Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,204 Full-Text Articles 3,681 Authors 816,979 Downloads 123 Institutions

All Articles in Management Information Systems

Faceted Search

3,204 full-text articles. Page 6 of 99.

The Use Of Effective Risk Management In Cloud Computing Projects, Usha Kiran Marichetty 2017 Harrisburg University of Science and Technology

The Use Of Effective Risk Management In Cloud Computing Projects, Usha Kiran Marichetty

Dissertations and Theses

Project management is one of the most important procedures that promote delivery of services. Examples of such projects include cloud computing projects. Despite the potential benefits associated with cloud computing projects, there are a number of security risks that when not properly managed, can always lead into the organization suffering major loses. In the adoption of cloud computing systems, project managers should have secure and well-configured platforms to reduce and control risks associated with cloud computing systems. There is a need for adopting the best risk management tools, techniques, and operations to achieve the desired results in the process of ...


Applying Agile Lean To Global Software Development, Piyansh Gupta 2017 Harrisburg University of Science and Technology

Applying Agile Lean To Global Software Development, Piyansh Gupta

Dissertations and Theses

Although challenges of Global Software Development (GSD) are well known in the industry, practitioners and the organizations look for ways to improve results and overcome challenges. Companies have tried to implement many workable solutions possible to solve issues like poor communication, lack of trust, low morale and many other such issues prevalent in the distributed setting. With the success of agile, the methodology gained interest in leveraging its benefits to alleviate some of these challenges. Similarly, lean was also implemented in distributed software development to resolve issues. While each methodology provided some improvement in the results achieved in global software ...


Adapting Agile In Regulated (Pharmaceutical) Environment, Prachiben K. Shah 2017 Harrisburg University of Science and Technology

Adapting Agile In Regulated (Pharmaceutical) Environment, Prachiben K. Shah

Dissertations and Theses

Pharmaceutical software industries practice traditional approach for years, and when it comes to a change they are struggling to adapt new software methodologies such as agile; which is most commonly used by IT industries. The most significant factor required for successful agile adaptation is to make sure new practices should be aligned with the pharmaceutical regulations and the process should be validated and properly documented as per the guidelines. Apart from this, there are few challenges that Pharmaceutical companies are facing to adopt new changes. Those challenges mentioned in various research articles are highlighted in this research paper. This research ...


Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai LI, Chengzhu SUN 2017 Singapore Management University

Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai Li, Chengzhu Sun

Research Collection Lee Kong Chian School Of Business

This paper examines expected return information embedded in investors' information acquisition activity. Using a novel dataset containing investors' access of company filings through SEC's EDGAR system, we reverse engineer their expectations over future payoffs and show that the abnormal number of IPs searching for firms' financial statements strongly predict future returns. The return predictability stems from investors allocating more effort to firms with improving fundamentals and following exogeneous shock to underpricing. A long-short portfolio based on our measure of information acquisition activity generate monthly abnormal return of 80 basis points and does not reverse over the long-run.. In addition ...


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul III, Alberto Coustasse 2017 Marshall University

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business ...


Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the 2017 Cohort from the Master of Information Systems Program.


Inside Brokers, Frank Weikai LI, Abhiroop MUKHERJEE, Rik SEN 2017 Singapore Management University

Inside Brokers, Frank Weikai Li, Abhiroop Mukherjee, Rik Sen

Research Collection Lee Kong Chian School Of Business

We identify the broker each corporate insider trades through, and show that analystsand mutual fund managers affiliated with such “inside brokers” retain a substantialinformation advantage on the insider’s firm, even after these trades are disclosed.Affiliated analysts issue 10–20% more accurate earnings forecasts, and affiliated fundstrade the insider’s stock much more profitably than their peers, following insider tradesthrough their brokerage. Our results challenge the prevalent perception that informationasymmetry arising from insider trading is acute only before trade disclosure, andsuggest that brokers facilitating these trades are in a unique position to exploit suchan asymmetry.


Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the Fall 2017 Cohort from the Master of Science in Logistics and Supply Chain Management Program.


Table Of Contents Jitim Vol 26 Issue 3, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


The Information Content Of Sudden Insider Silence, Claire Yurong HONG, Frank Weikai LI 2017 Singapore Management University

The Information Content Of Sudden Insider Silence, Claire Yurong Hong, Frank Weikai Li

Research Collection Lee Kong Chian School Of Business

We present evidence of investors underreacting to the absence of events in financialmarkets. Routine-based insiders strategically choose to be silent when they possessprivate information not yet reflected in stock prices. Consistent with our hypothesis,insider silence following routine sell (buy) predict positive (negative) future return aswell as fundamentals. The return predictability of insider silence is stronger amongfirms with poor information environment and facing higher arbitrage costs, and alarge fraction of abnormal returns concentrates on future earnings announcements. Along-short strategy that exploits insiders’ strategic silence behavior generates abnormalreturns of 6% to 10% annually


Automation And The Accounting Profession, Clarence GOH, Poh Sun SEOW, Gary PAN 2017 Singapore Management University

Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Automation poses a threat to many of the tasks that are performed by accountants today. Certainly, many emerging technologies have already begun to perform tasks that have traditionally been performed by accountants. For example, advancements in cloud-based accounting software now make it much easier for small businesses to easily and accurately enter and edit financial information on their own without the input of accountants. Looking further into the horizon, newer technologies can now turn hard-copy receipts into a machine-readable format, encrypt them,and allocate them to an account without any input from a human. Such developments will continue to reduce ...


Patient Experience Informs Health Care Strategies In Irish Hospitals, Heba Habib 2017 Dublin Institute of Technology

Patient Experience Informs Health Care Strategies In Irish Hospitals, Heba Habib

Doctoral

Patients are central to health care facilities and institutions; therefore, a dire need arises to include feedback of their experience in the decision-making process. Patient experience is increasingly recognised as one of the three pillars of quality in healthcare alongside clinical effectiveness and patient safety. A comprehensive literature review (more than 2500 peer-reviewed articles) has identified five key frameworks for patient experience including: UK Picker Institute Principles and US H-CAHPS. The frameworks have enabled the identification of a potential range of patient experience dimensions and helped in grouping them into nine categories. However, there are still opportunities to address research ...


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David McCalman, Mark E. McMurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech 2017 University of Central Arkansas

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology ...


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. 2017 IFHE University, IBS Hyderabad

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In ...


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro 2017 University of Dar Es Salaam

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against ...


An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina 2017 University of KwaZulu-Natal, South Africa

An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina

The African Journal of Information Systems

The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus ...


Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College of Business, Wright State University 2017 Wright State University

Isscm Newsletter, Volume 20, September 22, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A seventeen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Pilot, Pivot, And Pitch: Applying A Rapid Value Realization Approach To Designing Digital Solutions At Johnson & Johnson, Patricia J. Guinan, Salvatore Parise 2017 Babson College

Pilot, Pivot, And Pitch: Applying A Rapid Value Realization Approach To Designing Digital Solutions At Johnson & Johnson, Patricia J. Guinan, Salvatore Parise

Technology, Operations & Information Management Working Papers

No abstract provided.


Return Predictability And The Real Option Value Of Segments, Pingui RAO, Heng YUE, Xin ZHOU 2017 Singapore Management University

Return Predictability And The Real Option Value Of Segments, Pingui Rao, Heng Yue, Xin Zhou

Research Collection School Of Accountancy

Theory suggests that firm value should include the value of real options; that is, firms have the option to expand more profitable businesses and liquidate less profitable businesses. In a diversified firm, each segment has its own real options. Applying real options theory to a diversified firm at the firm level neglects the value of segment-level options. If investors overlook segment-level options, mispricing will occur. Using data from 1981 to 2013, we find that a hedge portfolio buying diversified firms in the highest decile of the estimated real option value of segments (RVS) and selling those in the lowest RVS ...


Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout 2017 Brigham Young University

Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout

Marriott Student Review

This article attempts to inform the audience of the importance of market analysis in management consulting. The article states that consulting firms can utilize the power of market analysis as they commit to understand technology, collaborate with researchers to conduct action research, and align market strategies within the consulting firm. This article concludes that by doing these steps consulting firms will lead in their market.


Digital Commons powered by bepress