Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 209

Full-Text Articles in Management Information Systems

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Information Technology And The Search For Organizational Agility: A Systematic Review With Future Research Possibilities, Paul P. Tallon, Magno Queiroz, Tim Coltman, Rajeev Sharma Dec 2018

Information Technology And The Search For Organizational Agility: A Systematic Review With Future Research Possibilities, Paul P. Tallon, Magno Queiroz, Tim Coltman, Rajeev Sharma

Data Analytics & Information Systems Faculty Publications

Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu Dec 2018

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will …


Isscm Newsletter, December 1, 2018, Raj Soin College Of Business, Wright State University Dec 2018

Isscm Newsletter, December 1, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The relationship between the adoption …


Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim Dec 2018

Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim

CMP Research

This case chronicles specific background, challenges, and actions taken by an Indonesian microfinancing institution (MFI) as it was implementing a digital mobile system to replace its current manual processes used in its field office operations. From a high level perspective, it describes the challenges faced by an organization that was attempting to implement a new digital initiative but constrained by its resource-scarce, institutionally, and culturally bound environment. At the same time, it highlights that this digital initiative was a critical part of its overall plan for addressing industry demands, increasing competitive pressures, and internal process issues. The case study thus …


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote Dec 2018

Using Sas™ Software To Enhance Pedagogy For Text Mining And Sentiment Analysis Using Social Media (Twitter™) Data, Ramesh Subramanian, Danielle Cote

Journal of International Technology and Information Management

This pedagogical paper describes how a graduate course in Text Mining was developed and taught in a fully online format at Quinnipiac University. The software used was SAS™ Enterprise Miner. This paper discusses the design, software used and the methodology followed in the course. A critical component of the course required the students to delve deep into social media data by completing a detailed project on analyzing sentiment analysis using large files of social media data. A sample report of this project, which was a key deliverable for the course, is described at length in this paper.


How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma Dec 2018

How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma

Journal of International Technology and Information Management

With the prevalence of information technology (IT), the value of IT awareness increasingly grows, and IT control becomes a key part of firms’ strategies and objectives. Although leadership plays an important role in IT control governance, limited research has studied whether IT awareness is associated with IT control weaknesses (ITCWs) and firm performance simultaneously. Drawing on the agency and resource dependence theory, this paper proposes an integrative model to examine the impact of IT awareness on ITCWs and firm performance. We empirically validate the model using a data set of 310 firms collected from multiple sources including Audit Analytics, Compustat, …


Three Empirical Studies On Digital Innovation Management: New Organizing Logic Of Antecedents And Consequences Of Innovation, Kailing Deng Dec 2018

Three Empirical Studies On Digital Innovation Management: New Organizing Logic Of Antecedents And Consequences Of Innovation, Kailing Deng

Graduate Theses and Dissertations

In the last decade, innovation has undergone considerable changes in most industries. Digital innovation may represent the use of digital technology in the innovation process or to the end outcome of innovation. Over the years, innovation has become open, global, and collaborative in nature and involves diverse stakeholders and distributed innovation processes (Nambisan 2013; Nambisan et al. 2017). The importance of innovation will continue to grow in the future, as the business environment becomes increasingly uncertain and competitive. With the rapid development of digitized technologies, in addition to innovation outcomes such as new products, platforms, and services, IS researchers have …


Technology And The American Criminal Justice System, Taylor Hunt Dec 2018

Technology And The American Criminal Justice System, Taylor Hunt

Information Systems Undergraduate Honors Theses

The American prison population has grown to over 2.3 million citizens incarcerated (“United States of Incarceration,” 2016) and there are more than 900,000 police officers in the nation (“Law Enforcement Facts,” n.d.). These over 3 million people use technology every day in either their work or incarcerated lives. As the effectiveness of the criminal justice system is being questioned, now is the time to perform an assessment of the technology used and make technological recommendations to lower crime, incarceration, and recidivism rates simultaneously. To obtain that technology assessment, a student research study was conducted and consisted of research and interviews …


The Impact Of Net Neutrality And Additional Regulations On The Future Of The Internet Of Things In The United States, Radhika Kanaskar Dec 2018

The Impact Of Net Neutrality And Additional Regulations On The Future Of The Internet Of Things In The United States, Radhika Kanaskar

Honors Scholar Theses

Throughout the history of the Internet and the development of computers, commercial Internet service providers (ISPs) and independent agencies of the United States government have always controlled how consumers interact with technology. Then, in the past decade, powerful technology corporations developed new products and services that fundamentally altered society’s relationship with the Internet. The introduction of Internet of Things technology through devices such as smart speakers, smart appliances, smart cars, and wearables also contributed to the change. However, regardless of these significant advancements in technology, regulations for ISPs and technology corporations has predominately remained the same. The increased presence of …


Bibliometric Indicators For Assessing The Quality Of Scholarly Communications: A Case Study On International Journal Of Cooperative Information Systems, Basudev Mohanty, Jyotshna Sahoo, Nrusingh Kumar Dash Librarian Dec 2018

Bibliometric Indicators For Assessing The Quality Of Scholarly Communications: A Case Study On International Journal Of Cooperative Information Systems, Basudev Mohanty, Jyotshna Sahoo, Nrusingh Kumar Dash Librarian

Library Philosophy and Practice (e-journal)

This paper analyses various bibliometric dimensions of the journal literature such as authors’ productivity, geographical distribution, citation pattern, institution-wise distribution of articles, discipline-wise distributions of articles, productive institutions, Productivity Index (PI), Activity Index (AI), Domestic Collaborative Index (DCI) and International Collaborative Index (ICI) etc. It also explores the applicability of Lotka’s Inverse Square Law and Zipf’s Law to examine the observed rank – frequency pattern of Keywords and Subject Terms of Information Systems (IS) literature. To illustrate these bibliometric indicators pertinent information on the field of Information Systems (IS) collected from EBSCO database for the International Journal of Cooperative Information …


Isscm Alumni Newsletter, November 29, 2018, Raj Soin College Of Business, Wright State University Nov 2018

Isscm Alumni Newsletter, November 29, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A ten page alumni newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani Nov 2018

Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani

Shaji Khan

Mindfulness is a cognitive process that facilitates the discovery and correction of errors that might escalate. This study applies mindfulness theory to examine the impact of top management support for information systems on collective mindfulness, and that of collective mindfulness on IS performance. It treated such mindfulness in five dimensions, and top management support and IS performance as uni-dimensional. Forty-seven chief executive officers responded to a survey asking their perceptions of the constructs. Top management support predicted four of the dimensions with the strongest effect on sensitivity to IS operations. A negative path from support to commitment to IS resilience …


Gender Difference In Equity Crowdfunding: An Exploratory Analysis, Ross Malaga, Stanislav Mamonov, Janet Rosenblum Nov 2018

Gender Difference In Equity Crowdfunding: An Exploratory Analysis, Ross Malaga, Stanislav Mamonov, Janet Rosenblum

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Purpose: Title II of the Jumpstart Our Business Startups Act aims to make it easier for new ventures to raise funds from accredited investors via equity crowdfunding. The purpose of this paper is to understand whether Title II equity crowdfunding represents an opportunity for women-owned companies (those that have one or more female owners/founders) to raise capital at rates similar to companies owned by men. Design/methodology/approach: The authors conduct an exploratory analysis using a data set containing 6,234 Title II equity crowdfunded offerings aggregated across 17 crowdfunding platforms between September 2013 and December 2015. Findings: The authors find that women-owned …


Is It Time To Drive A Stake Through Key Performance Indicators?, Singapore Management University Nov 2018

Is It Time To Drive A Stake Through Key Performance Indicators?, Singapore Management University

Perspectives@SMU

The metrics may be of little use and specific targets give rise to manipulation


Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al Nov 2018

Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al

Research Collection School Of Computing and Information Systems

The report “Cross-Border Interbank Payments and Settlements” is a cross-jurisdictional industry collaboration between Canada, Singapore and the United Kingdom to examine the existing challenges and frictions that arise when undertaking crossborder payments. This report explores proposals for new and more efficient models for processing cross-border transactions.


Bridging Perspectives Of Customer Value Proposition And Customer Perceived Value Of Intercity Non-Bus Transportation Service In Indonesia, Ihsan Hadiansah, Rendika Nugraha, Adhi Setyo Santoso, Mustika Sufiati Purwanegara Oct 2018

Bridging Perspectives Of Customer Value Proposition And Customer Perceived Value Of Intercity Non-Bus Transportation Service In Indonesia, Ihsan Hadiansah, Rendika Nugraha, Adhi Setyo Santoso, Mustika Sufiati Purwanegara

The South East Asian Journal of Management

Research Aims - The study aim is to explore value proposition creation from the perspectives of non-bus transportation services and to investigate the factors in customer perceived value, especially functional value (operations, facilities, professionalism, and price), that influence purchase intention from customers’ perspectives. Design/methodology/approach - This mixed methods study used personal interviews, participant observation, and a survey to collect the data. Then, we conducted exploratory case study by using organisational level logic model as a qualitative analysis technique. Finally, we used regression for hypothesis testing of the quantitative section. Research Findings - The results indicated that non-bus transportation services should …


Mapping The Terrain: An Indonesian Business Perspective Of The Asean Economic Community, Marko S. Hermawan, Lena Choong Oct 2018

Mapping The Terrain: An Indonesian Business Perspective Of The Asean Economic Community, Marko S. Hermawan, Lena Choong

The South East Asian Journal of Management

Research Aims - This paper focuses on the institutions that the ASEAN Economic Community (AEC) project will affect. By employing institutional logics theory, this study scrutinizes academics and business practitioners as institutions and the cultural context embedded within them. Methodology - A mixed method of newspaper data analysis and semi-structured interviews was used to obtain comprehensive data from both sources. Research findings - The findings suggest a definite orientation gap between business practitioners, associations, and academics—the three groups have less information and contributions compared with the government and association influences. This study concludes that more participation is needed from these …


Effect Of Managers' Communication On Training Application With Motivation To Learn As An Intervening Variable, Azman Ismail, Nurul Afiqah Foboy, Azmawaty Mohamad Nor Oct 2018

Effect Of Managers' Communication On Training Application With Motivation To Learn As An Intervening Variable, Azman Ismail, Nurul Afiqah Foboy, Azmawaty Mohamad Nor

The South East Asian Journal of Management

Research Aims - According to the present research concerning organizational training, managers’ communication are often seen as a critical training management issue that may help to maintain and enhance organizational competitiveness and performance in a borderless world and era of globalization. In this study, the relationship between managers’ communication, motivation to learn and training application was evaluated at military hospitals in Peninsular Malaysia. Design/methodology/approach - The SmartPLS path model analysis was utilized to examine the research hypotheses and evaluate the validity and reliability of instrument used. Research Findings - The results demonstrate that the capability of managers to communicate the …


Knowledge Inertia In The Innovation Of Coffee Production, Hafiz Rahman, Hanjaya Putra Siswowiyanto Oct 2018

Knowledge Inertia In The Innovation Of Coffee Production, Hafiz Rahman, Hanjaya Putra Siswowiyanto

The South East Asian Journal of Management

Research Aims - This paper aims at discussing the existence of knowledge inertia and its influence to the product innovation, with particular analysis given to the coffee production during the preharvest and post-harvest periods. Design/methodology/approach - The study uses quantitative methodology, and operates multiple and partial regression analysis between variables of the study to measure the impact of knowledge inertia to the innovation of coffee production. To put the findings in detail, the study separates the innovation of coffee product in two sequences, named [a] pre-harvest period and, [b] post-harvest period. Data and information were collected based on cross-sectional cohort …


Innovative Strategic Positioning Of Capital Flows Mobilization Of The Original Five Asean Countries: Which Are Leading?, Eric J. Nasution, Nila Krisnawati Oct 2018

Innovative Strategic Positioning Of Capital Flows Mobilization Of The Original Five Asean Countries: Which Are Leading?, Eric J. Nasution, Nila Krisnawati

The South East Asian Journal of Management

Research Aims - The study was conducted to employ the capital flows mobilization (CFM) indicators as the leading economic indicators to determine the leadership role among the five original ASEAN countries. It sought to simplify and answer three research questions on the differences of CFM indicators among the ASEAN countries, their ranks, and how they were positioned in terms of CFM performance and Granger causality risk level. Methodology - Nonparametric statistics and the economic game theory using a four-quadrant matrix were used to answer the three research questions. Research findings - The first hypothesis was accepted, which indicates that the …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue …


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs’. Flexibility in …


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black Oct 2018

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results …