Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3552 Full-Text Articles 3912 Authors 730365 Downloads 112 Institutions

All Articles in Management Information Systems

Faceted Search

3552 full-text articles. Page 6 of 113.

A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas 2017 Virginia Commonwealth University

A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas

Theses and Dissertations

A review of the research related to Information Technology (IT) governance reveals that researchers have yet to use systems theory directly as a basis for understanding IT governance; however, analysis of these researchers’ various definitions of IT governance shows a concurrence between these definitions and the characteristics of a system. This case study research adopts a systems imagination to observe IS and IT governance in the Virginia Department of Transportation (VDOT), which has a budget of over $5 billion and over 7,500 employees and has recently conducted a strategic assessment of its IT organization - including IS and IT governance ...


Arctic Research Collaborations Among Agencies: A Case Study Analysis Of Factors Leading To Success Within The Interagency Arctic Research Policy Committee, Meredith Clare LaValley 2017 Bard College

Arctic Research Collaborations Among Agencies: A Case Study Analysis Of Factors Leading To Success Within The Interagency Arctic Research Policy Committee, Meredith Clare Lavalley

Bard Center for Environmental Policy

The Arctic is changing rapidly as average temperatures rise. As an Arctic nation, the United States is directly affected by these changes. It is imperative that these changes be understood to make effective policy decisions. Since the research needs of the Arctic are large; 14 Federal agencies have Arctic research programs. As a result, the government regularly works to coordinate Federal Arctic research in order to reduce duplication of effort and costs, and to enhance the research’s system perspective. The government’s Interagency Arctic Research Policy Committee accomplishes this coordination through its Five-year Arctic Research Plans and Collaboration Teams ...


Blown To Bits Project, David Schmidt Ph.D. 2017 Fort Hays State University

Blown To Bits Project, David Schmidt Ph.D.

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many ...


Stigmas That Exist Regarding Technology, Lyndsey Nicole Bowers 2017 Liberty University

Stigmas That Exist Regarding Technology, Lyndsey Nicole Bowers

Senior Honors Theses

In looking at technology and how technology affects an individual, research indicates that a number of stereotypes exist about the people that most frequently use technology. A large portion of these stigmas involve the personality or gender of those that work with or use technology. The research that indicates that these stereotypes exist within the field of Information Technology (IT) but does not expand to look at the general population and their use of technology. More specifically, the research has not focused on the individuals who are simply interested in information technology and who are talented in working with technology ...


Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun SEOW, PAN, Gary 2017 Singapore Management University

Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Pan, Gary

Research Collection School Of Accountancy

Online learning has been gaining widespread adoption due to its success in enhancing student-learning outcomes and improving student academic performance. This paper describes an online tutorial to teach resource-event-agent (REA) data modeling in an undergraduate accounting information systems course. The REA online tutorial reflects a self-study application designed to help students improve their understanding of the REA data model. As such, the tutorial acts as a supplement to lectures by reinforcing the concepts and incorporating practices to assess student understanding. Instructors can access the REA online tutorial at http://smu.sg/rea. An independent survey by the University's Centre ...


Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker 2017 Updated - AIS

Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 1, 2017


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 2017 College of Business, University of Louisville, KY, USA

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual ...


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman 2017 Kingsborough Community College

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change ...


It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan 2017 Robert Gordon University

It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan

Journal of International Technology and Information Management

TThe purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the nature of tools employed, measurement processes, and the implementation methodology, using case studies. Analysis of the available academic and non-academic literature sources showed measurement issues being the most dominant and ironically the most neglected domain in ITG implementations. We view ITG measurement tools and it subsequent deployment through the two theoretical ITG models namely the Integrated IT Governance model, and the Structures, Processes ...


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran 2017 CSU-Bakersfield

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and ...


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr 2017 Emmanuel Uzoma Opara

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend ...


Exploring ‘People’ As The Key Element In Enterprise Architecture Implementation: A Critical Realist Perspective, Edi Triono Nuryatno 2017 Edith Cowan University

Exploring ‘People’ As The Key Element In Enterprise Architecture Implementation: A Critical Realist Perspective, Edi Triono Nuryatno

Theses: Doctorates and Masters

TOGAF (2009) describes the purpose of Enterprise Architecture (EA) is to optimise enterprisewide systems - the often-fragmented legacy of data processes (both manual and automated) - into an integrated environment that is responsive to change and supports the delivery of the business strategy (The Open Group Architecture Framework [TOGAF], 2009). However, for a number of reasons organisations still have difficulties establishing an effective EA (Raadt & Vliet, 2008; Gartner, 2009; and Janssen & Klievink, 2012, among others) and various reports suggest up to two thirds of implementations do not fulfil expectations (Roeleven, 2010). Being organisation wide with a strong governance element EA has significant social implications and social dependence, yet many implementations wrongly treat EA as solely a technical program. This thesis argues that the lack of focus on the ‘people’ element of EA could be the reason why many organisations still struggle with EA implementation. Recognising the importance of people in EA implementation requires acceptance of implementation as a social program, heavily influenced by the structural and cultural systems surrounding the architecture.

In order to address the need for greater recognition of the role of people and the social aspects of EA implementation, this thesis adopts critical realism (CR) and its most recognised methodology, the morphogenetic approach (MA). Realism emphasises ontology and strongly argues that ontology, methodology and epistemology are closely linked – as Fleetwood (2005, p. 197) suggests, ontology matters: “The way we think the world is (ontology) influences: what we think can be known about it (epistemology); how we think it can be investigated (methodology and research techniques); the kinds of theories we think can be constructed about it; and the political and policy stances we are prepared to take ...


Analytics, Innovation, And Organizational Adaptation, Gerard GEORGE, Yimin LIN 2017 Singapore Management University

Analytics, Innovation, And Organizational Adaptation, Gerard George, Yimin Lin

Research Collection Lee Kong Chian School Of Business

With the advent of big data, organizations are integrating powerful computing tools into their organizational processes to drive efficiencies and improve service delivery. Yet, at the heart of this conversation lies the role of analytics and big data in innovation within and across organizations. In this article, we provide a stylistic model of the role of analytics in innovation and call for further research on the underlying processes, contingencies, and outcomes.


Open Source Intelligence: Performing Data Mining And Link Analysis To Track Terrorist Activities, Maurice Dawson, Max Lieble, Adewale Adeboje 2016 University of Missouri - St Louis

Open Source Intelligence: Performing Data Mining And Link Analysis To Track Terrorist Activities, Maurice Dawson, Max Lieble, Adewale Adeboje

Maurice Dawson

The increasing rates of terrorism in Africa is a growing concern globally, and the realization of such dreadful circumstances demonstrates the need to disclose who is behind such terrible acts. Terrorists and extremist organizations have been known to use social media, and other forms of Internet-enabled technologies to spread idealism. Analyzing this data could provide valuable information regarding terrorist activity with the use of Open Source Intelligence (OSINT) tools. This study attempts to review the applications and methods that could be used to expose extremist Internet behavior.


Cyber Security Policies For Hyperconnectivity And Internet Of Things: A Process For Managing Connectivity, Maurice Dawson 2016 University of Missouri - St Louis

Cyber Security Policies For Hyperconnectivity And Internet Of Things: A Process For Managing Connectivity, Maurice Dawson

Maurice Dawson

Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in automotive, industrial, consumer, and networking. This slow adoption of proper security controls, defenses, and aggressive measures is leaving individuals vulnerable. This submission explores how policies can be created that automate the process of device connectivity, and how current frameworks can be used to minimize system risks.


Cyber Security Architectural Needs In The Era Of Internet Of Things And Hyperconnected Systems, Maurice Dawson 2016 University of Missouri - St Louis

Cyber Security Architectural Needs In The Era Of Internet Of Things And Hyperconnected Systems, Maurice Dawson

Maurice Dawson

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated ...


Cybersecurity And Development, Nir Kshetri 2016 University of North Carolina at Greensboro

Cybersecurity And Development, Nir Kshetri

Markets, Globalization & Development Review

While scholars and policymakers have realized the importance of information and communication technologies in economic development, relatively less attention has been given to the role of cybersecurity. This research sheds light on issues associated with the "dark side" of digitization in the Global South. We examine the hollowness in the Global South’s digitization initiatives that is associated with a poor cybersecurity. The article also advances our understanding of how institutional and structural characteristics of the Global South influence cybersecurity.


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia 2016 University of North Georgia

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 ...


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia III, Xavier P. Francia, Anthony M. Pruitt 2016 Jacksonville State University

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into ...


Digital Commons powered by bepress