Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,191 Full-Text Articles 3,613 Authors 816,979 Downloads 124 Institutions

All Articles in Management Information Systems

Faceted Search

3,191 full-text articles. Page 7 of 99.

The Analysis Of Antecedents Of Customer Loyalty In The Australian Mobile Telecommunication Market, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan 2017 RMIT University

The Analysis Of Antecedents Of Customer Loyalty In The Australian Mobile Telecommunication Market, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan

Siddhi Pittayachawan

Marketing mix factors such as price product value, facilitating conditions, and social influence; and factors such as customer satisfaction, customer experience, habit, hedonic motivation, performance expectancy, effort expectancy are the major antecedents of customer loyalty. As, loyal customers may buy more services and have a positive word-of-mouth effect. Moreover, it is evident from previous literature that the cost of selling service to new customers is much higher than the cost of retaining existing customers. Furthermore, it is evident fact from telecommunication industry ombudsman Australia reports that companies are still losing customers at a formidable rate. In this context, the main ...


Towards The Investigation Of The Effect Of Customer Satisfaction And Customer Experience On Behavioural Intention In Mobile Telecommunication Services In Australia, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan 2017 RMIT University

Towards The Investigation Of The Effect Of Customer Satisfaction And Customer Experience On Behavioural Intention In Mobile Telecommunication Services In Australia, Hassan Shakil Bhatti, Ahmad Abareshi, Siddhi Pittayachawan

Siddhi Pittayachawan

Mobile services become more pervasive and complex, customer experience is becoming a key competitive differentiator. Given that intense rivalry in the mobile telecommunication service industry, customer experience and customer satisfaction have become a vital concern for the mobile service providers. However, determinants of behavioural intention such as customer experience and customer satisfaction are overlooked in many studies. Extensive literature review indicated that the nine factors influencing behavioural intention and repurchase behaviour are: the facilitating conditions, effort expectancy, performance expectancy, social influence, customer satisfaction and customer experience. Therefore, this paper examines key antecedents effect on behavioural intention. An online survey has ...


Impact Of Erp Implementation On The Quality Of Work Life Of Users: A Sub-Saharan African Study, Liam Bailey, Lisa F. Seymour, Jean-Paul Van Belle 2017 University of Cape Town

Impact Of Erp Implementation On The Quality Of Work Life Of Users: A Sub-Saharan African Study, Liam Bailey, Lisa F. Seymour, Jean-Paul Van Belle

The African Journal of Information Systems

ERP implementations have a disruptive impact on users and in sub-Saharan African (SSA) countries are more problematic than in developed countries. Extant ERP literature has not focused on the impact of implementations on users work life. Therefore this research aimed to confirm this impact on SSA users’ work life. A theoretical framework and survey was developed from Dooyeweerd’s “Down-To-Earth” aspects and the Easton and Van Laar Work-Related Quality of Life scale. Responses from users from 7 countries working for one case organisation were analysed. The significant effect of an ERP implementation on work life quality was confirmed. Cultural differences ...


A Student Perspective Into Information Quality Of Web Sites, Pat Mavetera, Sam Lubbe, Jan A. Meyer PhD (Pr.M) 2017 North West University (Mafikeng Campus)

A Student Perspective Into Information Quality Of Web Sites, Pat Mavetera, Sam Lubbe, Jan A. Meyer Phd (Pr.M)

The African Journal of Information Systems

As organisations have become aware of the strategic importance of web sites, the trend to use web sites for various purposes has increased in domains such as education, health, government and business. However, organisations seeking to obtain benefits from their web sites need to create and maintain web sites that are supporting the interaction and communication of the organisation with their users. The purpose of the study was to investigate the information quality of a web site. A set of information quality indicators, including accuracy, timelines, easy understanding, organisation, consistent representation and easy navigation, were divided into four categories and ...


Quality, Pricing, And Release Time: Optimal Market Entry Strategy For New Software-As-A-Service Vendors, Haihang Feng, Zhengrui Jiang, Dengpan Liu 2017 Tianjin University

Quality, Pricing, And Release Time: Optimal Market Entry Strategy For New Software-As-A-Service Vendors, Haihang Feng, Zhengrui Jiang, Dengpan Liu

Supply Chain and Information Systems Publications

As a new software licensing model, software-as-a-service (SaaS) is gaining tremendous popularity across the globe. In this study, we investigate the competition between a new entrant and an incumbent in a SaaS market, and derive the optimal market entry strategy for the new entrant. One interesting finding is that, when its product quality is significantly lower than that of the incumbent, the new entrant should adopt an instant-release strategy, i.e., releasing its product at the start of the planning horizon. If the initial quality gap of the two products is small, the new entrant is better off adopting a ...


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo MO, Jian-feng MA, Ximeng LIU, Qi LI 2017 Singapore Management University

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR ...


Storytelling With Tableau: A Hands-On Workshop, Shu Schiller 2017 Wright State University - Main Campus

Storytelling With Tableau: A Hands-On Workshop, Shu Schiller

Shu Schiller

In today’s business world, storytelling with data is a powerful way to communicate, convince, and persuade. Such skills are highly desirable in all types of professions. Participants of this hands-on workshop will lean storytelling with Tableau, which skills can be applied to teaching subjects such as data analytics, visualization, and communication as well as presentations in our day-to-day job and research projects.


Panel: Teaching And Research Directions For Business And Mis Programs, Keng L. Siau, Stacie Petter, Shu Schiller, Jacquelyn Ulmer 2017 Wright State University - Main Campus

Panel: Teaching And Research Directions For Business And Mis Programs, Keng L. Siau, Stacie Petter, Shu Schiller, Jacquelyn Ulmer

Shu Schiller

The topic of this panel is “Teaching and Research Directions for Business and MIS Programs”. Higher education in the US is transforming and evolving rapidly. Declining state budget for public schools means that tuition fees may have to be correspondingly increase. The state funding is down by around 40% compared to fiscal 1980. In fact, it is headed for zero! The cost of higher education has surged more than 500% since 1985. Rising costs of higher education means Americans owe nearly $1.3 trillion in student loan debt. The average class of 2016 graduate has about $37k in student loan ...


Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala 2017 University of Hawaii at Manoa

Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala

Atlantic Marketing Journal

In this research, an online experiment was conducted to investigate the effect of the mere presence of digital third-party organization (TPO) endorsement and the quality of information conveyed by a digital TPO, referred to as the endorsement information value effect. Involvement and institution-based trust were tested as moderators of the endorsement information value effect. The results confirm the intuitive belief of managers that the mere presence of a digital TPO endorsement benefits websites by reducing risk perceptions, improving attitudes and increasing choice likelihood. The findings from this research revealed that effectiveness of digital TPO endorsement information value was contingent upon ...


How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore 2017 University of Michigan-Flint

How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore

Journal of Cybersecurity Education, Research and Practice

Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important ...


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis 2017 University of Washington Bothell

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure ...


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia III, Greg Randall, Jay Snellen 2017 Jacksonville State University

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the ...


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord 2017 Kennesaw State University

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the third issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston, Ryan Fortenberry 2017 Georgia Southern University

High Performance Computing: Considerations When Deciding To Rent Or Buy, Russell Thackston, Ryan Fortenberry

Russell F. Thackston

The commercial cloud computing (CCC) industry has reached a level of maturity to make it a truly viable alternative to the traditional, in-house data center. Although there are many notable examples of CCC platforms and technologies being piloted for high performance computing (HPC) tasks, it has yet to enter the mainstream. A variety of obstacles exist which have slowed or hindered adoption of CCC platforms, including implementation complexity, cost confusion, and security concerns. This paper describes the author’s experiences in using CCC for various HPC tasks and compares the results to the same tasks being executed on in-house computing ...


A Study Of The Factors That Influence Consumer Attitudes Toward Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan 2017 Iowa State University

A Study Of The Factors That Influence Consumer Attitudes Toward Beef Products Using The Conjoint Market Analysis Tool, Brian E. Mennecke, Anthony M. Townsend, Dermot J. Hayes, Steven M. Lonergan

Steven M. Lonergan

This study utilizes an analysis technique commonly used in marketing, the conjoint method, to examine the relative utilities of a set of beef steak characteristics considered by a national sample of 1,432 U.S. consumers, as well as additional localized samples representing undergraduate students at a business college and in an animal science department. The analyses indicate that among all respondents, region of origin is by far the most important characteristic; this is followed by animal breed, traceability, the animal feed used, and beef quality. Alternatively, the cost of cut, farm ownership, the non-use of growth promoters, and whether ...


An Examination Of A Theory Of Embodied Social Presence In Virtual Worlds, Brian E. Mennecke, Janea L. Triplett, Lesya M. Hassall, Zayira Jordán Conde, Rex Heer 2017 Iowa State University

An Examination Of A Theory Of Embodied Social Presence In Virtual Worlds, Brian E. Mennecke, Janea L. Triplett, Lesya M. Hassall, Zayira Jordán Conde, Rex Heer

Lesya Hassall

In this article, we discuss and empirically examine the importance of embodiment, context, and spatial proximity as they pertain to collaborative interaction and task completion in virtual environments. Specifically, we introduce the embodied social presence (ESP) theory as a framework to account for a higher level of perceptual engagement that users experience as they engage in activity-based social interaction in virtual environments. The ESP theory builds on the analysis of reflection data from Second Life users to explain the process by which perceptions of ESP are realized. We proceed to describe implications of ESP for collaboration and other organizational functions.


When Size Does Matter: Identifying Multilevel Factors Contributing To It Major Choice, Andy Luse, Julie Rursch, Doug Jacobson 2017 Oklahoma State University

When Size Does Matter: Identifying Multilevel Factors Contributing To It Major Choice, Andy Luse, Julie Rursch, Doug Jacobson

Julie Rursch

The current enrollment crisis in information technology (IT) has left employers scrambling to find qualified individuals to fill positions in IT within the corporation. One issue facilitating this dearth of workers is the lack of individuals pursuing IT-related majors. This research uses high school students to investigate the reasons behind individual choice to major in IT. Social Cognitive Career Theory (SCCT) is used as a theoretical framework for better understanding these decisions and group-level contextual supports/barriers are investigated in a multilevel context. Findings show strong support for school size as a significant school-level predictor of intention to major in ...


Measuring The Impact Of Social Media Marketing On Individuals, Abdullah Alabdulkarim 2017 Western Oregon University

Measuring The Impact Of Social Media Marketing On Individuals, Abdullah Alabdulkarim

Student Theses, Papers and Projects (Computer Science)

Three problems associated with the use of social media in marketing include:

1. The difficulty in tracking, managing, and analyzing the traffic that comes from different social media networks. Google Analytics is one of the data analytic tools that deals with traffic efficiently. It recognizes traffic sources and categorizes them to give the advertiser insights into oncoming traffic to the company’s website. It provides comprehensive statistics about traffic, which can be useful for advertisers to measure the performance of their marketing campaigns.

2. The inability to measure the success of marketing campaigns to increase sales. A/B Testing is ...


A Design Methodology And Implementation For Corporate Network Security Visualization: A Modular-Based Approach, Andy Luse, Brian E. Mennecke, Janea L. Triplett, Nate Karstens, Doug Jacobson 2017 Iowa State University

A Design Methodology And Implementation For Corporate Network Security Visualization: A Modular-Based Approach, Andy Luse, Brian E. Mennecke, Janea L. Triplett, Nate Karstens, Doug Jacobson

Douglas Jacobson

Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.


Storytelling With Tableau: A Hands-On Workshop, Shu Schiller 2017 Wright State University - Main Campus

Storytelling With Tableau: A Hands-On Workshop, Shu Schiller

ISSCM Faculty Publications

In today’s business world, storytelling with data is a powerful way to communicate, convince, and persuade. Such skills are highly desirable in all types of professions. Participants of this hands-on workshop will lean storytelling with Tableau, which skills can be applied to teaching subjects such as data analytics, visualization, and communication as well as presentations in our day-to-day job and research projects.


Digital Commons powered by bepress