Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (1017)
- Physical Sciences and Mathematics (825)
- Computer Sciences (778)
- Business Administration, Management, and Operations (682)
- Social and Behavioral Sciences (678)
-
- Management Sciences and Quantitative Methods (626)
- E-Commerce (559)
- Engineering (426)
- Databases and Information Systems (304)
- Communication (298)
- Information Security (277)
- Computer Engineering (263)
- Operations Research, Systems Engineering and Industrial Engineering (249)
- Business Intelligence (248)
- Library and Information Science (241)
- Operations and Supply Chain Management (239)
- Education (236)
- Organizational Behavior and Theory (219)
- Marketing (216)
- Business and Corporate Communications (213)
- Medicine and Health Sciences (188)
- Entrepreneurial and Small Business Operations (187)
- Other Business (180)
- Social Media (180)
- Business Analytics (174)
- Computer and Systems Architecture (173)
- Operational Research (171)
- Human Resources Management (169)
- Institution
-
- California State University, San Bernardino (854)
- Selected Works (617)
- Kennesaw State University (373)
- SelectedWorks (304)
- Singapore Management University (213)
-
- Universitas Indonesia (169)
- Wright State University (137)
- New Jersey Institute of Technology (122)
- University of Nebraska - Lincoln (106)
- Clark University (75)
- Georgia State University (75)
- Air Force Institute of Technology (69)
- San Jose State University (59)
- The University of San Francisco (53)
- Harrisburg University of Science and Technology (51)
- Illinois State University (51)
- Boise State University (43)
- Missouri University of Science and Technology (43)
- Virginia Commonwealth University (36)
- Montclair State University (35)
- Santa Clara University (35)
- Marshall University (33)
- Butler University (31)
- University of Arkansas, Fayetteville (29)
- Brigham Young University (26)
- Claremont Colleges (25)
- University of Massachusetts Boston (25)
- University of Dayton (23)
- Utah State University (21)
- Edith Cowan University (20)
- Keyword
-
- Information (332)
- Computer (235)
- Information management (225)
- Evolution (221)
- Technology (145)
-
- Information systems (77)
- Management (66)
- IT (64)
- Business (63)
- Information technology (52)
- Internet (52)
- Präsentation (50)
- Knowledge management (47)
- Refereed Articles (47)
- Information security (46)
- Information Systems (45)
- Innovation (45)
- Cybersecurity (43)
- Journal Articles (41)
- Systems (41)
- Social media (40)
- Collaboration (38)
- Conference Proceedings (37)
- Privacy (37)
- Wissenschaftliche Zeitschriften (37)
- System (36)
- Trust (36)
- Security (35)
- Healthcare (34)
- Information Technology (34)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (400)
- Journal of International Information Management (243)
- Communications of the IIMA (184)
- The South East Asian Journal of Management (165)
- Hubert Oesterle (152)
-
- Research Collection School Of Computing and Information Systems (150)
- The African Journal of Information Systems (143)
- Theses and Dissertations (112)
- Dissertations (101)
- Journal of Cybersecurity Education, Research and Practice (86)
- KSU Proceedings on Cybersecurity Education, Research and Practice (82)
- School of Professional Studies (74)
- Dissertations and Theses (52)
- International Journal for Business Education (51)
- Computer Information Systems Faculty Publications (50)
- Herbert J. Mattord (50)
- ISSCM Faculty Publications (50)
- Extension Farm and Ranch Management News (46)
- IT and Supply Chain Management Faculty Publications and Presentations (42)
- Business and Information Technology Faculty Research & Creative Works (39)
- Theses (36)
- ISSCM Newsletters (35)
- Information Systems and Analytics (35)
- Business Analytics and Information Systems (34)
- Saurabh Gupta (34)
- Faculty Publications (32)
- Department of Information Management and Business Analytics Faculty Scholarship and Creative Works (31)
- Faculty and Research Publications (31)
- Scholarship and Professional Work - Business (31)
- Priscilla Arling (30)
- Publication Type
Articles 1 - 30 of 4440
Full-Text Articles in Management Information Systems
Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil
Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil
Theses and Dissertations
Trading stocks of publicly traded companies in stock markets is a challenging topic since investors are researching what tools can be used to maximize their profits while minimizing risks, which encouraged all researchers to research and test different methods to reach such a goal. As a result, the use of both fundamental analysis and technical analysis started to evolve to support traders in buying and selling stocks. Recently, the focus increased on using Machine learning models to predict stock prices and algorithmic trading as currently there is a huge amount of data that can be processed and used to forecast …
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall, Joseph W. Lutter Iii
Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall, Joseph W. Lutter Iii
International Journal for Business Education
Students who are attracted to quantitative disciplines of study can be reluctant to devote much attention to the important task of communicating, and previous research (Hostager, 2018) has identified statistically significant differences in learning approaches by major among undergraduate business students. This paper presents results of learning assurance for writing skills (direct measures) even when the content of the course relates to the highly quantitative topics of data analytics and finance. The approach combines various pedagogical methods in an undergraduate, writing-intensive setting: traditional testing but in an iterative framework, “flipped classroom” intensive work using spreadsheet software, repeated submission of brief …
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Economic and Business Review
For more than six decades, creativity has been the cornerstone of diverse scientific disciplines, including psychology, sociology, and organizational behavior (OB) studies. Its fundamental role in guiding business prospects, driving development, and fueling economic growth has made it an essential research theme in many fields. Yet, despite its importance, scholars within the information systems (IS) discipline have highlighted the significant lack of attention paid to this concept in their research. The transformative role creativity plays in contemporary business environments, along with the ever-present need to innovate, compete, and grow, sparked our curiosity. Is creativity still an understudied area in the …
It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick
It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick
The African Journal of Information Systems
Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced …
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Journal of Cybersecurity Education, Research and Practice
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Journal of Cybersecurity Education, Research and Practice
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …
Investigation Of Algorithmic Nudging On Decision Quality: Evidence From Randomized Experiments In Online Recommendation Settings, Yuxiao Luo
Dissertations, Theses, and Capstone Projects
Most recently, academic research has started to address the relationship between nudges and Artificial Intelligence/Machine Learning (AI/ML) and found that personalized targeting algorithms can influence individual and collective behaviors in ways that may lead to undesired consequences for both end-users and firms. This dissertation investigates the effects of digital nudging, particularly algorithmic nudging, on user’s decision quality in online badge recommendations in the e-commerce context. Nudge is a choice architecture that alters individual’s behavior in a predictable way while preserving all available options and keeping the same economic incentives. In this dissertation, I conducted three independent and relevant studies and …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
KSU Proceedings on Cybersecurity Education, Research and Practice
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
KSU Proceedings on Cybersecurity Education, Research and Practice
Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …
Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi
Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi
Journal of International Technology and Information Management
This article draws from the social network theory and examines how a social network approach can contribute to our understanding of the variation in the adoption of innovative, organization-wide information systems that can help businesses achieve sustainable competitive advantage. It highlights how the extant explanations for the adoption of information systems are limited in the way that they primarily assume organizations make innovation adoption decisions in isolation. It does so by building on growing research which recognizes that organizations are not isolated from one another; rather, they are interrelated through their inter-organizational networks which provide unique learning opportunities that are …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath
An Empirical Study To Understand The Role Of Institution-Based Trust And Its Antecedents In Iot Adoption By Individuals, Anupam Kumar Nath, Amit Kumar Nath
Journal of International Technology and Information Management
ABSTRACT
The Internet of Things (IoT) enables the connection between humans, physical objects, and cyber objects, resulting in monitoring, automation, and decision-making capabilities. This connection can be complex and lead to uncertainty for individuals before adopting IoT technology. To address this, we conducted research on the role of Institution-based trust in the context of IoT adoption. Our model for IoT adoption is based on existing literature and includes the components of Institution-based trust and its antecedents. Through empirical testing, we confirmed that Institution-based trust positively affects IoT adoption at the individual level. Additionally, we found that User confirmation/disconfirmation and familiarity …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
New Insights On Economic Theories Of The Family Firm, James J. Chrisman, Chevy-Hanqing Fang, Silvio Vismara, Zhenyu Wu
New Insights On Economic Theories Of The Family Firm, James J. Chrisman, Chevy-Hanqing Fang, Silvio Vismara, Zhenyu Wu
Business and Information Technology Faculty Research & Creative Works
Research attention to family firms has significantly increased in recent years, with a growing application of economic theories such as agency theory and resource-based theory to explain differences between family firms and nonfamily firms and heterogeneity among family firm populations. Despite this progress, the formulation of an economic theory of family business remains notably absent. Merely applying existing economic theories of the firm to the realm of family business is inadequate, as these general theories fail to incorporate the idiosyncratic aspects of family firms, such as the pursuit of socioemotional wealth. This paper seeks to advance economic theories specific to …
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
An Examination Of The Relationship Between Cheating In Online Classes And Technostress: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper
International Journal for Business Education
This research study investigated the relationship between technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) and faculty perceptions of student cheating in online classes. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems, and other research panels during 2021 (N = 94). Findings from regression analysis indicated that the techno-complexity subconstruct is positively related to a faculty’s perception …
The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga
The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga
Jurnal Administrasi Bisnis Terapan (JABT)
This study intend to evaluate the use of the Human Resources Information System (HRIS) in private organization. User satisfaction is one of the conditions for the successful implementation of information systems. To evaluate this system information, the author uses the conceptual Delone and Mclean information system success model(ISSM). This study employs a quantitative methodology and a survey method. The research sample consists of employees in private organizations engaged in software engineering. To analyze, SPSS is employed by the author in two stages: first validity-reliability examination, second multiple regression tests. The result demonstrated that quality system has a significant affect on …
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Social Engineering Cyber Threats, Young B. Choi, Josh Rubin
Journal of Global Awareness
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz
Education As A Solution To Combat Rising Cybercrime Rates Against Children And Teenagers, Christian Javier Solis-Diaz
Electronic Theses, Projects, and Dissertations
Ninety seven percent (97%) of people between the ages of 3 and 18 are found to be users of technology and internet services daily. This number also correlates with rising cyber crime rates against people in this age bracket. It is found that people between 3 and 18 years old are found to be technologically savvy but often lack the knowledge of how to protect themselves in online environments. Researchers have suggested that cybersecurity awareness training is an effective method at combating common forms of cyberattack such as social engineering. Social engineering attacks are found to make up 98% of …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
E-Commerce Digital Information Transparency And Satisfaction. Can We Have Too Much Of A Good Thing?, Slava Ferguson
E-Commerce Digital Information Transparency And Satisfaction. Can We Have Too Much Of A Good Thing?, Slava Ferguson
All Dissertations
Despite core product and service quality improvements and advances in shopping processes and technology, customers often report being unsatisfied with their online purchases. One plausible reason for lower customer satisfaction rates is too much or too little information that is shared with the customers about their orders. We show that when forming their perceptions about the purchases, customers form digital information satisfaction (DIS) levels as they evaluate supplementary informational services in addition to the core product being purchased. We believe that DIS is one of the dimensions of overall customer satisfaction. We also show that supplementary informational services are essential …
Exploration Of The Implementation Of An Integrated Electronic Laboratory Information Management System On Quality Diagnostics Service Indicators At A County Level Public Hospital In Western Kenya., Kelly Allen
Capstone Collection
Underinvestment in pathology and laboratory capacity caused by low visibility in research and in prioritization by public health leaders results in limited effective healthcare coverage and an estimated 1.1 million premature deaths annually in Low-and-Middle-Income Countries. Kenya’s public health laboratories provide a median 41% of the Essential Diagnostic List to their patients and in Kisumu County, as much as 44.2% of the population has little to no access to essential diagnostics. The government of Kisumu implemented the county Health Laboratory Strategic Plan 2018-2022 to address this public health challenge. Little information exists on the effectiveness of these initiatives and the …
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu
Journal of Cybersecurity Education, Research and Practice
This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …
The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi
The Technology, Organization, And Environment Framework For Social Media Analytics In Government: The Cases Of South Africa And Germany, Brenda M. Scholtz, Khulekani Yakobi
The African Journal of Information Systems
This paper investigates factors influencing the adoption of social media analytics (SMA) for citizen relationship management (CzRM). Three real-world cases of government departments, two in South Africa and one in Germany, were investigated, and focus group discussions were conducted. The technological, organizational, and environmental (TOE) theory and qualitative content analysis guided the data analysis. The findings revealed that in all cases, staff usually conducted a manual analysis of social media and SMA had not been implemented sufficiently to realize its full potential. Insights were obtained from TOE and factors were identified that should be considered for improving the planning of …