Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- BI System (1)
- Business (1)
- Business Intelligence (BI) (1)
- Call Centers (1)
- Computer users (1)
-
- Data Breach Investigation Report (1)
- Decision Trees (1)
- Employee compliance (1)
- Information security (1)
- Java Applets (1)
- Journal Articles (1)
- Security awareness (1)
- Security compliance (1)
- Security policies (1)
- Service Levels (1)
- Training procedures (1)
- Verizon RISK Team (1)
- Web browsing behaviors (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Management Information Systems
Java Applet Awareness Impacting User Web Browsing Behavior, Norilyz Figueroa
Java Applet Awareness Impacting User Web Browsing Behavior, Norilyz Figueroa
Honors Thesis Program in the College of Management
The purpose of this study is to investigate the web browsing behaviors of computer users and how awareness about threats impacts their behaviors. This research focused on how users behave towards web browser alerts which prompt users to install Java Applets. Applets have become common tools for enhancing user experience. However, installing these features overrides security mechanisms inherent in browsers and provides complete access to users’ computing resources. A survey was administered to two separate groups of students from the University of Massachusetts Boston to collect data. The first group took the survey after being given a few details about …
Employee Compliance With Information Systems Security Policy In Retail Industry. Case: Store Level Employees, Bertrand Muhire
Employee Compliance With Information Systems Security Policy In Retail Industry. Case: Store Level Employees, Bertrand Muhire
Honors Thesis Program in the College of Management
In this digital era, information has become a very important component to any type of organizations. For some, it is not only an important component of daily routine operations but also required for competitive advantage. From big corporations to small businesses, non-profit organizations and governments, organizations need to safeguard and secure their information by implementing information security policies and make sure that all employees comply with such policies.
Since information is growing faster than in the previous decades, there is a need to safeguard and manage that information efficiently and effectively in order to make it useful. One of the …
Technology Assimilation Across The Value Chain: An Empirical Study Of Small And Medium-Sized Enterprises, Pratyush Bharati, Abhijit Chaudhury
Technology Assimilation Across The Value Chain: An Empirical Study Of Small And Medium-Sized Enterprises, Pratyush Bharati, Abhijit Chaudhury
Management Science and Information Systems Faculty Publication Series
No abstract provided.
Using Business Intelligence For Operational Decision-Making In Call Centers, Eric Kyper, Michael Douglas, Roger Blake
Using Business Intelligence For Operational Decision-Making In Call Centers, Eric Kyper, Michael Douglas, Roger Blake
Management Science and Information Systems Faculty Publication Series
This paper proposes an operational business intelligence system to help achieve operational excellence in insurance call centers. We apply a decision tree based solution to collected data using a sliding window approach. Our solution provides two distinct advantages to call center managers. First, the decision trees allow managers to recognize key factors and the role they play in determining service levels. Second, our sliding window approach allows managers to see the effects on service levels of resource reallocation. Collected data from a large U.S. insurance company is analyzed. Initial results provide good insight into factors affecting this firm’s call center …