Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3251

Full-Text Articles in Business

Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan Feb 2019

Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan

Communications of the IIMA

The evolution of the economy has gone through the agricultural era, followed by the industrial era focusing on the production of goods and the postindustrial era accentuated by information and services. The new economy of the 21stcentury is characterized by knowledge and relationships. Galbreath (2002) described the transition to a new economic order driven by knowledge and based on the value of relationships. Customer knowledge management (CKM) synthesizes the customer knowledge and relationships assets in the extended enterprise to create advantages for companies in a very competitive market. Technologies have changed alongside the economy. Big Data and Cloud ...


Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler Feb 2019

Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler

Communications of the IIMA

Cybersecurity is a national concern for the United States, yet the cybersecurity workforce is currently understaffed. Military capability planning can be used as a framework to evaluate and establish cybersecurity workforce development models, such as the National Initiative for Cybersecurity Education (NICE) Framework. These models can be used in a way that provides the nation a methodology to enhance human resource capabilities and fill the cybersecurity workforce deficit. Furthermore, this report discusses the importance of establishing and enhancing strategic recruitment initiatives that can be utilized for building a cybersecurity pipeline.


Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye Feb 2019

Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye

Communications of the IIMA

Over the past few decades, most of the existing methods for analysing large growing knowledge bases, particularly Big Data, focus on building algorithms and/or technologies to help the knowledge-bases automatically or semi-automatically extend. Indeed, a vast number of such systems that construct the said large knowledge-bases continuously grow, and most often, they do not contain all of the facts about each process instance or elements that can be found within the process base. As a consequence, the resultant process models tend to be vague or missing value datasets. In view of such challenge, the work in this paper demonstrates ...


The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi Jan 2019

The Need For Green Companies In Nigeria: A Study Of Electronic Invoicing, Sunday Adewale Olaleye, Ismaila Temitayo Sanusi

The African Journal of Information Systems

Manual invoicing is a major business document that the supplier uses to request payments from a purchaser for services rendered. It contains the contact information of the seller, the list of goods or the services provided and the payment instructions. Attention is being shifted from manual invoicing these days because of some factors like increased man-hours, risks of human error and risks of high carbon footprint. The study applied Unified Theory of Acceptance and Use of Technology (UTAUT) to investigate the need for green Companies in Nigeria. Empirical data were collected from Nigerian companies to measure intention-behavior for electronic invoicing ...


E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe Jan 2019

E-Governance As An Alternative Antecedent To A Lean Public Sector : Theory And Evidence, Kennedy Okong'o, Michael Kyobe

The African Journal of Information Systems

The ever growing size of the public sector has been a contention in theory and practice. In parallel, the public sector use of Information Communication Technologies (ICTs), otherwise known as Electronic Government has had a transformative potential. Inspired by these competing interests, this paper set out to study the relationship between investments in e-Government and the size of public sector. Informed by Banks-Weingast model of bureaucratic discretion drawn upon political science, the research estimated the linkage. Using a balanced panel data of Kenya’s key ministries for a 10 year period (2004-2014), e-Government expenditure, consumer price indices (CPI) and gross ...


External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona Jan 2019

External Actors In Forming National Ict Policy In Malawi: A Cause For Concern In Low-Income Countries?, Gregory Kunyenje 4928781, Wallace Chigona

The African Journal of Information Systems

The paper examines external actors in the formulation of national Information and Communication Technology (ICT) policies. It questions how external actors overtly or covertly influence formulation of national ICT policies following that, of the nearly 84% of the countries in Africa that have formulated national ICT policies, most of which have been influenced by external actors. The paper uses Bourdieu’s Theory of Practice to analyze the effects of external actors’ influences in developing countries by using Malawi as a case study. Document analysis is used to analyse external actors’ influences in policy documents, the minutes of policy actors’ meetings ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu Dec 2018

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Isscm Newsletter, December 1, 2018, Raj Soin College Of Business, Wright State University Dec 2018

Isscm Newsletter, December 1, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The ...


Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote Dec 2018

Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote

Journal of International Technology and Information Management

This pedagogical paper describes how a graduate course in Text Mining was developed and taught in a fully online format at Quinnipiac University. The software used was SAS™ Enterprise Miner. This paper discusses the design, software used and the methodology followed in the course. A critical component of the course required the students to delve deep into social media data by completing a detailed project on analyzing sentiment analysis using large files of social media data. A sample report of this project, which was a key deliverable for the course, is described at length in this paper.


How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma Dec 2018

How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma

Journal of International Technology and Information Management

With the prevalence of information technology (IT), the value of IT awareness increasingly grows, and IT control becomes a key part of firms’ strategies and objectives. Although leadership plays an important role in IT control governance, limited research has studied whether IT awareness is associated with IT control weaknesses (ITCWs) and firm performance simultaneously. Drawing on the agency and resource dependence theory, this paper proposes an integrative model to examine the impact of IT awareness on ITCWs and firm performance. We empirically validate the model using a data set of 310 firms collected from multiple sources including Audit Analytics, Compustat ...


Bibliometric Indicators For Assessing The Quality Of Scholarly Communications: A Case Study On International Journal Of Cooperative Information Systems, Basudev Mohanty, Jyotshna Sahoo, Nrusingh Kumar Dash Librarian Dec 2018

Bibliometric Indicators For Assessing The Quality Of Scholarly Communications: A Case Study On International Journal Of Cooperative Information Systems, Basudev Mohanty, Jyotshna Sahoo, Nrusingh Kumar Dash Librarian

Library Philosophy and Practice (e-journal)

This paper analyses various bibliometric dimensions of the journal literature such as authors’ productivity, geographical distribution, citation pattern, institution-wise distribution of articles, discipline-wise distributions of articles, productive institutions, Productivity Index (PI), Activity Index (AI), Domestic Collaborative Index (DCI) and International Collaborative Index (ICI) etc. It also explores the applicability of Lotka’s Inverse Square Law and Zipf’s Law to examine the observed rank – frequency pattern of Keywords and Subject Terms of Information Systems (IS) literature. To illustrate these bibliometric indicators pertinent information on the field of Information Systems (IS) collected from EBSCO database for the International Journal of Cooperative ...


Technology And The American Criminal Justice System, Taylor Hunt Dec 2018

Technology And The American Criminal Justice System, Taylor Hunt

Information Systems Undergraduate Honors Theses

The American prison population has grown to over 2.3 million citizens incarcerated (“United States of Incarceration,” 2016) and there are more than 900,000 police officers in the nation (“Law Enforcement Facts,” n.d.). These over 3 million people use technology every day in either their work or incarcerated lives. As the effectiveness of the criminal justice system is being questioned, now is the time to perform an assessment of the technology used and make technological recommendations to lower crime, incarceration, and recidivism rates simultaneously. To obtain that technology assessment, a student research study was conducted and consisted of ...


Three Empirical Studies On Digital Innovation Management: New Organizing Logic Of Antecedents And Consequences Of Innovation, Kailing Deng Dec 2018

Three Empirical Studies On Digital Innovation Management: New Organizing Logic Of Antecedents And Consequences Of Innovation, Kailing Deng

Theses and Dissertations

In the last decade, innovation has undergone considerable changes in most industries. Digital innovation may represent the use of digital technology in the innovation process or to the end outcome of innovation. Over the years, innovation has become open, global, and collaborative in nature and involves diverse stakeholders and distributed innovation processes (Nambisan 2013; Nambisan et al. 2017). The importance of innovation will continue to grow in the future, as the business environment becomes increasingly uncertain and competitive. With the rapid development of digitized technologies, in addition to innovation outcomes such as new products, platforms, and services, IS researchers have ...


Isscm Alumni Newsletter, November 29, 2018, Raj Soin College Of Business, Wright State University Nov 2018

Isscm Alumni Newsletter, November 29, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A ten page alumni newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


A Simple Approach For Sustainable Transportation Systems In Smart Cities: A Graph Theory Model, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar Nov 2018

A Simple Approach For Sustainable Transportation Systems In Smart Cities: A Graph Theory Model, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar

Sachin Pawaskar

The idea of public transportation is supported by most in theory but often heavily criticized by users when put into application. There are common tensions that are related to public transportation, as described by frequent users: unreliable, too crowded, and slow. The University of Nebraska-Omaha (UNO) is a growing metropolitan
institution that uses a shuttle system to transport students among their three campuses daily. As of 2015, the current total student enrollment is approximately 16,000; UNO plans to enroll 20,000 students by 2020. The expected student growth is also reflected by the current construction of new buildings and ...


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs ...


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue ...


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity ...


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America for ...


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black Oct 2018

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results ...


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards Oct 2018

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address ...


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson Oct 2018

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best ...


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased ...


Car Hacking: Can It Be That Simple?, Bryson Payne Oct 2018

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy Oct 2018

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Digital Identity, Philip Andreae Oct 2018

Digital Identity, Philip Andreae

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.