Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgia Southern University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Management Information Systems

Using Information Systems To Help Chatham County With Dental Services, Taylor Gray Apr 2022

Using Information Systems To Help Chatham County With Dental Services, Taylor Gray

Honors College Theses

Due to the extreme lack of access to dental work in Chatham county, this consulting thesis was formed. I assisted the Chatham County Safety Net Planning Council by using information systems to help with dental assistance in the county both short and long term. This is a very important issue in the county and it has caused many issues among people without dental insurance. I helped by creating a website platform for the Chatham County Safety Net, and used data analysis to help make the event more streamlined.


Gamification Usage And Platform Loyalty In Esports Livestreams: An Analysis Of Unobserved Heterogeneity With Fimix-Pls And Ipma, Yizhou Qian, Jeam Martinez, Robbie Matz Jan 2022

Gamification Usage And Platform Loyalty In Esports Livestreams: An Analysis Of Unobserved Heterogeneity With Fimix-Pls And Ipma, Yizhou Qian, Jeam Martinez, Robbie Matz

Association of Marketing Theory and Practice Proceedings 2022

Although gamification as a marketing strategy has been implemented by various domains, there is still a dearth of research on the use of gamification in social livestreams. In this study, we examined the relationships between technology acceptance model (TAM) variables, gamification usage, and loyalty toward a social livestreaming platform, where gamification was adopted to enhance the viewing of an esports event. Data from 396 viewers were analyzed using partial least squares structural equation modeling (PLS-SEM), finite mixture partial least squares (FIMIX-PLS), and importance performance map analysis (IPMA). To this end, our study underpinned the application and extension of TAM in …


Investigating The Influence Of A Web Based Logistics Tool On The Effectiveness Of Operations For The Center Of Innovation For Logistics Of Georgia, David Vaughn Jan 2020

Investigating The Influence Of A Web Based Logistics Tool On The Effectiveness Of Operations For The Center Of Innovation For Logistics Of Georgia, David Vaughn

Honors College Theses

Research suggests a correlation between advancements in logistics infrastructure and the development rate of regional economies. Some states have identified this correlation and have taken steps to create specialized entities aimed at catalyzing the growth of logistics within their state. In the state of Georgia, the Center of Innovation for Logistics is the entity responsible for coordinating logistic development activities. As part of their responsibilities, they are tasked with fulfilling information requests regarding logistics infrastructure availability throughout the state. However, the system is used to process these requests is antiquated and extremely inefficient. In an attempt to ameliorate this process, …


The Application Of Paperless Processes To Improve Data Management Within Small To Medium Businesses, Kelley D. Nemec May 2019

The Application Of Paperless Processes To Improve Data Management Within Small To Medium Businesses, Kelley D. Nemec

Honors College Theses

Businesses are creating new value by implementing new processes built on modern tools. Small businesses, though, with much fewer resources than the most significant competitors, cannot follow the same path. How can these businesses use standard, widely available tools and techniques to improve their processes and create value within their business? This paper discusses the implementation of paperless processes using the electronic form technology, Google Forms, within the Honors Program at Georgia Southern University over two years. Action research methods were used to guide the research and implementation of new processes. Through the introduction of cloud-based electronic forms and process …


Examining And Exposing The Darknet, Ton H. Don Jan 2017

Examining And Exposing The Darknet, Ton H. Don

Electronic Theses and Dissertations

This thesis consists of two studies; the first study is “Diving into the Darknet” and the second is “Exposing the Darknet on Mobile Devices”. The Darknet is a network of hidden sites and services which are built based on anonymity. In “Diving into the Darknet”, we applied different data science methods to establish the relationships between the data in the data set. This data set has information related to seller, drug types, and transactions. Additionally, we used Tableau to visualize the data set. For the second study, we took a digital forensics perspective of the Darknet. Orfox and Orbot, a …


Accounting Information Systems: Ethics, Fraudulent Behavior, And Preventative Measures, Jasmine S. Smith Apr 2016

Accounting Information Systems: Ethics, Fraudulent Behavior, And Preventative Measures, Jasmine S. Smith

Honors College Theses

Most business organizations have implemented Accounting Information Systems to improve efficiency and to help optimize use of company resources. The evolution of Information Technology within financial and accounting processes has brought new ethical issues, forms of fraudulent behavior, and mechanisms to prevent compromising confidential, sensitive, and personal information. This investigation focuses on the evolution of Accounting Information Systems and their controls for limiting fraud and misconduct in financial and accounting processes.


Abet Accreditation Of Is And It Programs In 2013, Ronald J. Mackinnon, Kevin Lee Elder, John N. Dyer Jan 2016

Abet Accreditation Of Is And It Programs In 2013, Ronald J. Mackinnon, Kevin Lee Elder, John N. Dyer

Department of Enterprise Systems and Analytics Faculty Publications

The Accreditation Board for Engineering and Technology (ABET) has been accrediting engineering and computer science for many years. In recent years ABET has been accrediting Information Systems and Information Technology programs. ABET first accredited IS in 2000 and IT in 2003. ABET appears to have become the standard accreditation for IT and in the spring of 2014 there are 25 IT programs accredited by ABET. There are 38 IS programs accredited by ABET since 2000. This paper looks at the IS and IT ABET accredited programs and examines the common features and differences of these related accredited programs.


Web Scraping The Easy Way, Yolande Neil Jan 2016

Web Scraping The Easy Way, Yolande Neil

Honors College Theses

Web scraping refers to a software program that mimics human web surfing behavior by pointing to a website and collecting large amounts of data that would otherwise be difficult for a human to extract. A typical program will extract both unstructured and semi-structured data, as well as images, and convert the data into a structured format. Web scraping is commonly used to facilitate online price comparisons, aggregate contact information, extract online product catalog data, extract economic/demographic/statistical data, and create web mashups, among other uses. Additionally, in the era of big data, semantic analysis, and business intelligence, web scraping is the …


Mapping Relational Algebra Operators Into Sql Queries: A Database Case Study, John N. Dyer, Camille F. Rogers Jan 2015

Mapping Relational Algebra Operators Into Sql Queries: A Database Case Study, John N. Dyer, Camille F. Rogers

Department of Enterprise Systems and Analytics Faculty Publications

Relational algebra operators and mapping to resulting structured query language (SQL) queries are among the most important concepts and skills for students taking a course in database design and implementation, especially those majoring in IS/IT. The most typical relational algebra operators mapped to foundational SQL include unions and intersections, as well as other relational operators applied to these operators, including differences and various joins. Unfortunately, few textbooks or external resources provide ample opportunity for students to apply the full set of most common relational algebra operators mapped to resulting SQL over a single unified case. Most database textbooks exemplify each …


A Post Publication Review Of “Is Project Risks As Emergent Phenomena: Towards A Model Of Risk Escalation And Its Management”, Michael J. Cuellar, Nipon Parinyavuttichai, Angela Y. Lin Jan 2015

A Post Publication Review Of “Is Project Risks As Emergent Phenomena: Towards A Model Of Risk Escalation And Its Management”, Michael J. Cuellar, Nipon Parinyavuttichai, Angela Y. Lin

Department of Enterprise Systems and Analytics Faculty Publications

A short post publication review of a recent AJIS paper.


Roles Of Information Technology In Supply Chain Management, Akhadian S. Harnowo Jan 2015

Roles Of Information Technology In Supply Chain Management, Akhadian S. Harnowo

Electronic Theses and Dissertations

Supply Chain Information Technology (SCIT) is a key enabler of effective supply chain management (SCM) activities. In 2013, $300 billion was spent on SCIT by firms globally, an increase by 1.8% and 3.8% compared to 2012 and 2011, respectively. With such significant investments, firms face risks of eroded financial performance if SCIT does not perform as expected. In fact, there is a mix of evidence with some firms benefiting from SCIT while others failing to benefit from investing in SCIT. Despite substantial research relating to utilizing information technology in a SCM context, the impact of SCIT on firm performance remains …


The Impact Of Cloud Computing In Supply Chain Collaborative Relationships, Collaborative Advantage And Relational Outcomes, Maria E. Aviles Jan 2015

The Impact Of Cloud Computing In Supply Chain Collaborative Relationships, Collaborative Advantage And Relational Outcomes, Maria E. Aviles

Electronic Theses and Dissertations

The purpose of this study is to explore the collaborative advantages and relational outcomes that organizations obtain from having strong collaborative relationships. With business competing as supply chains of multiple relationships, the reliance on inter-firm relationships has increased and become central strategy for organizations. Logistics computing technologies in the cloud may facilitate collaboration in the supply chain, although there are conflicting viewpoints regarding cloud viability. This study also evaluates the effect that cloud computing technology has on collaborative advantage and relational outcomes in small and large organizations. The model developed here is based on a cross-disciplinary theoretical perspective, which combines …


Online Teaching And Learning Project Management, Manouchehr Tabatabaei Jul 2014

Online Teaching And Learning Project Management, Manouchehr Tabatabaei

Department of Enterprise Systems and Analytics Faculty Publications

The number of project management courses in institutions of higher education is increasing to meet the high demand of effective project managers in organizations. Many institutions offer graduate degrees and certificates in project management. Therefore, more online courses in project management are offered in addition to the traditional mode of classroom setting. The purpose of this research is to present the challenges associated with teaching an online project management course, and discuss approaches to enhance learning. The need for a methodology is discussed and components of this methodology are identified for designing and delivering an effective online project management course. …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


The Nature Of Project Success, Michael J. Cuellar Dec 2013

The Nature Of Project Success, Michael J. Cuellar

Michael J. Cuellar

This paper investigates the ontological status of project success. The literature shows that success has historically been considered to be an objective property of a project, one that can be assessed and the status of the project as a success or failure determined. However, this approach is shown to have serious deficiencies in dealing with certain project results. As an alternative, this paper suggests that following the subjective view of project success; success should be considered as a politically determined social construction. The paper advocates using Archer’s Morphogenetic Social Theory (Archer 1995; Cuellar 2010b) to explanatory mechanism. Under that theory, …


Categorizing Efficient Xml Compression Schemes, John N. Dyer Jan 2013

Categorizing Efficient Xml Compression Schemes, John N. Dyer

John N. Dyer

Web services are Extensible Markup Language (XML) applications mapped to programs, objects, databases, and comprehensive business functions. In essence, Web services transform XML documents into and out of information technology systems. As more businesses turn to web services data transfer, XML has become the language of web services. Unfortunately, the structure of XML results in extremely verbose documents, often 3 times larger than ordinary content files. As XML becomes more common through Web services applications, its large file sizes increasingly burden the systems that must utilize it. This paper provides a qualitative overview of existing and proposed schemes for efficient …


Awareness And Usage Of Collaboration And Communication Technologies In Student Teamwork, Manouchehr Tabatabaei, Marco Lam Jan 2013

Awareness And Usage Of Collaboration And Communication Technologies In Student Teamwork, Manouchehr Tabatabaei, Marco Lam

Department of Enterprise Systems and Analytics Faculty Publications

In this study, we investigate students’ awareness and usage of collaboration and communication technologies (CCTs). Coordination and communication are two of the key processes for effective teamwork that have been identified in the literature. We find significant differences in awareness of CCTs between various student groups. However, when controlling for awareness, we find no difference in usage. While the proportion of students that are aware of various CCTs is high, the reported usage of CCTs is low. Because of the increased emphasis on teamwork, students need to be taught the technologies they need to use for collaboration and communication in …


The Current Status Of Abet Accreditation Of Information Systems Programs, Ron Mackinnon, John N. Dyer, Kevin L. Elder Jan 2012

The Current Status Of Abet Accreditation Of Information Systems Programs, Ron Mackinnon, John N. Dyer, Kevin L. Elder

John N. Dyer

As of March 2012 there were 35 Information Systems (IS) programs at 34 universities accredited by the Accreditation Board for Engineering and Technology (ABET). This paper investigates these ABET accredited IS programs to see what these programs have in common and how do they differ from other IS programs. The data was collected by visiting the web pages of the selected IS programs. This paper includes a study of the required IS courses, elective IS courses, required programming courses, required business courses, the title of the IS program (IS/MIS/CIS), the department and college where the IS program was located and …


A Linkedin Analysis Of Career Paths Of Information Systems Alumni, Thomas L. Case, Adrian Gardiner, Paige Rutner, John N. Dyer Jan 2012

A Linkedin Analysis Of Career Paths Of Information Systems Alumni, Thomas L. Case, Adrian Gardiner, Paige Rutner, John N. Dyer

Department of Enterprise Systems and Analytics Faculty Publications

Information harvested from the LinkedIn profiles for 175 graduates of an Information Systems program at a mid-sized comprehensive university in the southeastern USA are summarized in this investigation. The current investigation was undertaken to examine the extent to which LinkedIn profiles are able to provide a more realistic picture of entry-level jobs held by program alumni and subsequent career progress. Additionally, our results suggest that LinkedIn profiles can help answer questions such as: what jobs do IS graduates get, what does the career of an IS professional typically look like, and can IS graduates successfully transition from technical to managerial …


Desk-Top Software Development Using Html Applications, John N. Dyer Jan 2010

Desk-Top Software Development Using Html Applications, John N. Dyer

John N. Dyer

While many business managers today have experience with office productivity software, internet browsing, and html development, few outside of the I.T. field have the knowledge, skills and experience in developing desk-top applications. The purpose of this article is to provide a relatively simple (but little known) method of developing and deploying Windows client-side applications, called html applications (HTA), using html, Windows Scripting Languages (WSL), and Windows COM and Objects. Few standard programming courses (with the exception of Visual Basic (VB)) include topics directly related to Windows application development. A recent literature review found no textbooks or journal articles, and few …