Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (76)
- Social and Behavioral Sciences (54)
- Physical Sciences and Mathematics (53)
- Computer Sciences (51)
- Management Sciences and Quantitative Methods (47)
-
- Business Administration, Management, and Operations (45)
- E-Commerce (37)
- Engineering (35)
- Library and Information Science (35)
- Computer Engineering (23)
- Operations Research, Systems Engineering and Industrial Engineering (22)
- Databases and Information Systems (18)
- Other Business (18)
- Computer and Systems Architecture (17)
- Medicine and Health Sciences (16)
- Organizational Behavior and Theory (16)
- Electrical and Computer Engineering (15)
- Systems Engineering (15)
- Bioinformatics (14)
- Life Sciences (14)
- Nanoscience and Nanotechnology (14)
- Health Services Administration (13)
- Public Health (13)
- International Business (11)
- Other Computer Sciences (11)
- Business and Corporate Communications (10)
- Entrepreneurial and Small Business Operations (10)
- Public Affairs, Public Policy and Public Administration (10)
- Institution
-
- Selected Works (125)
- SelectedWorks (37)
- The University of San Francisco (13)
- Singapore Management University (11)
- Universitas Indonesia (10)
-
- Kennesaw State University (9)
- California State University, San Bernardino (7)
- San Jose State University (6)
- Georgia State University (5)
- Santa Clara University (5)
- Old Dominion University (4)
- University of Dayton (4)
- University of Massachusetts Boston (4)
- University of Nebraska - Lincoln (4)
- Virginia Commonwealth University (4)
- Cleveland State University (3)
- Marshall University (3)
- National Taiwan Ocean University (3)
- Cedarville University (2)
- Georgia Southern University (2)
- New Jersey Institute of Technology (2)
- University of Arkansas, Fayetteville (2)
- University of Nevada, Las Vegas (2)
- Utah State University (2)
- Wright State University (2)
- Bentley University (1)
- Brigham Young University (1)
- City University of New York (CUNY) (1)
- Dakota State University (1)
- Edith Cowan University (1)
- Keyword
-
- Information Systems (8)
- Information systems (8)
- E-business and e-government (7)
- Proceedings (7)
- Strategy (7)
-
- Information security (6)
- Innovation (6)
- Service Systems (6)
- Service system (6)
- Work system theory (6)
- Architectural strategy (5)
- E-learning (5)
- Refereed Articles (5)
- Adoption (4)
- ICT (4)
- ICT for Development and Poverty Alleviation (4)
- Individual Computing Capabilities / End-User Training / IT Training (4)
- Local government (4)
- Management (4)
- Other System-Related Articles (4)
- Service science (4)
- Social Media (4)
- Technology (4)
- Theory and Meta-Theory (4)
- Work system (4)
- Africa (3)
- Collaboration (3)
- Cyber (3)
- Cyber Operations (3)
- Cyber operations (3)
- Publication
-
- Dr Deogratias Harorimana (15)
- Associate Professor Linda Dawson (13)
- The South East Asian Journal of Management (10)
- Research Collection School Of Computing and Information Systems (9)
- Saurabh Gupta (9)
-
- Business Analytics and Information Systems (8)
- C. Jason Woodard (8)
- Pratyush Bharati (8)
- Steven Alter (8)
- Jan Kallberg (7)
- The African Journal of Information Systems (7)
- Journal of International Technology and Information Management (6)
- Computer Information Systems Faculty Publications (5)
- Dr. Mutaz M. Al-Debei (5)
- Information Systems and Analytics (5)
- Journal of Entrepreneurship, Management and Innovation JEMI (5)
- Surendra Sarnikar (5)
- Dr Khin Win (4)
- Jacob Johnsen, MSc (4)
- MIS/OM/DS Faculty Publications (4)
- Theses and Dissertations (4)
- Business Faculty Publications (3)
- Chong W. Kim (3)
- College of Business: Dissertations, Theses, and Student Research (3)
- Faculty Publications, Information Systems & Technology (3)
- Francesca Cabiddu (3)
- Herbert J. Mattord (3)
- Humayun Zafar (3)
- Journal of Marine Science and Technology (3)
- Maurice Dawson (3)
- Publication Type
Articles 61 - 90 of 290
Full-Text Articles in Management Information Systems
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
MIS/OM/DS Faculty Publications
Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …
A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston
A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston
Research Collection School Of Computing and Information Systems
Online auction markets play increasingly important roles for resource allocations in distributed systems. This paper builds upon a market-based framework presented by Guo et al. (Guo, Z., G. J. Koehler, A. B. Whinston. 2007. A market-based optimization algorithm for distributed systems. Management Sci. 53(8) 1345–1458), where a distributed system optimization problem is solved by self-interested agents iteratively trading bundled resources in a double auction market run by a dealer. We extend this approach to a dynamic, asynchronous Internet market environment and investigate how various market design factors including dealer inventory policies, market communication patterns, and agent learning strategies affect the …
Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard
Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard
C. Jason Woodard
Social media was a topic that had entered into the daily vocabulary of teenagers and business executives alike. With this surge in popularity and influence worldwide the open question was what this new way of interacting would mean for businesses and whether or not social media could really be a driver of company profitability or just a nice way to share photos with friends? Circos, a Singapore-based company, developed a business that it hoped would help to answer those questions. By using a proprietary sentiment analysis tool, Circos had mined the vast world of online reviews available on various social …
Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard
Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard
C. Jason Woodard
After a successful presentation in the (A) case, Frederic Langlois, Circos.com general manager in Singapore, headed back to the company headquarters. He brought back not only the possibility of a new client, but also a specific request. The Raffles Hotel had asked him to provide new functionality beyond the existing social media analytics dashboard Circos had become known for. The Raffles Hotel manager had asked, “It would be great to have a simple and meaningful analysis of what people are saying about our property online. What would be really great, though, would be to know who is saying what. I …
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Suneel K. Maheshwari
The objective of our paper is to identify factors and develop constructs that could be used to develop a conceptual Total Quality Management (TQM) model that is applicable to small and medium scale manufacturers in the United States. The data for this study was collected from a mail survey targeted to managers in the manufacturing plants. Responses were analyzed and factor analysis was used to develop measurement instruments.
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Uday S. Tate
The objective of our paper is to identify factors and develop constructs that could be used to develop a conceptual Total Quality Management (TQM) model that is applicable to small and medium scale manufacturers in the United States. The data for this study was collected from a mail survey targeted to managers in the manufacturing plants. Responses were analyzed and factor analysis was used to develop measurement instruments.
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
Jan Kallberg
With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
Chong W. Kim
Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.
Korean Value Systems And Managerial Practices, Dong Ki Kim, Chong W. Kim
Korean Value Systems And Managerial Practices, Dong Ki Kim, Chong W. Kim
Chong W. Kim
Human beings are by nature sociocultural creatures. Our behavior is influenced not only by traditional value systems but also by contemporary education and training. In the same manner, the managerial practices of Korean managers are strongly influenced by the norms and value systems of the traditional Korean society. But, as the society changes from an agrarian society to an industrialized one, so does the behavior of Korean managers. This chapter focuses on the process of this change. More specifically, it will look at the effects of traditional value systems and those of industrialization on Korean managerial practices.
A Survey Of Schema Matching Research, Roger Blake
A Survey Of Schema Matching Research, Roger Blake
Roger H. Blake
Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …
Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad
Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad
Research Collection School Of Computing and Information Systems
Information technology (IT) services are often subject to downward price pressures due to improvements in technology and business processes in a competitive market. When clients enter into IT services contracts, they are faced with the future risk that their services will be overpriced relative to the broader IT services market. To mitigate this risk, clients often add benchmark provisions, whereby a neutral third party assesses the prevailing market price for services. It will support fair price adjustments if the market prices are lower than the current prices. We model the decision to benchmark in order to provide managerial information on …
Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin
Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin
Graduate Theses and Dissertations
As competitive pressures mount, organizations must continue to evolve their business processes in order to survive. Increasingly, firms are developing new IT-enabled business processes in response to rising competition, greater customer expectations, and challenging economic conditions. The success rate of these projects remains low despite much industry experience and extensive academic study. Managerial and organizational cognition represents a potentially fruitful lens for studying the design and implementation of IT-enabled business processes. This view assumes that individuals are information workers who spend their days absorbing, processing, and disseminating information as they pursue their goals and objectives. Individuals develop cognitive representations, called …
From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman
From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman
Research Collection School Of Computing and Information Systems
Consumers in e-commerce acquire information through search engines, yet to date there has been little empirical study on how users interact with the results produced by search engines. This is analogous to, but different from, the ever-expanding research on clickstreams, where users interact with static web pages. We propose a new network approach to analyzing search engine server log data. We call this searchstream data. We create graph representations based on the web pages that users traverse as they explore the search results that their use of search engines generates. We then analyze the graph-level properties of these search network …
Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui
Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui
Journal Articles
The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and …
Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo
Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo
Research Collection School Of Computing and Information Systems
We use hedonic valuation to establish a basis for valuing the time a user participates in an online gaming community. We distinguish between utilitarian and hedonic value. Our application involves elements of both utilitarian and hedonic value, however, the latter is much more important. We use an extensive data set involving a massive multi-player online role-playing game (MMORPG) from Korea. We specify and test econometric models that reflect the appropriate empirical structure for the setting, based on information about the players and the activities they engage in. The results permit us to estimate the hedonic value in monetary terms for …
Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway
Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway
Graduate Theses and Dissertations
Despite considerable research interest, IT projects still fail at a higher rate than other projects. Primary causes for these failures are relational, motivational, and scheduling issues on the team. Using the concept of time as a lens, the four essays in this dissertation examine how the ways that individuals and teams structure time can help explain these failures. The essays formulate the concept of temporal dissonance at the individual and team level, and explore how temporal dissonance causes negative consequences for IT workers and IT teams.
Essay one synthesizes temporal dissonance from concepts of temporal congruity and cognitive dissonance. It …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
An Integrated Vendor-Buyer Cooperative Inventory Model For Items With Imperfect Quality And Shortage Backordering, Jia-Tzer Hsu, Lie-Fern Hsu
An Integrated Vendor-Buyer Cooperative Inventory Model For Items With Imperfect Quality And Shortage Backordering, Jia-Tzer Hsu, Lie-Fern Hsu
Publications and Research
We develop a model to determine an integrated vendor-buyer inventory policy for items with imperfect quality and planned back orders. The production process is imperfect and produces a certain number of defective items with a known probability density function. The vendor delivers the items to the buyer in small lots of equally sized shipments. Upon receipt of the items, the buyer will conduct a 100% inspection. Since each lot contains a variable number of defective items, shortages may occur at the buyer. We assume that shortages are permitted and are completely back ordered. The objective is to minimize the total …
Portfolio Management: The Australian Experience, Aileen Koh
Portfolio Management: The Australian Experience, Aileen Koh
Aileen Koh
The increasing use of project and programs by organizations to achieve business strategy and goals have led to the need to understand project portfolio management. Along with the increasing diffusion of portfolio management, a new managerial role evolves: the portfolio manager. This new role is pivotal in planning and controlling complex project landscapes more effectively and efficiently. This study is to investigate the governance structures and the roles, responsibilities and practices of portfolio managers. A sequential mixed method approach under a realism paradigm is used. This paper presents the first stage qualitative study, using an inductive interview based approach with …
Zoho For Ticketing: Project Management & Reporting Using A Custom-Built Zoho Application, M Ryan Hess
Zoho For Ticketing: Project Management & Reporting Using A Custom-Built Zoho Application, M Ryan Hess
M Ryan Hess
This ticketing application was developed by the DePaul University Libraries Web Services Team for project management. It uses the Zoho Creator application building platform and is available for use for free on the Zoho Marketplace. The application manages projects, keeps stakeholders up to date on project statuses and generates reports.
Exploring The Roles Of People, Governance And Technology In Organizational Readiness For Emerging Technologies, Abiodun A. Ogunyemi, Kevin A. Johnston
Exploring The Roles Of People, Governance And Technology In Organizational Readiness For Emerging Technologies, Abiodun A. Ogunyemi, Kevin A. Johnston
The African Journal of Information Systems
The rapid development and release of emerging technologies have made their adoption challenging. Most often there are failing issues in organizational adoption of emerging technologies. It is yet unclear which component(s) of organization play the prominent role(s) in organizational readiness to adopt emerging technologies. Using a mixed method, this study conducted an online survey of 83 South African organizations for server virtualization adoption. Server virtualization is an emerging technology being widely adopted in most organizations in developed countries. IT executives rated server virtualization as the second-most important technology to help achieve cost reductions and optimize productivity in recent surveys. Very …
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
Arcot Desai NARASIMHALU
This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …
Customer Dissatisfaction And Complaining Responses Towards Mobile Telephony Services, Simon Gyasi Nimako Mr
Customer Dissatisfaction And Complaining Responses Towards Mobile Telephony Services, Simon Gyasi Nimako Mr
The African Journal of Information Systems
The paper examines customer satisfaction and complaint responses towards Mobile telephony services. The study was a cross-sectional survey involving customers from two mobile telephony companies. Data were collected using a self-administered structured questionnaire and analyzed using SPSS (version 16.0). The study found that customer satisfaction rating differed according to the mobile networks, and previous dissatisfaction significantly influences complaining response. Again, dissatisfied customers tend to complain more than satisfied ones. Moreover, dissatisfaction may not necessarily induce complaining and some satisfied customers may still complain. Furthermore, previous dissatisfaction may not always negatively affect overall satisfaction if it is effectively managed. Finally, the …
The Role Of Interactivity In Interent Business On Customer Experiential Values And Behavioral Intentions, So Ra Park
The Role Of Interactivity In Interent Business On Customer Experiential Values And Behavioral Intentions, So Ra Park
College of Business: Dissertations, Theses, and Student Research
Customers’ experiential value is based on holistic experience customers would have when they interact with a product/service. Experiential value is defined as “relativistic preference characterizing a subject’s experience with some object” (Holbrook, 1994). Internet is characterized for interactivity and it should have a role in customers’ experiential value. Therefore, this research investigates the role of interactivity (e-store interaction, C2C interaction, and content interaction) and web store utility on intrinsic and extrinsic customer experiential value. The final dependent variable is behavioral intentions. To test the research model, a survey was designed to capture online consumers’ perception of interactivity within e-stores, experiential …
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko
An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko
Humayun Zafar
In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …
The Economic Ramifications Of Strategic It Security Information Sharing In The Financial Services Industry, Humayun Zafar, Yoris A. Au
The Economic Ramifications Of Strategic It Security Information Sharing In The Financial Services Industry, Humayun Zafar, Yoris A. Au
Humayun Zafar
We investigate the economic ramifications of strategic IT security information sharing among firms in the financial services industry. An IT security information sharing system can potentially minimize security breaches. However, although the Presidential Decision Directive/NSC-63 encouraged the establishment of such a system in the form of industry based information sharing and analysis centers (ISACs), it is injudicious to assume that firms will be willing to naively share their security information with their strategic competitors. We argue that without a proper mechanism some firms will try to put in minimum effort, potentially reducing the system’s reliability, and aim to answer the …
An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology, Xiong Zhang, Zhiling Guo, Wei Thoo Yue
An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology, Xiong Zhang, Zhiling Guo, Wei Thoo Yue
Research Collection School Of Computing and Information Systems
Counterfeiting causes hundreds of billions dollars of losses around the world every year. Due to the growing prominence of online commerce, the seriousness of the situation could soon become much worse. Hence, reaching a clear understanding of the fundamental economic incentives behind this practice is of vital importance. In this paper, we investigate a problem within which a firm selling a counterfeit product engages in price competition with a firm that sells an authentic product to a population of heterogeneous consumers. An online intermediary acts as the facilitator of both firms’ transactions and may consequently be liable for any counterfeit …
Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen
Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen
Electronic Thesis and Dissertation Repository
Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.
Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.
The key findings of this research are fourfold. First, the core category developed in this …
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Transformative Community Service Learning: Beyond The "Poor," The "Rich," And The Helping Dynamic, Nancy E. Bertaux, Kathleen R. Smythe, Elaine Crable
Transformative Community Service Learning: Beyond The "Poor," The "Rich," And The Helping Dynamic, Nancy E. Bertaux, Kathleen R. Smythe, Elaine Crable
Faculty Scholarship
No abstract provided.