Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 52

Full-Text Articles in Management Information Systems

Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin Dec 2020

Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin

Mountain Plains Journal of Business and Technology

Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.

The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity …


Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti Dec 2020

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


Contingency Planning Amidst A Pandemic, Natalie C. Belford Oct 2020

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin Oct 2020

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman Oct 2020

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus Oct 2020

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …


Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar Oct 2020

Challenges To Adopting Hybrid Methodology: Addressing Organizational Culture And Change Control Problems In Enterprise It Infrastructure Projects, Harishankar Krishnakumar

Dissertations and Theses

IT infrastructure projects have long been an overlooked field superseded by the more popular software development silos and cross-functional project teams when it comes to enterprise Agile transformations. This paper presents a systematic literature review by leveraging a qualitative research methodology based on empirical evidence provided in contemporary scholarly research articles to explore how certain variables such as organizational culture- including team structure, leadership hierarchy, geolocation, etc. along with an organization’s change management processes affect the adoption of a Hybrid/Agile project management methodology, focusing on reported challenges and critical success factors that define such large-scale enterprise transformations. The salient features …


The Difficulty With Introducing Project Management Techniques In Digital Startups, Isabela Mantilla Oct 2020

The Difficulty With Introducing Project Management Techniques In Digital Startups, Isabela Mantilla

Dissertations and Theses

Digital startups face complex issues when it comes to accurately using project management techniques because of the startup’s scarcity of resources and the governance of projects , such as having different stages of growth and development. Since project management is needed in almost all businesses, dealing with this problem is important to improve the growth of startups and their organizational issues. Because of the correlation between startups using traditional project management techniques and their problems with implementing project management, this traditional model might not be relevant for startups. Startups seem to require more flexible and quick solutions to project management, …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Contracting Mechanisms For Stable Sourcing Networks, Jennifer K. Ryan, Lusheng Shao, Daewon Sun Oct 2020

Contracting Mechanisms For Stable Sourcing Networks, Jennifer K. Ryan, Lusheng Shao, Daewon Sun

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Problem definition: We study profit allocation for a sourcing network, in which a buyer sources froma set of differentiated suppliers with limited capacity under uncertain demand for the final product. Whereas the buyer takes the lead in forming the sourcing network and designing the contract mechanism, due to their substantial bargaining power, the suppliers take the lead in determining the terms of the contract. Academic/practical relevance: We identify contracting mechanisms that will ensure the stability of the sourcing network in the long term, where a stable sourcing network requires an effective profitallocation scheme that motivates all members to …


Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet Sep 2020

Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet

Markets, Globalization & Development Review

In the past few years, big Social Media networks like Facebook, Twitter, and YouTube have received intense scrutiny from the intellectual classes. This article critiques the dominant strain of criticism, the neo-Brandeisian School of antitrust, for its narrow focus on “regulated competition” as an appropriate means to “fix social media”. This essay calls for a socialist alternative: a democratic social media commons based on free and open source technology, decentralization, and democratic socialist legal solutions. It reviews how existing solutions like the Fediverse and LibreSocial work, and how they may provide answers for a better way forward.


Tree-Based Algorithm For Stable And Efficient Data Clustering, Hasan Aljabbouli, Abdullah Albizri, Antoine Harfouche Sep 2020

Tree-Based Algorithm For Stable And Efficient Data Clustering, Hasan Aljabbouli, Abdullah Albizri, Antoine Harfouche

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

The K-means algorithm is a well-known and widely used clustering algorithm due to its simplicity and convergence properties. However, one of the drawbacks of the algorithm is its instability. This paper presents improvements to the K-means algorithm using a K-dimensional tree (Kd-tree) data structure. The proposed Kd-tree is utilized as a data structure to enhance the choice of initial centers of the clusters and to reduce the number of the nearest neighbor searches required by the algorithm. The developed framework also includes an efficient center insertion technique leading to an incremental operation that overcomes the instability problem of the K-means …


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


The Impact Of Autonomous Vehicles, Preston Loveland Aug 2020

The Impact Of Autonomous Vehicles, Preston Loveland

Marriott Student Review

In this article, Preston Loveland delves into the innovations of autonomous vehicles. He outlines the safety, benefits, and public opinion of self-driving cars while inviting the reader to become part of this innovation.


A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku Jul 2020

A Coordinated Communication & Awareness Approach For Information Security Incident Management: An Empirical Study On Ethiopian Organizations, Keshnee Padayachee, Elias Worku

The African Journal of Information Systems

The coordination of communication and awareness efforts in the process of Information Security Incident Management (ISIM) has been identified as a critical means of enhancing information security protection in organizations. This paper aims to explore the nuances of organizational information security with respect to the coordination of communication and awareness efforts among organizational stakeholders towards achieving a shared, interactive, and participatory ISIM. According to the findings of the study in the organizations sampled, it has been identified that reporting, communication, and awareness efforts within ISIM were found to be largely uncoordinated. The exploratory findings provided a rationale for the proposal …


Factors Affecting Mobile Payment Adoption By Merchants In Ethiopia, Firehiwot Abebe, Lemma Lessa Jul 2020

Factors Affecting Mobile Payment Adoption By Merchants In Ethiopia, Firehiwot Abebe, Lemma Lessa

African Conference on Information Systems and Technology

Nowadays the world witnessed a rapid growth in mobile commerce and widespread use of mobile devices. The growth of mobile commerce depends on widely accepted mobile payment systems. However, this trend is not well experienced in developing countries like Ethiopia. Even though merchants somehow benefited from the rapid growth in electronics commerce and use of mobile devices in ecommerce, they still hesitate to effectively employ in their day to day transactions. Little research has been conducted to examine and explain the merchants' views on the new payment technology. In this paper, we explore the factors that affect merchants’ adoption of …


Outcomes Of Platform Openness In Complementary Markets, Franck Loic Soh Noume Jul 2020

Outcomes Of Platform Openness In Complementary Markets, Franck Loic Soh Noume

Graduate Theses and Dissertations

Mobile platform ecosystems are hyper-competitive environments. They provide important entrepreneurial opportunities for businesses that develop mobile apps. Platform openness is foundational in mobile platform ecosystems as it enables interactions between complements and platform. Although there are several studies on the impact of platform openness, our understanding of the outcomes of platform openness remains limited. In this dissertation, we examine thoroughly underexplored facets of platform openness as well as understudied outcomes. In the first essay, we investigate the impact of platform openness on incumbent complements’ performance outcomes. We unravel important causal mechanisms related to competition dynamics between new entrants and incumbent …


Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi Jun 2020

Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

Journal of Cybersecurity Education, Research and Practice

Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …


Family Ownership And Corporate Environmental Responsibility: The Contingent Effect Of Venture Capital And Institutional Environment, Zhu Zhu, Feifei Lu Jun 2020

Family Ownership And Corporate Environmental Responsibility: The Contingent Effect Of Venture Capital And Institutional Environment, Zhu Zhu, Feifei Lu

Department of Management Faculty Scholarship and Creative Works

As scholars and policy makers pay more attention to the environmental impact of economic activities, more focus has been placed on the corporate environmental responsibility (CER) of family firms, which accounts for the majority of businesses in both developed and developing countries. Using a sample of 4714 private enterprises across 23 provinces in China, the current study examines the effect of family ownership on CER investment, as well as the moderating effects of venture capital investment and local institutional development. Results show that concentrated family ownership leads to lower CER spending, however, when venture capital investment comes from developed markets, …


Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon Jun 2020

Creating Accountability And Increasing Efficiency By Implementing An It Service Management Solution, Priscilla Leon

Electronic Theses, Projects, and Dissertations

Creating a culture that values accountability and efficiency is a difficult task for any organization. Without metrics or systems in place to help with these problems, the task becomes nearly impossible. The focus shifts from accountability to covering your tracks and decreased efficiency are usually blamed on external factors. In higher education, the problem is far more severe. Management leadership and staff are accountable to the stakeholders of higher education, such as the students, community, and faculty. A lack of accountability and a decrease in efficiency, in the Education Department, have led to a need for a technological solution that …


Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez Apr 2020

Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez

Communications of the IIMA

The increasing complexity of information technology, attacks on confidential information, and the passing of new laws and regulations have shifted the focus around internal controls in organizations. Particularly, general information technology controls related to change management (i.e., system change controls) are critical in ensuring the integrity, completeness, and reliability of financial information. The literature points to various evaluation methods for these controls to determine which ones to implement. However, these methods do not necessarily consider relevant organization constraints, preventing the inclusion of required controls or the exclusion of unnecessary controls. This paper proposes a novel approach, using Desirability Functions, for …


2020 Ijbe Front Matter Apr 2020

2020 Ijbe Front Matter

International Journal for Business Education

  1. Editorial Board
  2. Letter from International President
  3. SIEC-ISBE International


Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu Mar 2020

Cyberbullying Among University Students: The Kenyan Experience, Joshua R A Ndiege, Gabriel Okello, Patrick K. Wamuyu

The African Journal of Information Systems

Although considerable literature has grown around cyberbullying, there are still only limited studies on this within developing economies, especially African countries. In particular, studies on cyberbullying in Africa have failed to have a direct focus on the prevalence of this phenomenon among students in universities. Not only does cyberbullying have an emotional-social impact, it has ramifications on the learning process as well. This subject remains of utmost relevance within academia, and a number of institutions continue to grapple with its impact. The study reported here is an exploratory investigation of 396 students from one of the private universities within Nairobi, …


Chronic Disease Management: How It And Analytics Create Healthcare Value Through The Temporal Displacement Of Care, Steve M. Thompson, Johnathan Whitaker, Rajiv Kohli, Craig Jones Mar 2020

Chronic Disease Management: How It And Analytics Create Healthcare Value Through The Temporal Displacement Of Care, Steve M. Thompson, Johnathan Whitaker, Rajiv Kohli, Craig Jones

Finance Faculty Publications

The treatment of chronic diseases consumes 86% of U.S. healthcare costs. While healthcare organizations have traditionally focused on treating the complications of chronic diseases, advances in information technology (IT) and analytics can help clinicians and patients manage and slow the progression of chronic diseases to result in higher quality of life for patients and lower healthcare costs.

We build on prior research to introduce the notion of temporal displacement of care (TDC), in which IT and analytics create healthcare value by displacing the time at which providers and patients make interventions to improve healthcare outcomes and reduce costs. We propose …


Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray Mar 2020

Implementing The Malcolm Baldrige Process For A Financial Institution: An Insiders Perspective, Scott Murray

Electronic Theses, Projects, and Dissertations

The Malcolm Baldrige Framework for Performance Excellence outlines best practices for strategic and operational processes. Enterprises that achieve the award do so not for the award itself – but for the transformation that takes place along the way. Although the fifty-page summaries of Malcolm Baldrige award winning organizations are posted on the National Institute of Science and Technology (NIST) (https://www.nist.gov/baldrige/award-recipients), the process and effort used to create such applications has not been documented. This project documents and provides an internal perspective and lessons learned from the early stages of the Malcolm Baldrige journey for a medium size financial institution. The …


Building Coca-Cola’S Customer Data Platform, Singapore Management University Feb 2020

Building Coca-Cola’S Customer Data Platform, Singapore Management University

Perspectives@SMU

The beverages giant brings marketing technology in-house by focusing on first party data and a hands-on, real-time approach to marketing campaigns


Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas Jan 2020

Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas

Journal of Cybersecurity Education, Research and Practice

Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …


Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta Jan 2020

Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta

Journal of Cybersecurity Education, Research and Practice

Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …


An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius Jan 2020

An Assessment Of Practical Hands-On Lab Activities In Network Security Management, Te-Shun Chou, Nicholas Hempenius

Journal of Cybersecurity Education, Research and Practice

With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network security management for students assist them in becoming network security professionals.

The objective of this paper is to introduce a variety of techniques related to network security management, such as Simple Network Management Protocol (SNMP), event management, security policy management, risk management, access control, and remote monitoring. With the …