Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- Business Administration, Management, and Operations (5)
- Databases and Information Systems (5)
- Social and Behavioral Sciences (5)
-
- Information Security (3)
- Communication (2)
- Engineering (2)
- Health Information Technology (2)
- Medicine and Health Sciences (2)
- Adult and Continuing Education and Teaching (1)
- Business and Corporate Communications (1)
- Communication Technology and New Media (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Corporate Finance (1)
- Economics (1)
- Education (1)
- Entrepreneurial and Small Business Operations (1)
- Finance and Financial Management (1)
- Higher Education and Teaching (1)
- Income Distribution (1)
- Inequality and Stratification (1)
- International and Area Studies (1)
- Interpersonal and Small Group Communication (1)
- Library and Information Science (1)
- Management Sciences and Quantitative Methods (1)
- Operational Research (1)
- Institution
-
- University of Arkansas, Fayetteville (5)
- University of Texas at Arlington (4)
- Bentley University (3)
- California State University, San Bernardino (2)
- World Maritime University (2)
-
- Air Force Institute of Technology (1)
- Claremont Colleges (1)
- Eastern Michigan University (1)
- Edith Cowan University (1)
- Lingnan University (1)
- Louisiana Tech University (1)
- New Jersey Institute of Technology (1)
- University of Massachusetts Amherst (1)
- University of Massachusetts Boston (1)
- Utah State University (1)
- Keyword
-
- Social sciences (7)
- Applied sciences (6)
- Communication and the arts (3)
- Information systems (3)
- Computer networks Security measures (2)
-
- Cyberterrorism Prevention (2)
- 5Ss (1)
- Advanced analytics (1)
- Advanced methodologies (1)
- Architectural privacy (1)
- Business enterprises Computer networks Security measures Auditing (1)
- CEO (1)
- Case study research (1)
- Client/server computing (1)
- Collaboration and integration (1)
- Communication performance (1)
- Competition (1)
- Complexity theory (1)
- Computer Security (1)
- Computer security Auditing (1)
- Computers Access control Auditing (1)
- Concept extraction (1)
- Concept graphs (1)
- Consumer health it (1)
- Culture (1)
- Data protection (1)
- Data science (1)
- Demand planning (1)
- Developing countries (1)
- Digital development (1)
- Publication
-
- Graduate Theses and Dissertations (5)
- Information Systems & Operations Management Dissertations (4)
- 2013 (3)
- Maritime Safety & Environment Management Dissertations (Dalian) (2)
- Theses Digitization Project (2)
-
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- CMC Senior Theses (1)
- Dissertations (1)
- Doctoral Dissertations (1)
- Graduate Masters Theses (1)
- Master's Theses and Doctoral Dissertations (1)
- Open Access Dissertations (1)
- Theses & Dissertations (1)
- Theses and Dissertations (1)
- Theses: Doctorates and Masters (1)
Articles 1 - 26 of 26
Full-Text Articles in Management Information Systems
Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan
Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan
Graduate Theses and Dissertations
At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Graduate Theses and Dissertations
Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …
The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer
Graduate Theses and Dissertations
With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …
Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang
Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang
Information Systems & Operations Management Dissertations
A remanufacturer struggles with uncertainty of returns and quality of products. With regard to the remanufacturing process, this study focuses on the determination of the following policies: a) Acquisition policy and b) Sorting policy. The purpose of this study is to find the optimality of both acquisition and sorting which, to meet demand with the maximization of profits over time, may need to be changed. More specific research questions are as follows: a) How much product returns should be obtained to meet demand through remanufacturing?, b) What level of sorting discrimination should be used for disassembly to meet demand at …
An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House
An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House
Information Systems & Operations Management Dissertations
Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential or sensitive. Individuals are targeted to take action by clicking on a link or providing information. At present, phishing research is lacking in both theory and actual behavioral data. This research aims to fill that gap by introducing a new model and collecting data from multiple sources (including an …
The Competitive Dynamics Of A Firm's Capacity Position And Inventory Leanness Activities: Evidence From Us Manufacturing Industries, Rajat Mishra
Information Systems & Operations Management Dissertations
The notion of `perennial gale of creative destruction' by Schumpeter and Austrian economics has been researched in the field of strategic management to study the competitive dynamics among firms' rivalrous activities. However, its application is sparse in operations management. With the advancement of the field and the increasing pressure on the firms, the strategies regarding operations planning and control are argued to be not just internal according to the conventional norms of operations management, but these strategic moves will be impacted by the moves of their immediate rivals. This competitive imitation is studied in the areas of inventory management and …
The Impact Of Organizational Insiders' Psychological Capital On Information Security, A. J. Burns Iii
The Impact Of Organizational Insiders' Psychological Capital On Information Security, A. J. Burns Iii
Doctoral Dissertations
This dissertation research seeks to examine the role of organizational insiders' psychological capital (PsyCap) on the performance of protection motivated behaviors (PMBs). The dissertation examines the role of PsyCap through three studies which were conducted for this research. Using structural equation modeling (SEM), the responses from four distinct samples were analyzed. The results largely support the significant role of PsyCap in information security. The first study takes an expectancy theory (Vroom, 1964) approach and found that PsyCap was a significant consequence of insiders' security-related expectancy dimensions. Additionally, expectancy theory was found to be an appropriate frame-work for promoting PMBs.
The …
Towards Successful Implementation Of 5ss In A U.S. Manufacturing Company With Indian Sub-Continent Workers, Syed Shahzad Naqvi
Towards Successful Implementation Of 5ss In A U.S. Manufacturing Company With Indian Sub-Continent Workers, Syed Shahzad Naqvi
Master's Theses and Doctoral Dissertations
XYZ is a manufacturing organization located in Michigan, in the Eastern North Central U.S., and it has a diverse workforce consisting of immigrants from Asia, Europe, and South America. The majority of the workers are immigrants from the Indian Sub-Continent. XYZ has been in the process of implementing 5Ss; however, it has been unable to sustain 5S standards. This study was conducted to identify the role of the Indian Sub-Continent workers’ culture and religion on 5S implementation and to suggest how this company can work with this group in successfully implementing the 5Ss.
The researcher is employed in this organization …
Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu
Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
A Study On The Application Of Information System In Patrol Vessel Management, Lei Li
A Study On The Application Of Information System In Patrol Vessel Management, Lei Li
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Pricing And Local-Content Decisions Of A Multinational Firm In A Duopoly Market, Nanqin Liu
Pricing And Local-Content Decisions Of A Multinational Firm In A Duopoly Market, Nanqin Liu
Theses & Dissertations
The internationalization of production requires each multinational firm to determine the local content rate for his product that is made and sold in a foreign country. In this thesis, we investigate the local content rate and pricing decisions for a multinational firm who competes with a local firm in a market without and with a local content requirement (LCR). We develop and solve a two-stage decision problem in which the multinational firm determines his optimal local content rate and the two firms then make their pricing decisions. Our analytical results show that the multinational firm sets a lower local content …
Data Science In Supply Chain Management: Data-Related Influences On Demand Planning, Yao Jin
Data Science In Supply Chain Management: Data-Related Influences On Demand Planning, Yao Jin
Graduate Theses and Dissertations
Data-driven decisions have become an important aspect of supply chain management. Demand planners are tasked with analyzing volumes of data that are being collected at a torrential pace from myriad sources in order to translate them into actionable business intelligence. In particular, demand volatilities and planning are vital for effective and efficient decisions. Yet, the accuracy of these metrics is dependent on the proper specification and parameterization of models and measurements. Thus, demand planners need to step away from a "black box" approach to supply chain data science. Utilizing paired weekly point-of-sale (POS) and order data collected at retail distribution …
Your Media Speak So Loud I Can't Hear A Word You're Saying: Impact Of Media And Media Selection On Performance, Martin Hassell
Your Media Speak So Loud I Can't Hear A Word You're Saying: Impact Of Media And Media Selection On Performance, Martin Hassell
Graduate Theses and Dissertations
With the proliferation of communication media and technologies available, it is important for teams to understand the influence of these media on the performance of their communications. Additionally, it is important for researchers to understand how teams choose and use media. Literature on communication media impacts and communication performance has been somewhat fragmented, and researchers have used different theories and paradigms to study this problem. Researchers still do not have a full understanding of how media influences communication, whether teams recognize and select appropriate media for their communication needs, and what makes some communication more effective, irrespective of the communication …
Predicting Hospital Patients' Admission To Reduce Emergency Department Boarding, Mohammadmahdi Moqri
Predicting Hospital Patients' Admission To Reduce Emergency Department Boarding, Mohammadmahdi Moqri
Graduate Masters Theses
Emergency Department (ED) boarding - the inability to transfer emergency patients to inpatient beds- is a key factor contributing to ED overcrowding. This paper presents a novel approach to improving hospital operational efficiency and, therefore, to decreasing ED boarding. Using the historic data of 15,000 patients, admission results and patient information are correlated in order to identify important admission predictor factors. For example, the type of radiology exams prescribed by the ED physician is identified as among the most important predictors of admission. Based on these factors, a real-time prediction model is developed which is able to correctly predict the …
Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen
Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen
Information Systems & Operations Management Dissertations
Long Term Care facilities are a highly regulated industry due to funding sources being subject to Medicare and Medicaid reimbursement. The demand for nursing homes is increasing significantly with anticipation of the Baby Boomers reaching age 65. Most research studies of the long-term care industry are focused on quality improvement and reduced deficiencies. This study provides a different view of how strategic capabilities (adaptive, absorptive, and innovative) and Baldrige Health Care Criteria affect financial returns, operational efficiency, and quality for long-term care providers. The findings indicate that facilities' capabilities are associated with Baldrige criteria and performance. However, the relationship between …
Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik
Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik
Dissertations
As science advances, the underlying literature grows rapidly providing valuable knowledge mines for researchers and practitioners. The text content that makes up these knowledge collections is often unstructured and, thus, extracting relevant or novel information could be nontrivial and costly. In addition, human knowledge and expertise are being transformed into structured digital information in the form of vocabulary databases and ontologies. These knowledge bases hold substantial hierarchical and semantic relationships of common domain concepts. Consequently, automating learning tasks could be reinforced with those knowledge bases through constructing human-like representations of knowledge. This allows developing algorithms that simulate the human reasoning …
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.
Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker
Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker
Theses and Dissertations
Due to the up-rise of social media, social networking sites have increased in popularity and use over the last few years. During this time, research related to social networks has also escalated. This study presents social network research trends found in ISR, JMIS, and MISQ for a six year period, 2005-2010. The social network-related articles from these premier MIS journals were examined in terms of topical theme and research strategy employed. Furthermore, the most productive authors and affiliations were identified and presented individually, by state, and by region. An additional outcome of this research is the presentation of a preliminary …
Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane
Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane
Open Access Dissertations
Identity has long been a prolific research interest for organizational scholars. Its popularity can be attributed to the development of post-bureaucratic organizations, where control is no longer achieved through external forms (i.e. rules and procedures), but rather, "softer" mechanisms, such as organizational culture and values. Examining identity therefore becomes crucial for understanding how employees internalize organizational goals to exhibit desired behaviors. While the predominant approach has been to analyze how organizations help shape, control, and regulate member identity, this project calls into question the assumption of organizational employment to explore the micro-processes of identity construction among a growing class of …
Essays On The Digital Divide - Explorations Through Global, National And Individual Lenses, Maria Skaletsky
Essays On The Digital Divide - Explorations Through Global, National And Individual Lenses, Maria Skaletsky
2013
The Digital Divide has emerged as an important research and policy issue during the past thirty years. The divide exists at different levels, such as global, regional and individual levels. While extensive research already exists on this subject, the complexity of the issue presents opportunities for further research. In particular, there is ample scope for significantly contributing to the literature by leveraging recent analytics techniques, all the more since most of the literature on the Digital Divide relies on descriptive methods or on simple or multiple regression models. Therefore, the motivation for this study is two-fold. First, the Digital Divide …
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino
2013
In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …
User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong
User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong
2013
User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first study to research the relative contributions of vendor trust and IT artifact trust components to user resistance and, as a result, makes a unique contribution to the information systems literature. An understanding of the degree to which technology adoption behavioral beliefs, and particularly system trust, affect user resistance towards information …
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Theses Digitization Project
The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
Theses Digitization Project
The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.
The Impact Of Prior Performance On Leadership Appointment In A Merger Of Equals, David A. Hirsch
The Impact Of Prior Performance On Leadership Appointment In A Merger Of Equals, David A. Hirsch
CMC Senior Theses
Leadership appointment during mergers has a logical and established precedent when there is a clear target and acquirer. However, in the extraordinary case of Merger Of Equals (MOEs) – where this is relative equal ownership, board representation, earnings contribution etc - this process is much less defined and can often have serious consequences on the merger, both in closing negotiations as well as post-merger performance. Intuition assumes the better performing CEO should and will be appointed. In practice, however, that is often not the case. It is arguable that performance can be defined through objective means (financially & operationally), yet …
An Exploratory Study Of The Benefits And Inhibitors Of Digital Libraries In Iraq, Basima Abdulbari Fezaa
An Exploratory Study Of The Benefits And Inhibitors Of Digital Libraries In Iraq, Basima Abdulbari Fezaa
Theses: Doctorates and Masters
This research study explores the potential of digital libraries (DLS) in Iraq and identifies inhibitors to adoption. Iraq is an ancient civilisation, with a recorded history of more than 5000 years. The Mesopotamian civilisation and the Babylonian Civilisation (both in Iraq) are amongst the most ancient in the world, and have existed from the times of the ancient Egyptian, Indus Valley, Persian civilisations. Iraq has a rich cultural history, with many rare historical manuscripts, antiques etc., on which many treatises have written and still continues to be a popular subject of research. In its recent history, Iraq has had much …