Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Journal

2018

Institution
Keyword
Publication

Articles 1 - 30 of 64

Full-Text Articles in Business

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The relationship between the adoption …


Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote Dec 2018

Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote

Journal of International Technology and Information Management

This pedagogical paper describes how a graduate course in Text Mining was developed and taught in a fully online format at Quinnipiac University. The software used was SAS™ Enterprise Miner. This paper discusses the design, software used and the methodology followed in the course. A critical component of the course required the students to delve deep into social media data by completing a detailed project on analyzing sentiment analysis using large files of social media data. A sample report of this project, which was a key deliverable for the course, is described at length in this paper.


How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma Dec 2018

How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma

Journal of International Technology and Information Management

With the prevalence of information technology (IT), the value of IT awareness increasingly grows, and IT control becomes a key part of firms’ strategies and objectives. Although leadership plays an important role in IT control governance, limited research has studied whether IT awareness is associated with IT control weaknesses (ITCWs) and firm performance simultaneously. Drawing on the agency and resource dependence theory, this paper proposes an integrative model to examine the impact of IT awareness on ITCWs and firm performance. We empirically validate the model using a data set of 310 firms collected from multiple sources including Audit Analytics, Compustat, …


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


Bridging Perspectives Of Customer Value Proposition And Customer Perceived Value Of Intercity Non-Bus Transportation Service In Indonesia, Ihsan Hadiansah, Rendika Nugraha, Adhi Setyo Santoso, Mustika Sufiati Purwanegara Oct 2018

Bridging Perspectives Of Customer Value Proposition And Customer Perceived Value Of Intercity Non-Bus Transportation Service In Indonesia, Ihsan Hadiansah, Rendika Nugraha, Adhi Setyo Santoso, Mustika Sufiati Purwanegara

The South East Asian Journal of Management

Research Aims - The study aim is to explore value proposition creation from the perspectives of non-bus transportation services and to investigate the factors in customer perceived value, especially functional value (operations, facilities, professionalism, and price), that influence purchase intention from customers’ perspectives. Design/methodology/approach - This mixed methods study used personal interviews, participant observation, and a survey to collect the data. Then, we conducted exploratory case study by using organisational level logic model as a qualitative analysis technique. Finally, we used regression for hypothesis testing of the quantitative section. Research Findings - The results indicated that non-bus transportation services should …


Effect Of Managers' Communication On Training Application With Motivation To Learn As An Intervening Variable, Azman Ismail, Nurul Afiqah Foboy, Azmawaty Mohamad Nor Oct 2018

Effect Of Managers' Communication On Training Application With Motivation To Learn As An Intervening Variable, Azman Ismail, Nurul Afiqah Foboy, Azmawaty Mohamad Nor

The South East Asian Journal of Management

Research Aims - According to the present research concerning organizational training, managers’ communication are often seen as a critical training management issue that may help to maintain and enhance organizational competitiveness and performance in a borderless world and era of globalization. In this study, the relationship between managers’ communication, motivation to learn and training application was evaluated at military hospitals in Peninsular Malaysia. Design/methodology/approach - The SmartPLS path model analysis was utilized to examine the research hypotheses and evaluate the validity and reliability of instrument used. Research Findings - The results demonstrate that the capability of managers to communicate the …


Knowledge Inertia In The Innovation Of Coffee Production, Hafiz Rahman, Hanjaya Putra Siswowiyanto Oct 2018

Knowledge Inertia In The Innovation Of Coffee Production, Hafiz Rahman, Hanjaya Putra Siswowiyanto

The South East Asian Journal of Management

Research Aims - This paper aims at discussing the existence of knowledge inertia and its influence to the product innovation, with particular analysis given to the coffee production during the preharvest and post-harvest periods. Design/methodology/approach - The study uses quantitative methodology, and operates multiple and partial regression analysis between variables of the study to measure the impact of knowledge inertia to the innovation of coffee production. To put the findings in detail, the study separates the innovation of coffee product in two sequences, named [a] pre-harvest period and, [b] post-harvest period. Data and information were collected based on cross-sectional cohort …


Mapping The Terrain: An Indonesian Business Perspective Of The Asean Economic Community, Marko S. Hermawan, Lena Choong Oct 2018

Mapping The Terrain: An Indonesian Business Perspective Of The Asean Economic Community, Marko S. Hermawan, Lena Choong

The South East Asian Journal of Management

Research Aims - This paper focuses on the institutions that the ASEAN Economic Community (AEC) project will affect. By employing institutional logics theory, this study scrutinizes academics and business practitioners as institutions and the cultural context embedded within them. Methodology - A mixed method of newspaper data analysis and semi-structured interviews was used to obtain comprehensive data from both sources. Research findings - The findings suggest a definite orientation gap between business practitioners, associations, and academics—the three groups have less information and contributions compared with the government and association influences. This study concludes that more participation is needed from these …


Innovative Strategic Positioning Of Capital Flows Mobilization Of The Original Five Asean Countries: Which Are Leading?, Eric J. Nasution, Nila Krisnawati Oct 2018

Innovative Strategic Positioning Of Capital Flows Mobilization Of The Original Five Asean Countries: Which Are Leading?, Eric J. Nasution, Nila Krisnawati

The South East Asian Journal of Management

Research Aims - The study was conducted to employ the capital flows mobilization (CFM) indicators as the leading economic indicators to determine the leadership role among the five original ASEAN countries. It sought to simplify and answer three research questions on the differences of CFM indicators among the ASEAN countries, their ranks, and how they were positioned in terms of CFM performance and Granger causality risk level. Methodology - Nonparametric statistics and the economic game theory using a four-quadrant matrix were used to answer the three research questions. Research findings - The first hypothesis was accepted, which indicates that the …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui Oct 2018

Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui

Communications of the IIMA

Despite significant increases in the growth of online education, a review of research reveals few studies of faculty perceptions of the use of technology in classrooms in higher education. Research can explore and illuminate how to bridge the gap between faculty perceptions and institutional goals and objectives for online programs. The study at hand presents the views of full-time and adjunct faculty across the colleges, both on- and off-campus, and the online community, at the University of La Verne, a private Tier II doctoral degree-granting institution located in Southern California.


Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim Oct 2018

Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim

Communications of the IIMA

As digital media continues to expand, competition between cable television and online streaming services increases. Acquiring customers today takes more than just advertising; it requires tailoring business objectives to the needs and wants of consumers. Numerous studies have examined the connection between the adoption of cable and online media, and key variables such as cost, ease of use, and social trends. In this study, we explore a number of factors which consumers consider when choosing cable television and online streaming options. Sample data was collected through a survey questionnaire at a large public university. Multivariate regression models were developed to …


Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida Oct 2018

Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida

Communications of the IIMA

What effect does a financial news article have on stock price? To answer this question we investigate stock price movements within the minutes following financial news releases, broken down by media outlet, time of release and article sentiment. Our data shown a Sharpe ratio (a measure for calculating risk-adjusted return) of 1.18 versus a random dataset of ‑0.06, indicating significant price movement immediately following article release. Second, we found that articles released through WSJ, Reuters – UK Focus, NYT and FT all experienced significant positive returns, whereas articles in Barrons, MarketWatch, Forbes and Bloomberg experienced significant negative returns. Third, we …


What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard Oct 2018

What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard

Communications of the IIMA

Consumers are expanding the types of goods they are exchanging in consumer-to-consumer e-commerce. There appears to be a subset called collaborative consumption. Collaborative consumption is a dynamic concept given that an individual must develop mechanisms to trust others with transporting, sharing, and consuming goods/services. This study develops a trust model for collaborative consumption with three expected influences -- natural propensity to trust (NPT), others’ trust of buyer/seller (OTBS), and objective trust (perceived website quality (PWSQ) and third party recognition (TPR)) -- on an individual’s trust in collaborative consumption. Regression analysis is utilized to assess the proposed model. The study finds …


Critical Success Factors For Adopting Telemedicine Applications, Arjen Maris, Anas Yousfi, Stefan V. Ramshorst, Pascal Ravesteyn Oct 2018

Critical Success Factors For Adopting Telemedicine Applications, Arjen Maris, Anas Yousfi, Stefan V. Ramshorst, Pascal Ravesteyn

Communications of the IIMA

The use of IT within healthcare is increasing, but at a slow rate. In complex projects like the implementation of a telemedicine application within the context of physiotherapy processes where both practitioners and patients use the application, it is still unclear what factors should be taken into consideration for a successful adoption. Therefore, the research question for this study is: ‘what are the critical success factors for adopting a telemedicine application for primary physiotherapists and their patients within the Netherlands?’ A literature study is performed followed by a thematic analysis to determine the factors that are relevant for adoption of …


Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona Sep 2018

Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona

The African Journal of Information Systems

Educators’ digital fluency has been noted as one of the most important skill required for effective curriculum delivery in connected classrooms. Research and anecdotal evidence show that even though many Western Cape classrooms have internet connectivity, many of the educators are unable to take advantage of the connectivity for teaching and learning. Hence, this paper focuses on the educators’ digital fluency as a necessary competence for effective curriculum delivery in connected classrooms. The study was done qualitatively. Randomly selected educators from public schools participated in the one-on-one and focus group interviews. Results show that most educators perceive their digital fluency …


Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof. Sep 2018

Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof.

The African Journal of Information Systems

This study seeks to understand the existing interactions between actors of the Kenya Open Data Initiative (KODI), and how the actors’ interests are aligning to achieve openness and transparency of government operations. This study is based on the Callon’s moments of translation framework, which helps in describing the interaction between initiators of a network and other involved actors with the aim of aligning their diverse interests in order to achieve a common goal. KODI comprised of a diverse group of stakeholders from government, private sector, inter-governmental organisation, and civil society. KODI has faced various challenges since its inception in 2011, …


Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe Sep 2018

Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe

The African Journal of Information Systems

SNS platforms are providing simultaneously for hedonic and utilitarian type uses. However, extant research continues to model the SNS usage construct as a simplistic unidimensional construct that fails to adequately reflect the multi-dimensional nature of SNS usage in workplace contexts. This paper contributes by presenting results of a multi-phase process used to develop and validate measures of the deep structure SNS usage construct from both hedonic and utilitarian perspectives. Psychometric tests were conducted using 124 usable responses, and the results show that deep structure usage is best modelled as a reflective second order construct with three first order dimensions reflecting …


Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee Sep 2018

Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee

The African Journal of Information Systems

Recent trends combine smart phones with social networking platforms to bring new opportunities that can enable people to collaborate anywhere and at any time. For example, organisations can be given the opportunity to recruit part-time job seekers such as software developers using social media tools. Previously, collaboration was static in nature, but today loosely enabled collaboration needs to support flexible schedules, ad hoc processes and members that may not be known in advance. Furthermore, current crowdsourcing platforms that enable software developers to contribute their skills to projects do not meet the social needs of participants as they collaborate. This paper …


Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner Sep 2018

Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner

The African Journal of Information Systems

Digital disruption is breaking down long established business models. In most organisations, IT managers are charged with management of technology-enabled change. It is therefore important that IT managers understand the opportunities and challenges posed by digital disruption to aid the organisation's response. The purpose of this study was to explore what South African IT managers perceive, and what their responses (or planned responses) to digital disruption within the context of a financial services organisation are. The study is interpretive, exploratory and qualitative, drawing from situational awareness theory to ground the participants’ perception of digital disruption. The study draws on Disruptive …


An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu Sep 2018

An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu

The African Journal of Information Systems

Organizations thrive on efficient information management systems as they support activities. Hence, these systems need to be protected from attacks that threaten their existence and use. Although non-technical information security ideas have been espoused by researchers, they have excluded the role of organizational communication. As such, this study explains information security from an organizational communication perspective. Drawing upon a framework of discourse and organizational change, we analyze an empirical case of how information security in an organization is implicated by communicative actions, deep structures, and communication traits. The analysis reveals that (1) prevention of security breaches is achieved by structures …


The Digital Global Supply Chain: The Growing Case For Blockchain Technology Expansion Within Global Supply Chain, Jonathan Chichoni, Scott Webb Aug 2018

The Digital Global Supply Chain: The Growing Case For Blockchain Technology Expansion Within Global Supply Chain, Jonathan Chichoni, Scott Webb

Marriott Student Review

In a competitive global market place, technology adoption and application in supply chain is becoming increasingly important as companies seek to acquire competitive advantages. Since blockchain’s advent to the global stage of modern disruptive technologies, several questions remain unanswered pertaining to the benefits that blockchain adoption poses to global supply chains. I apply a typology analysis to a corpus of company filings, press releases and industry studies to better understand the reasons for which global supply chains industry wide are adopting blockchain technology and the specific benefits which they seek to exploit through the use of blockchain. I characterize the …


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jul 2018

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the Spring 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz Jul 2018

Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

Journal of Cybersecurity Education, Research and Practice

This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins Jul 2018

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Security Awareness Campaign, Rachael L. Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky J. Jenkins

Journal of Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding Jul 2018

A Case Study In The Implementation Of A Human-Centric Higher Education Cybersecurity Program, John W. Coffey, Melanie Haveard, Geissler Golding

Journal of Cybersecurity Education, Research and Practice

This article contains a description of the implementation of a comprehensive cyber security program at a regional comprehensive university. The program was designed to create an effective cyber security management infrastructure and to train end users and other categories of security management personnel in data protection and cyber security. This work addresses the impetus for the program, the rather extensive planning and development that went into the program, its implementation, and insights gleaned from the experience. The paper concludes with a summary of the strengths and weaknesses of the initiative.


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …