Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3612

Full-Text Articles in Management Information Systems

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge Dec 2017

How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge

Theses & Dissertations

This study, framed by decision making, program theory, and performance measurement theory, explored the knowledge and experience that enable decision makers to identify organizational performance measures. It used a mixed method, exploratory sequential research design to discover the experience, knowledge, and skills (EKS) senior decision makers felt were important in learning to choose organizational performance measures. From the analyzed interviews, a survey was designed to measure the importance of the EKS characteristics. Qualitative analysis identified 55 life, work, or educational experience; knowledge; or skill characteristics and 23 effective measure characteristics. Regression analysis and PCA were used to extract 6 components ...


Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University Nov 2017

Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nineteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


R&D Sensitivity To Asset Sale Proceeds: New Evidence On Financing Constraints And Intangible Investment, Ginka Borisova, James R. Brown Nov 2017

R&D Sensitivity To Asset Sale Proceeds: New Evidence On Financing Constraints And Intangible Investment, Ginka Borisova, James R. Brown

James R. Brown

We examine the intersection between corporate divestitures of tangible assets and investment in intangible capital (R&D) to provide new tests for the impact financing constraints have on real activity. A positive R&D sensitivity to asset sale proceeds indicates binding financing constraints since cash inflows from tangible asset sales are negatively correlated with productivity shocks and not otherwise connected to intangible investment via non-financial channels. Using a variety of estimation approaches, we document a strong, positive link between cash inflows from fixed asset sales and corporate R&D investment, but only among firms most likely facing binding financing constraints ...


Access To Private Equity And Real Firm Activity: Evidence From Pipes, James R. Brown, Ioannis V. Floros Nov 2017

Access To Private Equity And Real Firm Activity: Evidence From Pipes, James R. Brown, Ioannis V. Floros

James R. Brown

No abstract provided.


Law, Stock Markets, And Innovation, James R. Brown, Gustav Martinsson, Bruce C. Petersen Nov 2017

Law, Stock Markets, And Innovation, James R. Brown, Gustav Martinsson, Bruce C. Petersen

James R. Brown

We study a broad sample of firms across 32 countries and find that strong shareholder protections and better access to stock market financing lead to substantially higher long-run rates of R&D investment, particularly in small firms, but are unimportant for fixed capital investment. Credit market development has a modest impact on fixed investment but no impact on R&D. These findings connect law and stock markets with innovative activities key to economic growth, and show that legal rules and financial developments affecting the availability of external equity financing are particularly important for risky, intangible investments not easily financed with ...


Do Financing Constraints Matter For R&D?, James R. Brown, Gustav Martinsson, Bruce C. Petersen Nov 2017

Do Financing Constraints Matter For R&D?, James R. Brown, Gustav Martinsson, Bruce C. Petersen

James R. Brown

Information problems and lack of collateral value should make R&D more susceptible to financing frictions than other investments, yet existing evidence on whether financing constraints limit R&D is decidedly mixed, particularly in the studies of non-U.S. firms. We study a large sample of European firms and also find little evidence of binding finance constraints when we estimate standard investment-cash flow regressions. However, we find strong evidence that the availability of finance matters for R&D once we directly control for: (i) firm efforts to smooth R&D with cash reserves and (ii) firm use of external equity ...


Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime Nov 2017

Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime

The Qualitative Report

Medicare-eligible physicians at primary care practices (PCP) that did not implement an electronic health record (EHR) system by the end of 2015 face stiff penalties. One year prior to the 2015 deadline, approximately half of all primary clinics have not implemented a basic EHR system. The purpose of this phenomenology study was to explore rural primary care physicians and physician assistants’ experiences regarding overcoming barriers to implementing EHRs. Complex adaptive systems formed the conceptual framework for this study. Data were collected through face-to-face interviews with a purposeful sample of 21 physicians and physician assistants across 2 rural PCPs in the ...


Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta Nov 2017

Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta

Arijit Sengupta

This article presents a declarative query language, Document SQL (DSQL) that has the same look and feel as SQL and was designed by updating the semantics of SQL operations in the structured document domain. At the same time, DSQL was designed such that all queries written in it have equivalent counterparts in XQuery. Thus, by using such a language, users can take advantage of their existing SQL knowledge when writing ad-hoc queries without losing the expressive power of XQuery.


New Start-Up Company Makes Parking A Whole Lot Smarter!, Arijit Sengupta Nov 2017

New Start-Up Company Makes Parking A Whole Lot Smarter!, Arijit Sengupta

Arijit Sengupta

Whether it’s parking at a major event, or just getting into campus, one of the biggest headaches of our daily routines comes from the commute, and sometimes the hardest part is what comes in the end – finding a parking spot. SmartRF Solutions, a new startup company founded by Dr. Arijit Sengupta and his business partner, provides custom solutions for AVI enabled parking systems, starting from basic access control systems to complex end-to-end systems for large parking chains.


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Nov 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business ...


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. Nov 2017

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Dale H Shao

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender ...


Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr. Nov 2017

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Dale H Shao

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in ...


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers ...


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune ...


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and ...


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit ...


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls ...


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities in ...


Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College Of Business, Wright State University Oct 2017

Isscm, M.S. In Logistics & Scm Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the Fall 2017 Cohort from the Master of Science in Logistics and Supply Chain Management Program.


Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College Of Business, Wright State University Oct 2017

Isscm, Master Of I.S. Cohort, Fall 2017, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the 2017 Cohort from the Master of Information Systems Program.


Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan Oct 2017

Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Automation poses a threat tomany of the tasks that are performed by accountants today. Certainly, manyemerging technologies have already begun to perform tasks that havetraditionally been performed by accountants. For example, advancements incloud-based accounting software now make it much easier for small businesses toeasily and accurately enter and edit financial information on their own withoutthe input of accountants. Looking further into the horizon, newer technologiescan now turn hard-copy receipts into a machine-readable format, encrypt them,and allocate them to an account without any input from a human. Such developmentswill continue to reduce the reliance of businesses on accountants.


The Information Content Of Sudden Insider Silence, Claire Yurong Hong, Frank Weikai Li Oct 2017

The Information Content Of Sudden Insider Silence, Claire Yurong Hong, Frank Weikai Li

Research Collection Lee Kong Chian School Of Business

We present evidence of investors underreacting to the absence of events in financialmarkets. Routine-based insiders strategically choose to be silent when they possessprivate information not yet reflected in stock prices. Consistent with our hypothesis,insider silence following routine sell (buy) predict positive (negative) future return aswell as fundamentals. The return predictability of insider silence is stronger amongfirms with poor information environment and facing higher arbitrage costs, and alarge fraction of abnormal returns concentrates on future earnings announcements. Along-short strategy that exploits insiders’ strategic silence behavior generates abnormalreturns of 6% to 10% annually


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Oct 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business ...


Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai Li, Chengzhu Sun Oct 2017

Information Acquisition And Expected Returns: Evidence From Edgar Search Traffic, Frank Weikai Li, Chengzhu Sun

Research Collection Lee Kong Chian School Of Business

This paper examines expected return information embedded in investors' information acquisition activity. Using a novel dataset containing investors' access of company filings through SEC's EDGAR system, we reverse engineer their expectations over future payoffs and show that the abnormal number of IPs searching for firms' financial statements strongly predict future returns. The return predictability stems from investors allocating more effort to firms with improving fundamentals and following exogeneous shock to underpricing. A long-short portfolio based on our measure of information acquisition activity generate monthly abnormal return of 80 basis points and does not reverse over the long-run.. In addition ...


Inside Brokers, Frank Weikai Li, Abhiroop Mukherjee, Rik Sen Oct 2017

Inside Brokers, Frank Weikai Li, Abhiroop Mukherjee, Rik Sen

Research Collection Lee Kong Chian School Of Business

We identify the broker each corporate insider trades through, and show that analystsand mutual fund managers affiliated with such “inside brokers” retain a substantialinformation advantage on the insider’s firm, even after these trades are disclosed.Affiliated analysts issue 10–20% more accurate earnings forecasts, and affiliated fundstrade the insider’s stock much more profitably than their peers, following insider tradesthrough their brokerage. Our results challenge the prevalent perception that informationasymmetry arising from insider trading is acute only before trade disclosure, andsuggest that brokers facilitating these trades are in a unique position to exploit suchan asymmetry.


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against ...