Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 205

Full-Text Articles in Management Information Systems

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University Dec 2017

Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou Dec 2017

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou

Marriott Student Review

Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.


The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee Dec 2017

The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee

The African Journal of Information Systems

There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between …


Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke Dec 2017

Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke

The African Journal of Information Systems

This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current generation …


Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr. Dec 2017

Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr.

The African Journal of Information Systems

This paper presents the findings of a study that uses the advanced impact analysis (ADVIAN®) method to derive critical success factors (CSFs) of enterprise resource planning implementation in higher education institution. Through analysis of CSFs, the paper contributes towards assisting higher education institution to reduce some of the plethora of challenges in this domain as highlighted in the literature. The ADVIAN® method classified 20 factors into categories of integration, criticality and stability as well as ranked them by measures of precarious, driving and driven. The results of the classification and ranking show 5 factors that are ideal for intervening activities …


Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo Dec 2017

Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo

The African Journal of Information Systems

The South African ICT industry is struggling with high turnover despite the relatively high remuneration packages it offers to its gender and racially diverse IT professionals. This study explored pay satisfaction levels and its relationship with job satisfaction, organizational commitment, and turnover intentions. Survey responses from 158 IT professionals were subjected to descriptive, correlation and regression analysis. The results show that, irrespective of gender or race, employees generally have low pay satisfaction, low organizational commitment, and only moderate job satisfaction levels. However, black ethnic groups did show a difference in their appraisals of pay satisfaction, expressing slightly lower pay satisfaction …


Enabling Context-Based Learning With Kportal Webspace Technology, Anand Jeyaraj, Vijay Sethi, Vikram Sethi, Kevin P. Duffy, Berkwood M. Farmer Dec 2017

Enabling Context-Based Learning With Kportal Webspace Technology, Anand Jeyaraj, Vijay Sethi, Vikram Sethi, Kevin P. Duffy, Berkwood M. Farmer

ISSCM Faculty Publications

Recognizing the importance of context-based learning and the general lack of technology applications in the design and development of the ideal and formal curricula, this paper describes an experimental system at a large public university. The authors describe the creation of a contextual environment for introducing concepts related to information security to undergraduate business students using the KPortal (Knowledge Portals) webspace technology that supports dynamic content gathered from various sources automatically. The KPortal webspace rated highly on the various attributes of effective contexts and the characteristics of technologies that enable context-based learning. The flexibility provided by the webspace permitted the …


Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang Dec 2017

Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang

School of Professional Studies

Canines for Disabled Kids have been working on behalf of children and their families to educate communities and promote service dog partnerships for almost twenty years. Their advocacy with local legislatures, business owners, and community leaders highlighted the difficulties encountered when differentiating service dogs from emotional support/comfort dogs. Service dogs are entitled to access by the Americans with Disabilities Act (ADA), while emotional support/comfort dogs are not protected under the federal statute or to the same rights. Canines for Disabled Kids proposed a study to obtain a current count of licensed service dogs in the Commonwealth and investigate the feasibility …


Exploring Factors Affecting Social E-Commerce Service Adoption: The Case Of Facebook Gifts, Stanislav Mamonov, Raquel Benbunan-Fich Dec 2017

Exploring Factors Affecting Social E-Commerce Service Adoption: The Case Of Facebook Gifts, Stanislav Mamonov, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. …


How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge Dec 2017

How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge

Theses & Dissertations

This study, framed by decision making, program theory, and performance measurement theory, explored the knowledge and experience that enable decision makers to identify organizational performance measures. It used a mixed method, exploratory sequential research design to discover the experience, knowledge, and skills (EKS) senior decision makers felt were important in learning to choose organizational performance measures. From the analyzed interviews, a survey was designed to measure the importance of the EKS characteristics. Qualitative analysis identified 55 life, work, or educational experience; knowledge; or skill characteristics and 23 effective measure characteristics. Regression analysis and PCA were used to extract 6 components. …


Department Of Information Systems & Supply Chain Management Profile, Raj Soin College Of Business, Wright State University Dec 2017

Department Of Information Systems & Supply Chain Management Profile, Raj Soin College Of Business, Wright State University

ISSCM Annual Reports

A three page profile of the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang Dec 2017

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor Dec 2017

Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor

Journal of International Technology and Information Management

The Bureau of Labor Statistics projected the demand for information technology (IT) human resources to increase by 13.26 percent between 2014 and 2024. In this survey research, the IT professionals estimated a growth of 34.16 percent in IT human resources over a period of five years from the year 2016. The goal of this survey study was to try to understand the discrepancy in the estimates for IT human Resources requirements by developing a theory-driven model to evaluate the impact of growth in IT outsourcing/offshoring, cloud-computing, end-users-computing, IT applications, and usage of commercial-off-the-shelf/ERP on the need for IT human resources.


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D Dec 2017

Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D

Department of Educational Administration: Faculty Publications

Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …


Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University Nov 2017

Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nineteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Using Comment Moderation To Evaluate And Reply To Your Students, Curtis Izen Nov 2017

Using Comment Moderation To Evaluate And Reply To Your Students, Curtis Izen

Publications and Research

This blog discusses how students create a VoiceThread video comment on how they will incorporate an excel macro into their business.


Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime Nov 2017

Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime

The Qualitative Report

Medicare-eligible physicians at primary care practices (PCP) that did not implement an electronic health record (EHR) system by the end of 2015 face stiff penalties. One year prior to the 2015 deadline, approximately half of all primary clinics have not implemented a basic EHR system. The purpose of this phenomenology study was to explore rural primary care physicians and physician assistants’ experiences regarding overcoming barriers to implementing EHRs. Complex adaptive systems formed the conceptual framework for this study. Data were collected through face-to-face interviews with a purposeful sample of 21 physicians and physician assistants across 2 rural PCPs in the …


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Nov 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. Nov 2017

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Dale H Shao

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender, including …


Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr. Nov 2017

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Dale H Shao

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in …