Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Management Information Systems

Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates Jan 2020

Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates

Information Systems and Analytics Department Faculty Journal Articles

This study examines how the Twittersphere talked about candidates running for the U.S senate in the 2018 congressional elections. We classify Twitter users as Liberal or Conservative to better understand how the two groups use social media during a major national political election. Using tweet sentiment, we assess how the Twittersphere felt about in-group party versus out-group party candidates. When we further break these findings down based on the candidates’ gender, we find that male senatorial candidates were talked about more positively than female candidates. We also find that Conservatives talked more positively about female Republican candidates than they did …


Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer Jan 2019

Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer

Information Systems and Analytics Department Faculty Journal Articles

Blockchain has received increased attention from both the academic and practitioner worlds. Numerous papers have been written on how blockchain works and its potential applications. However, few studies have focused on fraudulent activities on blockchain. The purpose of this study is to understand common issues and scams related to blockchain. A literature review was conducted to identify top security issues on blockchain. In addition, we collected tweets on blockchain fraud discussion from November 6, 2018 to December 31, 2008. The results of tweets analysis show that the most frequently mentioned words in tweets include scams, crypto/cryptocurrency, ICO, Bitcoin, Ethereum,combat/fight, Asia, …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb Jan 2013

Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb

Faculty Publications, Information Systems & Technology

An ongoing project to investigate the use of the internet as an information source for decision support identified the decline of the California deer population as a significant issue. Using Google Alerts, an automated keyword search tool, text and numerical data were collected from a daily internet search and categorized by region and topic to allow for identification of information trends. This simple data mining approach determined that California is one of only four states that do not currently report total, finalized deer harvest (kill) data online and that it is the only state that has reduced the amount of …


Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger Jan 2009

Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger

Faculty Articles

This paper examines previous Technology Acceptance Model (TAM)-related studies in order to provide an expanded model that explains consumers’ acceptance of online purchasing. Our model provides extensions to the original TAM by including constructs such as social influence and voluntariness; it also examines the impact of external variables including trust, privacy, risk, and e-loyalty. We surveyed consumers in the United States and Australia. Our findings suggest that our expanded model serves as a very good predictor of consumers’ online purchasing behaviors. The linear regression model shows a respectable amount of variance for Behavioral Intention (R2 = .627). Suggestions are provided …


A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton Jan 2008

A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton

Articles

In June of 2007, the United States District Court for the Northern District of Ohio ruled on a motion to dismiss various claims against the Youtube video-sharing service. The claimant was Universal Tube and Rollform Equipment Corp ("Universal"), a manufacturer of pipes and tubing products. Since 1996, Universal has used the domain name utube.com - phonetically the same as Youtube's domain name, youtube.com. Youtube.com was registered in 2005 and gained almost-immediate popularity as a video-sharing website. As a result, Universal experienced excessive web traffic by Internet users looking for youtube.com and mistakenly typing utube.com into their web browsers. Universal's servers …


Dynamic Generation Of A Table Of Contents With Consumer-Friendly Labels, Trudi Miller '08, Gondy Leroy, Elizabeth Wood Jan 2006

Dynamic Generation Of A Table Of Contents With Consumer-Friendly Labels, Trudi Miller '08, Gondy Leroy, Elizabeth Wood

CGU Faculty Publications and Research

Consumers increasingly look to the Internet for health information, but available resources are too difficult for the majority to understand. Interactive tables of contents (TOC) can help consumers access health information by providing an easy to understand structure. Using natural language processing and the Unified Medical Language System (UMLS), we have automatically generated TOCs for consumer health information. The TOC are categorized according to consumer-friendly labels for the UMLS semantic types and semantic groups. Categorizing phrases by semantic types is significantly more correct and relevant. Greater correctness and relevance was achieved with documents that are difficult to read than with …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty Articles

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Enemy At The Gate: Threats To Information Security, Michael E. Whitman Aug 2003

Enemy At The Gate: Threats To Information Security, Michael E. Whitman

Faculty Articles

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.


Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng May 2003

Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng

CGU Faculty Publications and Research

To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. GeneScene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available. The extracted relations were evaluated by qualified researchers and are precise. A qualitative ongoing evaluation of the current online interface indicates that this method to search the literature is more useful and efficient than keyword based searching.