Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty and Research Publications

Discipline
Keyword
Publication Year
File Type

Articles 1 - 30 of 31

Full-Text Articles in Management Information Systems

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty and Research Publications

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Information Security Governance For The Non-Security Business Executive, Michael Whitman, Herbert J. Mattord Jul 2014

Information Security Governance For The Non-Security Business Executive, Michael Whitman, Herbert J. Mattord

Faculty and Research Publications

Information security is a critical aspect of information systems usage in current organizations. Often relegated to the IT staff, it is in fact the responsibility of senior management to assure the secure use and operation of information assets. Most managers recognize that governance is the responsibility of executive management. The primary objective of governance can be achieved when the members of an organization know what to do, how it should be done, as well as who should do it. The focus on governance has expanded to include more aspects of the organizational hierarchy to include information systems and information security. …


Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au Jan 2014

Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au

Faculty and Research Publications

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …


Rethinking Fs-Isac: An It Security Information Sharing Model For The Financial Services Sector, Charles Liu, Humayun Zafar, Yoris A. Au Jan 2014

Rethinking Fs-Isac: An It Security Information Sharing Model For The Financial Services Sector, Charles Liu, Humayun Zafar, Yoris A. Au

Faculty and Research Publications

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord Dec 2013

An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord

Faculty and Research Publications

The purpose of this study is to identify and comparatively assess the quality of information security specific publishing venues. Past studies in information systems and computer science have shown that information security-focused research can be published in mainstream information systems- and computer science-centric periodicals; however no studies to date have been found that specifically compared venues focused primarily on information security. Therefore the results of this study, when combined with assessments of publishing venues from those disciplines, can provide a more comprehensive perspective on publishing opportunities for academic authors in information security. Faculty members seeking research recognition should strive to …


Quality Is Becoming More About Taste And Less About Cost: Eeg And Survey Study On Consumer Behavior, Charnetta Brown, Adriane Randolph, Janee Burkhalter Jan 2013

Quality Is Becoming More About Taste And Less About Cost: Eeg And Survey Study On Consumer Behavior, Charnetta Brown, Adriane Randolph, Janee Burkhalter

Faculty and Research Publications

No abstract provided.


Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash Nov 2012

Perception Of African Youth On Personal Computer Utilization: The Case Of Ethiopia And Rwanda, S. Negash

Faculty and Research Publications

The tendency to pursue innovativeness and adopt new technologies has been found more likely with younger individuals and a strong relationship between attitude and personal computer (PC) utilization has been found. However, research in these areas is mainly focused on high-income countries. Do these findings hold for low-income countries? What are the perceptions of African youth on the factors that impact PC use? There is a dearth of micro-level studies that promote understanding about the behavior of individuals in low-income countries. This study looked at demographic data including age, gender, grade level, region, and prior experience among 228 youth from …


Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord Jan 2012

Threats To Information Security Revisited, Michael Whitman, Herbert J. Mattord

Faculty and Research Publications

The battle for the protection of information assets continues to rage at all organizations, big and small. In the ever-changing world of information security, new threats emerge, and old threats remain potent risks to poorly prepared organizations. It is critical to the ongoing protection of valuable information assets to understand these threats, new and old. This study seeks to inform organizations and researchers about the characteristics of specific threat categories and the relative dangers they pose. In addition, the study provides updated findings of a study conducted in 2002. New findings reveal the more things change, the more they stay …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko Nov 2011

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko

Faculty and Research Publications

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman Oct 2011

Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman

Faculty and Research Publications

Disputes and lawsuits are quite common in business and are often a source of significant liabilities. We conjecture that measurement challenges and lack of adequate analysis tools have greatly inhibited the ability of the General Counsel's offices in selecting the best mode for the resolution (i.e. litigation vs. out-of-court settlement) of business conflicts and disputes. Easily quantified direct costs (e.g., out-of-pocket expenses related to pursuing and defending against litigation) tend to be considered, whereas the more difficult-to-quantify indirect risks and costs (e.g., damaged relationships with customers and potential alliance partners, including reputational harm) which may be quite significant, tend to …


End-User Computing Applications, Mary C. Hill, W. Alan Barnes Jul 2011

End-User Computing Applications, Mary C. Hill, W. Alan Barnes

Faculty and Research Publications

Businesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in these applications has been increased by the requirements of the Sarbanes-Oxley Act of 2002, which call for management to document end-to-end financial operations and internal control structures. This article review …


Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort Jun 2011

Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort

Faculty and Research Publications

This exploratory study examines the role of the audit committee in overseeing information technology (IT) risk. We address the degree of audit committee oversight of specific IT risks, as well as factors associated with variations in audit committee IT oversight. Based on responses from 39 audit committee members, we found (1) little audit committee emphasis on oversight of IT risks, (2) audit committees involved with IT oversight focus on more traditional risks (e.g., monitoring), while very little attention is devoted to IT acquisition and implementation, and (3) the amount of IT oversight is positively associated with the responding members auditing …


Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa Jan 2011

Japan’S Model Of Mobile Ecosystem Success: The Case Of Ntt Docomo, D. Amoroso, M. Ogawa

Faculty and Research Publications

This research looks at the adoption of Internet and mobile applications in the United States and Japan. It is the intent ofthis meta-exploratory study to examine factors of success with Japan’s mobile industry over the past decade. Takeshi Natsuno defined the ecosystem as a collection of roles in a collaborative balance. It is here that we began to search for the factors that have had an impact on the success of the mobile industry in Japan over the past two decades. It is the intent of this study to identify and discuss those factors to validate the ecosystem research model …


Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash Oct 2010

Accessing Ict Enabled Content In Low-Income Countries: Think Big, Start Small, And Scale Up, Solomon Negash

Faculty and Research Publications

While the digital revolution has transformed the way many of us work and live, more than half the world's population lives in rural areas that have been shut-out of the digital transformation. Low-income countries have yet to realize the benefits from the digital revolution; therefore, a need exists for innovative and alternative models to overcome the lack of access to knowledge and learning. This paper examines the challenges faced by low-income countries in accessing ICT enabled content and proposes a Big-Small model where low-income countries can harness the ICT revolution. This paper concludes with a discussion on sustainability and future …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton Jan 2010

Analysis Of Xbrl Literature: A Decade Of Progress And Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, Barbara Lamberton

Faculty and Research Publications

XBRL (eXtensible Business Reporting language) was recently, in 2008, in its 10th year. The concept was articulated in 1998 by Charles Hoffman, known as XFRML (eXtensible Financial Reporting Mark Up Language) to facilitate the business reporting process and improve financial reporting. The objective of this paper is to examine a decade (1998-2008) of XBRL articles published in various publications including trade, practitioner and academic journals to identify trends and patterns, milestones, and organizations actively contributed to this development. Another goal is to assess public perceptions of XBRL, its capabilities and its future. We examined published articles where XBRL appeared either …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao Nov 2009

Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao

Faculty and Research Publications

Despite positive expectations, cyber-insurance products have failed to take center stage in the management of IT security risk. Market inexperience, leading to conservatism in pricing cyber-insurance instruments, is often cited as the primary reason for the limited growth of the cyber-insurance market. In contrast, here we provide a demand-side explanation for why cyber-insurance products have not lived up to their initial expectations. We highlight the presence of information asymmetry between customers and providers, showing how it leads to overpricing cyber-insurance contracts and helps explain why cyber insurance might have failed to deliver its promise as a cornerstone of IT security-management …


Addressing Business Agility Challenges With Enterprise Systems, D. L. Goodhue, D. Q. Chen, M. C. Boudreau, J. Cochran Jan 2009

Addressing Business Agility Challenges With Enterprise Systems, D. L. Goodhue, D. Q. Chen, M. C. Boudreau, J. Cochran

Faculty and Research Publications

It is clear that systems agility (i.e., having a responsive IT infrastructure that can be changed quickly to meet changing business needs) has become a critical component of organizational agility. However, skeptics continue to suggest that, despite the benefits enterprise system packages provide, they are constraining choices for firms faced with agility challenges. The reason for this skepticism is that the tight integration between different parts of the business that enables many enterprise systems' benefits also increases the systems' complexity, and this increased complexity, say the skeptics, increases the difficulty of changing systems when business needs change. These persistent concerns …


Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger Jan 2009

Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger

Faculty and Research Publications

This paper examines previous Technology Acceptance Model (TAM)-related studies in order to provide an expanded model that explains consumers’ acceptance of online purchasing. Our model provides extensions to the original TAM by including constructs such as social influence and voluntariness; it also examines the impact of external variables including trust, privacy, risk, and e-loyalty. We surveyed consumers in the United States and Australia. Our findings suggest that our expanded model serves as a very good predictor of consumers’ online purchasing behaviors. The linear regression model shows a respectable amount of variance for Behavioral Intention (R2 = .627). Suggestions are provided …


Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade Jan 2009

Cultural And Diversity Perceptions Of It Workers Of Indian Descent, Amy B. Woszcznyski, P. Dembla, Sherri Shade

Faculty and Research Publications

Globalization has led to increased use of international work teams comprised of individuals from diverse backgrounds. Beliefs and values of individuals affect the working of such groups, so it is important to understand these differences. The aim of this paper is to understand the cultural and diversity perceptions of IT workers specifically of Indian descent. Two instruments, namely the Diversity Perceptions Index and Hofstede Value survey, were used to collect data. One hundred and eleven respondents of Indian descent working in the IT field completed the survey. Descriptive statistics provided initial results and discussion. The respondents valued diversity, although they …


A Model For Using A Capstone Experience As One Method Of Assessment Of An Information Systems Degree Program, Meg C. Murray, Jorge Pérez, Mario Guimaraes Jul 2008

A Model For Using A Capstone Experience As One Method Of Assessment Of An Information Systems Degree Program, Meg C. Murray, Jorge Pérez, Mario Guimaraes

Faculty and Research Publications

Student attainment of educational outcomes is a core purpose of any institution of higher education and assessment provides a vehicle through which a program of study is able to ascertain how well it is achieving its stated learning outcomes and how program improvement might be achieved. Assessment of student learning begins with the clear definition and articulation of learning outcomes, followed by offering learning experiences, assessing student achievement of learning outcomes and using the results to improve teaching, learning, planning and allocation of resources (Middle States Accreditation Commission, 2005). A renewed emphasis on assessment is leading to the identification and …


A Decision Model For Contracting Helpdesk Services, Meg C. Murray, Joy Young Jan 2008

A Decision Model For Contracting Helpdesk Services, Meg C. Murray, Joy Young

Faculty and Research Publications

Contractual helpdesk services, also known as call center outsourcing is a growing industry. Helpdesk solutions, which offer customer service to consumers who have an issue, problem or concern, are an integral part of many organizations' wider service function. For smaller companies, outsourcing helpdesk services is becoming more and more popular given the technical expertise and high investment costs required to develop, implement and maintain the infrastructure needed to support these services. Contracting for helpdesk services helps to alleviate smaller companies from concerns with technical issues, retaining employees dedicated to continuous research on the value proposition of emerging products or services, …


The Effects Of Web-Based Technologies On Knowledge Transfer, Waymond Rogers, Solomon Negash Jul 2007

The Effects Of Web-Based Technologies On Knowledge Transfer, Waymond Rogers, Solomon Negash

Faculty and Research Publications

The article discusses the effects of Web-based technologies on knowledge transfer, specifically examining whether the use of Web-based services can increase problem-solving skills. Because knowledge transfer has shown a direct correlation with industrial productivity, many organizations are actively trying to create services that encourage it. The authors present a study of the effects of Internet technology on knowledge transfer and the ways that organizations can use technology related to knowledge transfer.


Organizational Adoption Of Web-Enabled Services For Information Dissemination, Pamila Dembla, Prashant Palvia, Lloyd Brooks Jan 2007

Organizational Adoption Of Web-Enabled Services For Information Dissemination, Pamila Dembla, Prashant Palvia, Lloyd Brooks

Faculty and Research Publications

Although communication, collaboration, and transaction processing are some of the important business functions facilitated by the web, timely dissemination of information is critical for ultimate customer satisfaction and potential profitability. The purpose of this study is to determine the affect that contextual factors such as IS maturity, organizational attributes, and environmental characteristics have on perceived usefulness and adoption of web-enabled services for information dissemination in organizations. The key focus of this article is "organizational adoption" as opposed to individual acceptance for which there have been numerous studies. A research model and eight hypotheses were developed based on past literature. Data …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Oct 2005

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Faculty and Research Publications

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


Enemy At The Gate: Threats To Information Security, Michael E. Whitman Aug 2003

Enemy At The Gate: Threats To Information Security, Michael E. Whitman

Faculty and Research Publications

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.


An E-Commerce Systems Integration Framework, Ernest A. Capozzoli, Sheb L. True Apr 2001

An E-Commerce Systems Integration Framework, Ernest A. Capozzoli, Sheb L. True

Faculty and Research Publications

The success of e-commerce activity is directly affected by system integration efforts associated with traditional back office and web-based systems. The potential benefits of enterprise-wide e-commerce activities to an organization emphasize the need for system integration beyond individual sales transactions. Unfortunately, many organizations are not capitalizing on the synergistic advantages of integrated systems. Despite the apparent lack of integration, some organizations are attempting to coordinate such customer activities. Planning for and integrating e-commerce technologies are essential to an organization's survival.