Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2012

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 20 of 20

Full-Text Articles in Management Information Systems

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali Oct 2012

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali

Engineering Management & Systems Engineering Theses & Dissertations

This research explores the role that budget for Information System (IS) and technical expertise of healthcare service provider staff play on the successful leap from a partial to exhaustive implementation of Electronic Health Records (EHR) Systems. Technical expertise in Information Systems might not be easily measurable directly, but there are a number of indicators that could be used as a proxy, such as: Information System (IS) Department Budget, number of IS staff and the extent of technical trainings provided by the IS department to the clinical staff. This research study hypothesizes that quality technical trainings conducted by an IS department …


The Valuation Impact Of Sec Enforcement Actions On Non-Target Foreign Firms, Roger Nelson Silvers Sep 2012

The Valuation Impact Of Sec Enforcement Actions On Non-Target Foreign Firms, Roger Nelson Silvers

Open Access Dissertations

This study provides a test of the market valuation impact of Securities and Exchange Commission (SEC) enforcement actions for foreign firms. I examine the SEC enforcement policy towards foreign firms under its jurisdiction. In contrast to Siegel (2005) who examines earlier years, I find that the SEC's current (post-2002) enforcement intensity is considerable and has increased dramatically by comparison. I construct a novel test using the burgeoning series SEC enforcement events as changes to the legal environment that circumvents the issues associated with firm-level exchange-listing events (e.g. self-selection and simultaneous changes to firm traits). The tests focus on stock returns …


Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin Aug 2012

Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin

Graduate Theses and Dissertations

As competitive pressures mount, organizations must continue to evolve their business processes in order to survive. Increasingly, firms are developing new IT-enabled business processes in response to rising competition, greater customer expectations, and challenging economic conditions. The success rate of these projects remains low despite much industry experience and extensive academic study. Managerial and organizational cognition represents a potentially fruitful lens for studying the design and implementation of IT-enabled business processes. This view assumes that individuals are information workers who spend their days absorbing, processing, and disseminating information as they pursue their goals and objectives. Individuals develop cognitive representations, called …


Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway Aug 2012

Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway

Graduate Theses and Dissertations

Despite considerable research interest, IT projects still fail at a higher rate than other projects. Primary causes for these failures are relational, motivational, and scheduling issues on the team. Using the concept of time as a lens, the four essays in this dissertation examine how the ways that individuals and teams structure time can help explain these failures. The essays formulate the concept of temporal dissonance at the individual and team level, and explore how temporal dissonance causes negative consequences for IT workers and IT teams.

Essay one synthesizes temporal dissonance from concepts of temporal congruity and cognitive dissonance. It …


Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen Jun 2012

Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen

Electronic Thesis and Dissertation Repository

Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.

Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.

The key findings of this research are fourfold. First, the core category developed in this …


Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi May 2012

Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi

Dissertations

Teams in organizations are strategically built with members from domains and experiences so that a wider range of information and options can be pooled. This strategic team structure is based on the assumption that when team members share the information they have, the team as a whole can access a larger pool of information than any one member acting alone, potentially enabling them to make better decisions. However, studies have shown that teams, unlike individuals, sometimes do not effectively share and use the unique information available to them, leading to poorer decisions. Research on information sharing in team decision making …


Aligning Security And Usability Objectives For Computer Based Information Systems, Santa Ram Susarapu May 2012

Aligning Security And Usability Objectives For Computer Based Information Systems, Santa Ram Susarapu

Theses and Dissertations

With extensive use of information systems in day-to-day business operations, many organizations are facing challenges to develop robust computer-based information systems that are secure and widely used by the user community. In order to develop information systems that are secure and useful, understanding what stakeholders consider important and value about the security and usability is critical. Security refers to confidentiality, integrity and availability and usability refers to efficiency, effectiveness and user satisfaction. Using Value Focused Thinking approach, this research first proposes the usability objectives based on the values of system developers and users. Using the security objectives proposed by Dhillon …


Institutionalization Of Information Security: Case Of The Indonesian Banking Sector, Muhamad Faisal Fariduddin Attar Nasution May 2012

Institutionalization Of Information Security: Case Of The Indonesian Banking Sector, Muhamad Faisal Fariduddin Attar Nasution

Theses and Dissertations

This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information security governance and practices become institutionalized through social integration of routines and system integration of relevant technologies. The objective is to develop an understanding of how information security governance and practices in the Indonesian banking sector become institutionalized. Such objective is built on an argument that information security governance and practices become institutionalized through …


Java Applet Awareness Impacting User Web Browsing Behavior, Norilyz Figueroa May 2012

Java Applet Awareness Impacting User Web Browsing Behavior, Norilyz Figueroa

Honors Thesis Program in the College of Management

The purpose of this study is to investigate the web browsing behaviors of computer users and how awareness about threats impacts their behaviors. This research focused on how users behave towards web browser alerts which prompt users to install Java Applets. Applets have become common tools for enhancing user experience. However, installing these features overrides security mechanisms inherent in browsers and provides complete access to users’ computing resources. A survey was administered to two separate groups of students from the University of Massachusetts Boston to collect data. The first group took the survey after being given a few details about …


Employee Compliance With Information Systems Security Policy In Retail Industry. Case: Store Level Employees, Bertrand Muhire May 2012

Employee Compliance With Information Systems Security Policy In Retail Industry. Case: Store Level Employees, Bertrand Muhire

Honors Thesis Program in the College of Management

In this digital era, information has become a very important component to any type of organizations. For some, it is not only an important component of daily routine operations but also required for competitive advantage. From big corporations to small businesses, non-profit organizations and governments, organizations need to safeguard and secure their information by implementing information security policies and make sure that all employees comply with such policies.

Since information is growing faster than in the previous decades, there is a need to safeguard and manage that information efficiently and effectively in order to make it useful. One of the …


Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell May 2012

Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.

The findings of this …


Capacity Position And Financial Performance: Longitudinal Evidence From U.S. Manufacturers, Carol J. Cagle Apr 2012

Capacity Position And Financial Performance: Longitudinal Evidence From U.S. Manufacturers, Carol J. Cagle

Information Systems & Operations Management Dissertations

This research synthesizes research from the strategy, organization theory and operations management streams in exploring the competitive implications of firms' capacity over time. Data from archival sources are analyzed via Hierarchical Linear Modeling in exploring: 1) systematic relationships between capacity and financial performance that they obtain over time; and 2) the role of strategic and environmental covariates in these relationships.


The Strategic Association Between Enterprise Content Management And Decision Support, Jaffar Alalwan Apr 2012

The Strategic Association Between Enterprise Content Management And Decision Support, Jaffar Alalwan

Theses and Dissertations

To deal with the increasing information overload and with the structured and unstructured data complexity, many organizations have implemented enterprise content management (ECM) systems. Published research on ECM so far is very limited and reports on ECM implementations have been scarce until recently (Tyrväinen et al. 2006). However, the little available ECM literature shows that many organizations using ECM focus on operational benefits while strategic decision-making benefits are rarely considered. Moreover, the strategic capabilities such as decision making capabilities of ECM are not fully investigated in the current literature. In addition, the literature lacks a strategic management framework (SMF) that …


The Adaptation Of Cloud Computing By The Hotel Industry, Anthony Schneider Apr 2012

The Adaptation Of Cloud Computing By The Hotel Industry, Anthony Schneider

UNLV Theses, Dissertations, Professional Papers, and Capstones

The concept of cloud computing has many benefits for the hotel industry. The migration to cloud computing is expected to have a major impact on the way that information and computer resources are handled by the hotel industry. Investment in technology must bring value to a business whether it’s a large international hotel chain or a small, independent resort. Since business strategy will vary, a detailed study must be performed to identify the major issues that must be analyzed before migrating to the cloud.

The cloud is a highly adaptive IT infrastructure that can be shared by many different end …


Exploration Of Human-Computer Interaction (Hci) Applications In Hospitality Industry, Jia Wei Apr 2012

Exploration Of Human-Computer Interaction (Hci) Applications In Hospitality Industry, Jia Wei

UNLV Theses, Dissertations, Professional Papers, and Capstones

Purpose: The purpose of this professional paper is to explore and identify the best practices in Human-Computer Interaction (HCI) applications and use within the hospitality industry.

Statement of Objectives: To accomplish the stated purpose, first, the paper will provide the universal definition of HCI applications and define HCI within the context of hospitality industry. Second, the paper will gather and categorize information, such as the standards of designing HCI applications, from other fields of study such as informatics. Third, the paper will gather existing examples of HCI applications across different areas within the hospitality industry, such as the front desk …


Designing A Comprehensive Framework For E-Government Implementation Success With A Special View Of The Case Of Saudi Arabia, Mohammed Alsaigh Mar 2012

Designing A Comprehensive Framework For E-Government Implementation Success With A Special View Of The Case Of Saudi Arabia, Mohammed Alsaigh

Theses and Dissertations

As a result of the increasing development in the field of Information Systems (IS) in the last decades, new concepts have appeared to serve specific requirements and needs (Smith 2010; Almarabeh and AbuAli 2010). E-government is one of these concepts, which appeared in 1993 (Silva 2006) to become one of the main tools for governments around the world to enhance the services provided by governments and their agencies (Atallah 2001). Investigating the literature shows that there are common issues in all e-government implementation projects which can be summarized as follows: 1) e-government implementation projects in their nature are vast, and …


An Examination Of Coordination Among Friends And Strangers From A Coordination Theory Perspective, Christopher D. Wamble Jan 2012

An Examination Of Coordination Among Friends And Strangers From A Coordination Theory Perspective, Christopher D. Wamble

Theses

Within mobile social coordination, there is a field of study known as outeraction, the communicative processes used by people to manage future interactions. It is an important area of research because it identifies how informal interactions support complex collaboration between individuals and groups. Outeraction is primarily conducted through the interpersonal communication channels of texting, instant messaging (IM), face-to-face, and mobile phone or Skype conversations. Currently this area of research in mobile outeraction support systems is weak. It lacks a firm foundation in system building, has very few if any conceptual frameworks, and little empirical knowledge of user requirements and attitudes …


Public Safety Networks – Examining Mimetic, Complexity, And Legacy Effects On Interorganizational Collaborations, Martin A. Dias Jan 2012

Public Safety Networks – Examining Mimetic, Complexity, And Legacy Effects On Interorganizational Collaborations, Martin A. Dias

2012

The purpose of this dissertation is to examine information systems-enabled interorganizational collaborations called public safety networks – their proliferation, information systems architecture, and technology evolution. These networks face immense pressures from member organizations, external stakeholders, and environmental contingencies. This dissertation investigates the role of three effects on these networks - the effect of peers in network proliferation, the effect of environmental and organizational complexity on their information systems, and the effect of legacy systems on capability scale and scope. Better understanding the conditions associated with network proliferation will assist decision-makers in assessing appropriate partnering opportunities. Better understanding the nature of …


Use Of Visualization In Digital Financial Reporting: The Effect Of Sparkline, Priyanka Meharia Jan 2012

Use Of Visualization In Digital Financial Reporting: The Effect Of Sparkline, Priyanka Meharia

Theses and Dissertations--Business Administration

Information visualization (InfoViz) is an essential component of decision support systems (DSS). Sparklines is a visualization tool. This study examines if Sparklines in digital financial reports aids novice investors and if so under what circumstances? Does it enhances decision-making performance and facilitates effective decision-making experience? Additionally, does it lowers decision making effort; reduces dilution effect from non-relevant data in financial reports and mitigates recency bias in using digital financial reports?

The hypothesis is guided by the theory of Proximity Compatibility Principle and the Theory of Cognitive Fit. The research methodology for this study is a repeated measure, controlled laboratory based …


The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim Jan 2012

The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim

Electronic Theses and Dissertations

Despite investment and cutting-edge features, the majority of new mobile phone subscribers have adopted low-cost handsets instead of the latest mobile devices (Karjaluoto et al., 2005). According to the U.S. Census Bureau report, only 37% of cell phone users selected a smartphone in 2007. The Census Bureau forecasted the figure would increase by less than 10% in 2008. However, only 24% of cell phone users owned a smartphone in 2010, 27 % in 2011 and 30% in 2012. Therefore, the purpose of this study is to propose a conceptual model of the impact of mobile social capital on mobile networks …