Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 617

Full-Text Articles in Management Information Systems

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston Aug 2019

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston

Peter Ralston

Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.

Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.

Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that …


Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin Aug 2019

Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin

Joy Godin

As cloud computing continues to evolve, organizations are finding new ways to store the massive amounts of big data that are collected. Big data storage often require greater flexibility and scalability which can be provided by incorporating NoSQL technologies. NoSQL (Not Only SQL) is quickly becoming a popular approach to store large and unstructured data. This paper looks at the various classifications of NoSQL technologies as well as many of the notable characteristics of the technologies. The authors also describe some deficiencies of using NoSQL and give some explanation to why companies are adopting the technology. The paper concludes with …


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jun 2019

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Ilker Karaca

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network methodologies. Both methods …


"3+ Merk Obat Flu Anak Dan Dewasa Terbaik Di Apotik", Dina Apriana Jun 2019

"3+ Merk Obat Flu Anak Dan Dewasa Terbaik Di Apotik", Dina Apriana

Jual Herbal Propolis Brazil SM Original

Hallo good people, kembali lagi diweb kami yang mana siap menyediakan informasi terhangat tentang kesehatan beserta obatnya. Oh ya, bagi Anda yang mempunyai keluhan entah itu keluhan kronis maupun non kronis. Silahkan hubungi nomer wa kami : 082219005138 atau via konsul langsung dengan cara KLIK DISINI


The Cyber Education Project: Defining Educational Standards For An Emerging Discipline, Jean Blair, Scott Buck, Diana Burley, Allen Parrish, Andrew Phillips May 2019

The Cyber Education Project: Defining Educational Standards For An Emerging Discipline, Jean Blair, Scott Buck, Diana Burley, Allen Parrish, Andrew Phillips

Jean Blair

No abstract provided.


Mis 599 Research Paper - Final Copy V1.00.Docx, Jacob Huinker May 2019

Mis 599 Research Paper - Final Copy V1.00.Docx, Jacob Huinker

Jacob Huinker

No abstract provided.


Development Of An It Balanced Scorecard, Theophilus B. A. Addo, Chee W. Chow, Kamal M. Haddad Mar 2019

Development Of An It Balanced Scorecard, Theophilus B. A. Addo, Chee W. Chow, Kamal M. Haddad

[STREAMING^TV] DIJON PSG MATCH EN DIRECT LIVE DU MARDI

There is a generally acknowledged dearth of metrics for effectively measuring organizational performance. This is particularly true of the IT function, whose contribution to a firm's "bottom line" has been frequently called to question. This paper describes the development of a performance measurement tool called the Balanced Scorecard, which can be used to assess IT performance within the cordetU of overall corporate strategy and financial performance. Data for the scorecard was obtained via a sur^'ey of senior IT executives in various organizations. The paper concludes with a set of guidelines for successfully implementing an IT Balanced Scorecard, as well as …


Online Word-Of-Mouth And Mobile Product Reviews:An Experimental Investigation Of The Mediating Role Of Mobile Self Efficacy, Christopher P. Furner, Robert A. Zinko, Zhen Zhu, William Mcdowell, Adam Dalton Mar 2019

Online Word-Of-Mouth And Mobile Product Reviews:An Experimental Investigation Of The Mediating Role Of Mobile Self Efficacy, Christopher P. Furner, Robert A. Zinko, Zhen Zhu, William Mcdowell, Adam Dalton

Adam Dalton

Online word-of-mouth (WOM) has been studied extensively by electronic commerce researchers, particularly in the realm of online product reviews. As mobile computing becomes more and more common, difference in navigation and the ability to foster focus may lead to changes in the way in which consumers read and react to mobile product reviews compared to online reviews. We use research related to mobile computing limitations, Mobile Self Efficacy and information overload to outlines a study in which two common online review outcomes, trust in the review and purchase intention are evaluated in a mobile environment.


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Jan 2019

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

J. Philip Craiger, Ph.D.

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …


Responding To Cybersecurity Challenges: Securing Vulnerable U.S. Emergency Alert Systems, Andrew Green, Amy B. Woszczynski Dec 2018

Responding To Cybersecurity Challenges: Securing Vulnerable U.S. Emergency Alert Systems, Andrew Green, Amy B. Woszczynski

Amy B. Woszczynski

U.S. emergency alert systems (EASs) are part of the nation's critical infrastructure. These systems are built on aging platforms and suffer from a fragmented interconnected network of partnerships. Some EASs have an easily identifiable vulnerability - their management website is available via the Internet. Authorities must secure these systems quickly. Other concerns exist, primarily the lack of policies for reporting vulnerabilities. To begin an assessment of U.S. EASs, we used Shodan to evaluate the availability of these websites in six southeastern states. We found 18 such websites that were accessible via the Internet, only requiring user credentials to login to …


Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani Nov 2018

Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani

Shaji Khan

Mindfulness is a cognitive process that facilitates the discovery and correction of errors that might escalate. This study applies mindfulness theory to examine the impact of top management support for information systems on collective mindfulness, and that of collective mindfulness on IS performance. It treated such mindfulness in five dimensions, and top management support and IS performance as uni-dimensional. Forty-seven chief executive officers responded to a survey asking their perceptions of the constructs. Top management support predicted four of the dimensions with the strongest effect on sensitivity to IS operations. A negative path from support to commitment to IS resilience …


User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower Sep 2018

User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower

Dinesh Mirchandani

Given the large time and fitiancial commitment that an ERP project requires and the potential benefits it can offer if successfidly implemented, it is important to understand the factors that facilitate and inhibit the success ofEP,P implementation. By means of a case study of a global energy company, we first examine the factors that facilitate and inhibit the success of their ERP implementation. We draw on the theory of business process change when analyzing the implementation process. Next, we examine the perceptions non-management professional users of the ERP system (who were not members of the ERP implementation team) have of …


Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik Jul 2018

Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik

Eric A. Kowalik

Learning management systems (LMS) are widely used in education. They offer the potential for assessing student learning, but the reality of using them for this is problematic. This case study chronicles efforts by librarians at Marquette University to use LMS data to assess students’ information literacy knowledge in Marquette’s first-year English program.


2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy Jan 2018

2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy

Karthikeyan Umapathy

The Florida Data Science for Social Good (FL-DSSG) Program is a summer internship program that matches data science expertise with real-world problems. The FL-DSSG program works with community organizations who are trying to affect change in their communities and who have data management, analysis, and data visualization projects that have the potential to shift understanding around a community issue, influence planning, revise practices, or see efforts in supporting community initiatives more focused or renewed. The mission of the FL-DSSG is to promote data-informed approaches and partners and the partners who use these approaches solve wicked social problems while creating educational …


Https://Www.Fitnesscarezone.Com/Nuvo-Ketosis/, Tujam Ejahin Dec 2017

Https://Www.Fitnesscarezone.Com/Nuvo-Ketosis/, Tujam Ejahin

Tujam Ejahin


Nuvo Ketosis All for a simple life for our clients, Nuvo Ketosis can organize all your travel wants ie; aggressive airfares, travel insurance, accommodation and so on., inform us what you need and well make it happen. The Africans of South Africa have been and can all the time be part and parcel of the natural world, geographical, religious,cultural, customary, conventional, linguistic and something that when identified as South African, they are it and half and parcel thereof. We treat single travellers the same as the remainder of the group, which is why we do not charge single supplements. Although …


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Nov 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. Nov 2017

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Dale H Shao

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender, including …


Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr. Nov 2017

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Dale H Shao

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in …


An Examination Of A Theory Of Embodied Social Presence In Virtual Worlds, Brian E. Mennecke, Janea L. Triplett, Lesya M. Hassall, Zayira Jordán Conde, Rex Heer Jun 2017

An Examination Of A Theory Of Embodied Social Presence In Virtual Worlds, Brian E. Mennecke, Janea L. Triplett, Lesya M. Hassall, Zayira Jordán Conde, Rex Heer

Lesya Hassall

In this article, we discuss and empirically examine the importance of embodiment, context, and spatial proximity as they pertain to collaborative interaction and task completion in virtual environments. Specifically, we introduce the embodied social presence (ESP) theory as a framework to account for a higher level of perceptual engagement that users experience as they engage in activity-based social interaction in virtual environments. The ESP theory builds on the analysis of reflection data from Second Life users to explain the process by which perceptions of ESP are realized. We proceed to describe implications of ESP for collaboration and other organizational functions.


When Size Does Matter: Identifying Multilevel Factors Contributing To It Major Choice, Andy Luse, Julie Rursch, Doug Jacobson Jun 2017

When Size Does Matter: Identifying Multilevel Factors Contributing To It Major Choice, Andy Luse, Julie Rursch, Doug Jacobson

Julie Rursch

The current enrollment crisis in information technology (IT) has left employers scrambling to find qualified individuals to fill positions in IT within the corporation. One issue facilitating this dearth of workers is the lack of individuals pursuing IT-related majors. This research uses high school students to investigate the reasons behind individual choice to major in IT. Social Cognitive Career Theory (SCCT) is used as a theoretical framework for better understanding these decisions and group-level contextual supports/barriers are investigated in a multilevel context. Findings show strong support for school size as a significant school-level predictor of intention to major in IT …


A Design Methodology And Implementation For Corporate Network Security Visualization: A Modular-Based Approach, Andy Luse, Brian E. Mennecke, Janea L. Triplett, Nate Karstens, Doug Jacobson Jun 2017

A Design Methodology And Implementation For Corporate Network Security Visualization: A Modular-Based Approach, Andy Luse, Brian E. Mennecke, Janea L. Triplett, Nate Karstens, Doug Jacobson

Douglas Jacobson

Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.


Provider Reimbursement Following The Affordable Care Act, Brandon Bowling, David Newman, Craig White, Ashley Wood, Alberto Coustasse Dr. Ph, Md, Mba May 2017

Provider Reimbursement Following The Affordable Care Act, Brandon Bowling, David Newman, Craig White, Ashley Wood, Alberto Coustasse Dr. Ph, Md, Mba

Alberto Coustasse, DrPH, MD, MBA, MPH

Decreasing healthcare expenditure has been one of the main objectives of the Affordable Care Act (ACA). To achieve this goal, the Centers for Medicare and Medicaid Services (CMS) has been tasked with experimenting with provider reimbursement methods in an attempt to increase quality, while decreasing costs. The purpose of this research was to study the effects of the ACA on physician reimbursement rates from CMS to determine the most cost effective method of delivering healthcare services. CMS has experimented with payment methods in an attempt to increase cost effectiveness. Medicare has offered shared cost savings incentives to reward quality care …


The Trends In Dtca And Effects Of Dtca By Pharmaceutical Firms In The United States, Sathorn Preechavuthinant, William K. Willis Drph, Alberto Coustasse Drph, Md, Mba May 2017

The Trends In Dtca And Effects Of Dtca By Pharmaceutical Firms In The United States, Sathorn Preechavuthinant, William K. Willis Drph, Alberto Coustasse Drph, Md, Mba

Alberto Coustasse, DrPH, MD, MBA, MPH

The Direct-to-Consumer Advertising (DTCA) of pharmaceutical firms has been defined as an attempt of pharmaceutical companies to advertise products directly to patients (comsumers). Pharmaceutical DTCA has been criticized due to its inappropriateness and some urged the need to strengthen regulations. The DTCA has an impact on the public from both a benefit and harm concern. The purpose of this study is to investigate the current trend of pharmaceutical DTCA in the US and its effect on patients, physicians, and drug utilization. The methodology used in the research is literature review and semi-structured interview. The pharmaceutical DTCA showed reduction in total …


Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly Mar 2017

Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly

Amy J Connolly

This position paper reviews the existing information systems (IS) research literature related to the nonprofit context and recommends how to significantly progress this research. The conducted literature review shows that very few studies have focused on nonprofit organizations (NPO). Our analysis indicates that IS researchers have investigated a limited number of issues in NPO contexts including potential research frameworks, strategic use of websites, the role of IS leadership, data management, IS adoption, IS use, and information security policies. Non-IS researchers have examined IS adoption, accountability, and social media usage. Studies that address IS use in the nonprofit context lack theoretical …


Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly Mar 2017

Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly

Amy J Connolly

This position paper reviews the existing information systems (IS) research literature related to the nonprofit context and recommends how to significantly progress this research. The conducted literature review shows that very few studies have focused on nonprofit organizations (NPO). Our analysis indicates that IS researchers have investigated a limited number of issues in NPO contexts including potential research frameworks, strategic use of websites, the role of IS leadership, data management, IS adoption, IS use, and information security policies. Non-IS researchers have examined IS adoption, accountability, and social media usage. Studies that address IS use in the nonprofit context lack theoretical …


Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly Mar 2017

Data Analytics As A Conduit For Progressing Information Systems Research In Nonprofit Organizations, Karthikeyan Umapathy, Amy J. Connolly

Karthikeyan Umapathy

This position paper reviews the existing information systems (IS) research literature related to the nonprofit context and recommends how to significantly progress this research. The conducted literature review shows that very few studies have focused on nonprofit organizations (NPO). Our analysis indicates that IS researchers have investigated a limited number of issues in NPO contexts including potential research frameworks, strategic use of websites, the role of IS leadership, data management, IS adoption, IS use, and information security policies. Non-IS researchers have examined IS adoption, accountability, and social media usage. Studies that address IS use in the nonprofit context lack theoretical …


Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta Jan 2017

Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta

Lori Peterson

Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1,772 physicians on …


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick Jan 2017

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Walter Rom

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …