Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Management Information Systems

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 262

Full-Text Articles in Business

Cybersecurity And Development, Nir Kshetri Dec 2016

Cybersecurity And Development, Nir Kshetri

Markets, Globalization & Development Review

While scholars and policymakers have realized the importance of information and communication technologies in economic development, relatively less attention has been given to the role of cybersecurity. This research sheds light on issues associated with the "dark side" of digitization in the Global South. We examine the hollowness in the Global South’s digitization initiatives that is associated with a poor cybersecurity. The article also advances our understanding of how institutional and structural characteristics of the Global South influence cybersecurity.


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord Dec 2016

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt Dec 2016

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Isscm Newsletter, Volume 15, December 20, 2016, Raj Soin College Of Business, Wright State University Dec 2016

Isscm Newsletter, Volume 15, December 20, 2016, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

An eight page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant Dec 2016

Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant

Honors Projects

Students’ use of the Canvas learning management system (LMS) as implemented by Bowling Green State University (BGSU) is a substantial part of their learning experience. A well designed and easy to use LMS not only allows students to be more efficient, it allows students to engage effectively with their coursework. Students’ ability to effectively use the LMS is examined to understand whether the system is usable, and if not, what changes should be made. Research included two distinct elements. First, students were asked to complete nine tasks identified as common tasks within Canvas, while being timed. Additionally, students responded to …


Personal Decision Factors Considered By Information Technology Executives: Their Impacts On Business Intentions And Consequent Cloud Computing Services Adoption Rates, Marcus Lee Smith Jr Dec 2016

Personal Decision Factors Considered By Information Technology Executives: Their Impacts On Business Intentions And Consequent Cloud Computing Services Adoption Rates, Marcus Lee Smith Jr

Theses & Dissertations

During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized, resources (e.g., full-time IT personnel and computing equipment with excess capacity) by outsourcing most, if not all, of their entire IT function. Since that time, the cloud industry has expanded the breadth of its service offerings greatly and the economies of scale have reduced the unit price point. In addition, research suggests other …


The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko Dec 2016

The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko

School of Professional Studies

In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …


User Acceptance Barriers For Warehouse Environment Mobile Wireless Technology, Anran Wang Dec 2016

User Acceptance Barriers For Warehouse Environment Mobile Wireless Technology, Anran Wang

Open Access Theses

This research adopted Technology Acceptance Model 2 to investigate users’ acceptance barriers for mobile wireless technologies such as RFID, bar-code scanners and Personal Digital Assistants (PDA) in warehouse environments in Lafayette and West Lafayette, Indiana.

Through survey data collections from two companies that met the research requirement and through statistical analysis of the data, the researcher found answers to the research question.

System functionality is the most important factor in determining the users’ intention to use. System failure would be the biggest acceptance barrier. Secondly, it is critical for companies to establish and strengthen the link between job relevance and …


Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena Dec 2016

Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena

Graduate Theses and Dissertations

Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …


Big Data And Organizational Impacts: A Study Of Big Data Ventures, Taha Havakhor Dec 2016

Big Data And Organizational Impacts: A Study Of Big Data Ventures, Taha Havakhor

Graduate Theses and Dissertations

New information technology (IT) ventures are at the forefront of developing IT innovations. In spite of their importance in the advancement of IT and the unique risks of survival that distinguishes them from established firms, the organizational literature on IT has mostly overlooked new IT ventures. Specifically, Big Data industry is a context where new IT ventures actively change the landscape of IT innovations. However, less is known about the factors influencing the economic success of Big Data ventures (BDVs), as well as the established firms that invest in them. To shed light on these factors, three essays are designed …


From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle Dec 2016

From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle

Faculty Publications

Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …


Improved Sprint Results With Offshore Indian Teams, Fnu Abdul Hasheem Dec 2016

Improved Sprint Results With Offshore Indian Teams, Fnu Abdul Hasheem

Dissertations and Theses

Due to the cultural and linguistic differences, different time zones, and complexities of knowledge transfer involved in IT offshoring, offshore-outsourced projects are more prone to failure than in-house and domestically outsourced projects. These inherent risks exacerbate the communication, coordination and collaboration between vendors and clients and thus affect various stages of the offshore outsourced software development (OSD).

Communication is a major factor of success or failure for any software project. In offshore software development OSD, communication is more critical than collocated software development. Frequent communication is not always possible due to challenges like time zone differences, holiday customs etc. where …


To Overcome Communication Challenges In Distributed/Virtual Scrum Teams, Priyamvada Walimbe Dec 2016

To Overcome Communication Challenges In Distributed/Virtual Scrum Teams, Priyamvada Walimbe

Dissertations and Theses

The purpose of this research is to give an overview of a scrum in distributed teams and to suggest ways overcome communication challenges in such projects. In this research proposal, the latest available research on a scrum in distributed teams will be thoroughly analyzed and evaluated to know the possible solutions for communication problems in distributed teams. A review of the literature suggested scrum is widely accepted agile methodology in software projects and also it works best within collocated teams. However, the literature review also proposes that lack of proper communication is one of the main challenge faced by distributed …


Challenges When Using Scrum In Globally Distributed Teams, Sweta Shah Dec 2016

Challenges When Using Scrum In Globally Distributed Teams, Sweta Shah

Dissertations and Theses

The interest of companies towards using agile approaches in GSD projects is growing at a rapid pace. On that note, it is extremely vital to consider the challenging factors involved in agile practices such as scrum in GSD projects. However, the remarkable and effective attempts towards precisely identify, synthesize and report the literature on agile practices for GSD projects have always been inadequate (Hossain, AliBabar & Young Paik, 2009).

With the purpose of encouraging research committee to explore and analyze the projects that implements scrum process in globally distributed environment, the thesis paper places great emphasis on challenges involved with …


Erp Critical Success Factors: Importance Of Erp Consultants In Erp Implementation, Adekunle S. Balogun Dec 2016

Erp Critical Success Factors: Importance Of Erp Consultants In Erp Implementation, Adekunle S. Balogun

Dissertations and Theses

Enterprise Resource Planning, ERP is one of the most popular and successful information technology solution used in many organizations to share information within different business units to enhance and maximize productivity. The system is expensive, time-consuming, and complicated to implement and manage. The difficulties of ERP implementation have resulted in high rates of unsuccessful ERP implementation according to the stories of many organizations that have implemented the solution. The failure of ERP implementation has then led to several studies to investigate the Critical Success Factors (CSFs) that could influence the ERP implementation during and after implementation phases. Some of the …


Cpn-Dam Business Meeting, Amanda Harlan Nov 2016

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4:50-4:55pm Closing statements


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh Nov 2016

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin Nov 2016

Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin

Central Plains Network for Digital Asset Management

So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a collection assessment …


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez Nov 2016

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud Nov 2016

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …


Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott Nov 2016

Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott

Christopher L. "Kit" Scott

This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used asynchronously. We conducted an experiment with 49 students from three classes of a web development class at an American university. Our results suggest that an asynchronous tutorial can achieve the same learning outcomes as a traditional lecture format by using automated feedback for convergence. Somewhat surprisingly, we found that performance did …


3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh Nov 2016

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr Nov 2016

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness Nov 2016

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with …


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion Nov 2016

The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion

Central Plains Network for Digital Asset Management

In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …


The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor Nov 2016

The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor

Central Plains Network for Digital Asset Management

The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …


Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College Of Business, Wright State University Nov 2016

Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

An eleven page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.