Extension Farm and Ranch Management

No abstract provided.


2017 Updated Tables And Figures For Ec 846 Nebraska Cash Corn Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf 2017 UNL

2017 Updated Tables And Figures For Ec 846 Nebraska Cash Corn Prices And Basis Patterns, Cory Walters, Jessica J. Groskopf

Extension Farm and Ranch Management

No abstract provided.


Department Of Information Systems & Supply Chain Management Annual Report, 2016-2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Department Of Information Systems & Supply Chain Management Annual Report, 2016-2017, Raj Soin College Of Business, Wright State University

ISSCM Annual Reports

A sixty-nine page 2016-2017 annual report from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


The Gojo Smartlink Observation System: Research For Adoption, Robert Cuenot, Austin Reich, Joseph Tuck, Sarah Dick, Sean Poholski 2017 The University of Akron

The Gojo Smartlink Observation System: Research For Adoption, Robert Cuenot, Austin Reich, Joseph Tuck, Sarah Dick, Sean Poholski

Honors Research Projects

This research project sought to provide GOJO Industries, Inc. with strategic recommendations for improving sales of their SMARTLINK Observation (OBV) hand hygiene compliance monitoring mobile application. The two required steps for building recommendations were to analyze the status of the hand hygiene compliance monitoring market (as of 2017) and gain insight on the needs of nurses, doctors, and other healthcare directors in hospitals and urgent care facilities. In conjunction with GOJO Industries, Inc., the viability of a subscription-based mobile application for monitoring was tested. Employees of several different healthcare facilities were interviewed about their current methods and practices for compliance ...


Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo 2017 Virginia Commonwealth University

Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo

Theses and Dissertations

The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals are characterized by their lack of formal affiliation with terror organizations, making them difficult to intercept with traditional intelligence techniques. The radicalization of individuals on the internet poses a considerable threat to law enforcement and national security officials. This new medium of radicalization, however, also ...


Modelling And Testing Consumer Trust Dimensions In E-Commerce, Tiago Oliveira, Matilde Alhinho, Paulo Rita, Gurpreet Dhillon 2017 Information Management School (NOVA IMS)

Modelling And Testing Consumer Trust Dimensions In E-Commerce, Tiago Oliveira, Matilde Alhinho, Paulo Rita, Gurpreet Dhillon

Information Systems Publications

Prior research has found trust to play a significant role in shaping purchase intentions of a consumer. However there has been limited research where consumer trust dimensions have been empirically defined and tested. In this paper we empirically test a path model such that Internet vendors would have adequate solutions to increase trust. The path model presented in this paper measures the three main dimensions of trust, i.e. competence, integrity, and benevolence. And assesses the influence of overall trust of consumers. The paper also analyses how various sources of trust, i.e. consumer characteristics, firm characteristic, website infrastructure and ...


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu 2017 Old Dominion University

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS ...


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Ed.D 2017 University of Nebraska - Lincoln

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Ed.D

CSE Journal Articles

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we ...


Assimilation Of Tracking Technology In The Supply Chain, Rahul Basole, Maciek Nowak 2017 Georgia Institute of Technology

Assimilation Of Tracking Technology In The Supply Chain, Rahul Basole, Maciek Nowak

Information Systems and Operations Management: Faculty Publications & Other Works

While tracking technology has become increasingly accessible, firms still struggle with deploying these technologies into the supply chain. Using the complementary perspectives of transaction cost and institutional theory, we develop an understanding of how supply network, product, and environmental characteristics jointly impact tracking technology assimilation. We empirically test our model on a global dataset of 535 supply chain executives and decision makers. The results suggest that assimilation is frequently initiated by an external stakeholder in a firm's supply chain and that firms must develop strong collaborative ties with their partners in order to take full advantage of this technology.


Digital Commons powered by bepress