Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

None

Selected Works

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 115

Full-Text Articles in Management Information Systems

Innovationspotentialanalyse Für Die Neuen Technologien Für Das Verwalten Und Analysieren Von Großen Datenmengen (Big Data Management), Volker Markl, Alexander Löser, Thomas Hoeren, Helmut Krcmar, Holmer Hemsen, Michael Schermann, Matthias Gottlieb, Christoph Buchmüller, Philip Uecker, Till Bitter Apr 2016

Innovationspotentialanalyse Für Die Neuen Technologien Für Das Verwalten Und Analysieren Von Großen Datenmengen (Big Data Management), Volker Markl, Alexander Löser, Thomas Hoeren, Helmut Krcmar, Holmer Hemsen, Michael Schermann, Matthias Gottlieb, Christoph Buchmüller, Philip Uecker, Till Bitter

Michael Schermann

Die vorliegende Studie wurde durch einen Auftrag des BMWi zum Thema „Innovationspotentialanalyse für die neuen Technologien für das Verwalten und Analysieren von großen Datenmengen (Big Data Management)“ ermöglicht. Für das in uns gesetzte Vertrauen und die finanzielle Unterstützung möchten wir uns daher beim BMWi bedanken. Zudem möchten wir Frau Dr. Regine Gernert (Projektträger DLR) ganz herzlich Dank sagen für die fachliche und organisatorische Begleitung der Studie. Wir bedanken uns zudem bei den zahlreichen Mitarbeitern der jeweiligen Institute, die durch kritische Durchsicht der Studie und Kommentare dazu beigetragen haben die Studie zu verbessern. Für die Umsetzung des finalen Layout der Studie …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Clark, Myung Ko Jan 2016

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Clark, Myung Ko

Humayun Zafar

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


The Impact Of Team Member Familiarity On Communication Media Use And Subsequent Project Performance, Priscilla Arling, Hongjiang Xu Jan 2016

The Impact Of Team Member Familiarity On Communication Media Use And Subsequent Project Performance, Priscilla Arling, Hongjiang Xu

Priscilla Arling

This study explores how team member familiarity is related to the communication media used in the completion of projects and how that use impacts project performance. We surveyed 148 university undergraduate students who were enrolled in information systems courses. The students worked on projects in teams of 3 to 4 students. The results suggest that prior collaboration with current te am members, as well as a stude nt’s class year, are related to what communication media are used. The influen ce of team member familiarity and class year varies by the type of media used. We also find that higher …


Toward More Effective Implementation Of Evidence-Based Practice: Relational And Contextual Considerations, Priscilla Arling, Rebekah Fox, Bradley Doebbeling Jan 2016

Toward More Effective Implementation Of Evidence-Based Practice: Relational And Contextual Considerations, Priscilla Arling, Rebekah Fox, Bradley Doebbeling

Priscilla Arling

Priscilla Arling's contribution to Handbook of Healthcare Delivery Systems. London: Taylor & Francis, 2010.


Leveraging Social Networks And Team Configuration To Enhance Knowledge Access In Distributed Teams, Priscilla Arling, Mani Subramani Jan 2016

Leveraging Social Networks And Team Configuration To Enhance Knowledge Access In Distributed Teams, Priscilla Arling, Mani Subramani

Priscilla Arling

Increasingly organizations are utilizing geographically distributed teams to accomplish their goals. To a great extent this new way of working has been made possible by electronic communication technology. Yet even while managers are leveraging electronic communication technology to gain access to new knowledge and to enable new team configurations, they are concerned about the knowledge acquisition of distributed team members who interact primarily via electronic communication. The objective of this study is to deepen our understanding of the relationship of electronic communication technology use and team configuration with knowledge access in distributed teams. We do so by examining the communication …


Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter Dec 2015

Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter

Shahriar Akter

No abstract provided.


Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz Dec 2015

Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz

Shahriar Akter

mHealth (healthcare using mobile wireless technologies) has the potential to improve healthcare and the quality of life for elderly and chronic patients. Many studies from all over the world have addressed this issue in view of the aging population in many countries. However, there has been a lack of any consolidated evidence-based study to classify mHealth from the dual perspectives of healthcare and technology. This paper reports the results of an evidence-based study of mHealth solutions for chronic care amongst the elderly population and proposes a taxonomy of a broad range of mHealth solutions from the perspective of technological complexity. …


Strategic It Alignment: 25 Years On, Tim Coltman, Paul Tallon, Rajeev Sharma, Magno Queiroz Dec 2014

Strategic It Alignment: 25 Years On, Tim Coltman, Paul Tallon, Rajeev Sharma, Magno Queiroz

Magno Queiroz

No abstract provided.


Security Risk Management At A Fortune 500 Firm: A Case Study, Humayun Zafar Jul 2014

Security Risk Management At A Fortune 500 Firm: A Case Study, Humayun Zafar

Humayun Zafar

Information security is a naturally intrusive topic that has not been researched to its full extent in IS. Taking note of a previous information security study that failed and lessons learned from it, we successfully carry out a study of our own with some modifications. The purpose of the study was to successfully identify critical success factors for an effective security risk management program at a Fortune 500 firm. In this paper we detail the modified critical success factor method that was used, which we hope will prove beneficial for academic researchers. The study has practical implications in regard to …


Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy Woszczynski, P. Dembla, Sherri Shade Jun 2014

Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy Woszczynski, P. Dembla, Sherri Shade

Sherri Shade

No abstract provided.


Using Neural Input To Control Google Glass, Adriane Randolph, Benjamin Warren, Stephen Krontz, Joshua Pate May 2014

Using Neural Input To Control Google Glass, Adriane Randolph, Benjamin Warren, Stephen Krontz, Joshua Pate

Adriane B. Randolph

No abstract provided.


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord May 2014

Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Readings and Cases in Information Security: Law & Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.


Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord May 2014

Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord

Herbert J. Mattord

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Rethinking Risk-Based Information Security, Herbert Mattord May 2014

Rethinking Risk-Based Information Security, Herbert Mattord

Herbert J. Mattord

The information security discipline has a common body of knowledge comprised of many facts, techniques, and ways for its practitioners to accomplish the objectives of securing the information assets of the companies by which they are employed. Sometimes these practitioners simply do things the way they have always been done. Perhaps some of the practices need to be reexamined. One that needs attention is the way that risk-based decision making is applied in places that it may not improve the outcomes of the problems being addressed.


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Making Users Mindful Of It Security, Michael Whitman, Herbert Mattord May 2014

Making Users Mindful Of It Security, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The article discusses ways to make users mindful of Information Technology (IT) security. Security awareness programs ensure that employees understand the importance of security and the adverse consequences of its failure; they also remind users of the procedures to be followed. Awareness training is vital to keeping the idea of IT security uppermost in employees' minds. While federal agencies in the U.S. are required to train employees in computer security awareness, such training is voluntary in the private sector. It is, however, no less vital. Every company should integrate a security awareness program into the IT training program.


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Principles Of Information Security, 5th Edition (Forthcoming), M. Whitman, Herbert Mattord Dec 2013

Principles Of Information Security, 5th Edition (Forthcoming), M. Whitman, Herbert Mattord

Herbert J. Mattord

No abstract provided.


The Applicability Of Neurally-Controlled Devices In Business: A Student Perspective, Adriane Randolph Dec 2013

The Applicability Of Neurally-Controlled Devices In Business: A Student Perspective, Adriane Randolph

Adriane B. Randolph

No abstract provided.


Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar Oct 2013

Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar

Jennifer L. Priestley

No abstract provided.


The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar Oct 2013

The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar

Jennifer L. Priestley

Organizations join multi-organizational networks in part to mitigate environmental uncertainties and to access knowledge. However, the transfer of knowledge cannot be assumed simply as a function of network membership. Researchers in the area of knowledge management have identified several factors that have been found to affect the transfer of knowledge within, between, and among organizations. This chapter investigates specifically how organizational ambiguity impacts the transfer of knowledge within multi-organizational networks. The authors explore the effects of casual ambiguity, defined as the ambiguity relateaad to imputs and factors, in a multi-organizational context, and discuss the existence of a previously undefined ambiguity, …


Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley Oct 2013

Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley

Jennifer L. Priestley

No abstract provided.


Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe May 2013

Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe

Adriane B. Randolph

No abstract provided.