Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Management Information Systems

The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga Dec 2023

The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga

Jurnal Administrasi Bisnis Terapan (JABT)

This study intend to evaluate the use of the Human Resources Information System (HRIS) in private organization. User satisfaction is one of the conditions for the successful implementation of information systems. To evaluate this system information, the author uses the conceptual Delone and Mclean information system success model(ISSM). This study employs a quantitative methodology and a survey method. The research sample consists of employees in private organizations engaged in software engineering. To analyze, SPSS is employed by the author in two stages: first validity-reliability examination, second multiple regression tests. The result demonstrated that quality system has a significant affect on …


Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …