Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 145

Full-Text Articles in Management Information Systems

Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich May 2023

Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich

The Journal of Extension

Technology is a strategic asset in accomplishing the land grant mission. Selecting appropriate technology for Extension program management and delivery is essential to achieving planned outcomes, but can be challenging. This article describes the technology platforms selected by a new, legislatively funded Extension program delivering an online course in a hybrid distance-learning experience. The descriptions and application of these technology platforms will assist Extension professionals in choosing technology suitable for delivery and management of their programs as they plan for impact.


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


An Empirical Study To Understand The Effectiveness And Scope Of Blockchain Technology In Indian Public Sector, Radhakrishnan Airy, Hritika Gajarlawar, Nilay Bajaria, Ganesh Joshi Mar 2022

An Empirical Study To Understand The Effectiveness And Scope Of Blockchain Technology In Indian Public Sector, Radhakrishnan Airy, Hritika Gajarlawar, Nilay Bajaria, Ganesh Joshi

Walden Faculty and Staff Publications

The Blockchain is a distributed database that is maintained as Blocks and contains all transactions or digital occurrences. These are the records of transactions that take place between parties.Blockchain blocks are kept as blocks and shared among participants. Each Block is examined, validated, and saved by the parties who are a part of the system/network, each brick is unique and contains the details of a single transaction as well as the transaction's hash key. The study offers insights to researchers about the opportunity threat and future use of blockchain in the public sector.


Comparisons And Contrasts Of It Systems And Socioeconomic Status In School Districts, Hannah A. Ross Jan 2022

Comparisons And Contrasts Of It Systems And Socioeconomic Status In School Districts, Hannah A. Ross

OUR Journal: ODU Undergraduate Research Journal

In a technology thrived society, one would think that anyone can have access to technology – especially in schools. However, it is not always the case due to budgets and other factors. As technology becomes an essential part of the workforce, students need to know certain web applications that companies use. This study will compare four school districts within the Tidewater area of Virginia. The following school districts include Hampton City Schools, Newport News Public Schools, York County School Division, and Williamsburg-James City County Public Schools. Each school will be compared and contrasted by the technology applications that are used …


A Nation In Crisis... In Three Acts, William D. Senn Dec 2021

A Nation In Crisis... In Three Acts, William D. Senn

Proceedings from the Document Academy

A dramatic, spoken-word performance based on a detailed examination of the text of more than 1.7 million tweets concerning coronavirus and covid that were sent during the hours surrounding the president's declaration of emergency on March 13, 2020 including the transcript of the remarks made at the Rose Garden press conference. The researcher used the Twitter JSON API to retrieve all of the tweets containing the search terms "covid" and "corona" occurring during the timeframe. A text analysis was performed to identify the most frequently occurring n-grams present in the corpus of tweets. Thematic analysis and sentiment analysis were used …


Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina Nov 2021

Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina

Library Philosophy and Practice (e-journal)

This study was conducted with the aim of determining various bibliometric characteristics of documents published in the Scopus database. The information starts from the type of access, year, author, subject area, document type, publication stage, source title, keyword, affiliation, funding sponsor, country, source type, and language. Capabilities Information Technology and Knowledge Sharing are defined as the use of information technology capabilities and information technology management processes between business units by using the capabilities of resources together. Research on Information Technology Capabilities and Knowledge Sharing by providing a big picture that is visualized from year to year. This study aims to …


Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga Aug 2021

Evolving Information Security Governance Practices From Evolving Technologies: Focus On Covid-19 Lockdowns, Cosmas Ngwenya, Kennedy Njenga

The African Journal of Information Systems

This paper contemporizes evolving information security (IS) governance practices during the coronavirus pandemic (Covid-19) in South Africa. Using post-structuralism as a lens, we offer distinct insights regarding how information systems and technologies are evolving and the impact they present to the governance of IS systems during intermittent lockdowns. An online self-administered questionnaire was designed and distributed using Google forms to elicit data around evolution. A link was emailed to 160 respondents fitting pre-defined criteria. Data was exported to a statistical analysis software for analysis. Our results present an important relationship between technology evolutions and IS threats and that changes in …


Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne Jul 2021

Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne

Southwestern Business Administration Journal

We explored an undergraduate business program’s navigation of an unplanned change, response to the Covid-19 pandemic-occasioned move to online learning, and the resilience of its curriculum by following cohorts of students through two consecutive courses from the end of 2019 through 2020 up to summer 2021. The exploration was aimed at the assessment of the impact of the pandemic-induced disruptions, i.e., how the school’s curriculum fared through the pandemic. Premised on the school’s accreditor, AACSB’s agility-cultivating curriculum guideline, the curriculum should adapt and stabilize post-pandemic. To identify the appropriate cohort for observation, we scrutinized the four progressive levels of agility …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori Dec 2020

Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori

School of Professional Studies

Companies get hacked every day, and our in-scope company for this case study, RCAP Solution, was not an exception. Security incidents have increased both in volume and range in recent years, and cyber-attacks have become more sophisticated than ever before. There are so many reasons that drive this fact; one is that our infrastructure was not protected efficiently, but also attackers have become more knowledgeable in initiating advanced attacks at a scale. Additionally, the entrance of emerging technologies such as blockchain, machine learning, and the internet of things, added additional complexity to the already complex scene. Cybercriminals are using various …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D Jun 2020

The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …


To Close The Skills Gap, Technology And Higher-Order Thinking Skills Must Go Hand In Hand, Manying Qiu, Yaquan Xu, Emmanuel O. Omojokun Jan 2020

To Close The Skills Gap, Technology And Higher-Order Thinking Skills Must Go Hand In Hand, Manying Qiu, Yaquan Xu, Emmanuel O. Omojokun

Journal of International Technology and Information Management

Technology is rapidly changing the business landscape. Workforce skills gap is widening in the digital business environment. Universities and employers call for developing students’ higher-order thinking skills along with integrating technology into academic curricula. We conducted a survey to assess learning outcomes from two groups of undergraduate students: business majors and information technology (IT) majors. SAP ERP hands-on case studies were used for this comparative experiment. The student survey results showed that the students of both majors believed that learning SAP software can lead to more rewarding jobs and they felt confident about their competitiveness in the job market. Although …


Re-Examining The Unified Theory Of Acceptance And Use Of Technology (Utaut): Towards A Revised Theoretical Model, Anand Jeyaraj, Yogesh K. Dwivedi, Nripendra P. Rana, Marc Clement, Michael D. Williams Jun 2019

Re-Examining The Unified Theory Of Acceptance And Use Of Technology (Utaut): Towards A Revised Theoretical Model, Anand Jeyaraj, Yogesh K. Dwivedi, Nripendra P. Rana, Marc Clement, Michael D. Williams

ISSCM Faculty Publications

Based on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on …


Technology And The American Criminal Justice System, Taylor Hunt Dec 2018

Technology And The American Criminal Justice System, Taylor Hunt

Information Systems Undergraduate Honors Theses

The American prison population has grown to over 2.3 million citizens incarcerated (“United States of Incarceration,” 2016) and there are more than 900,000 police officers in the nation (“Law Enforcement Facts,” n.d.). These over 3 million people use technology every day in either their work or incarcerated lives. As the effectiveness of the criminal justice system is being questioned, now is the time to perform an assessment of the technology used and make technological recommendations to lower crime, incarceration, and recidivism rates simultaneously. To obtain that technology assessment, a student research study was conducted and consisted of research and interviews …


Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani Nov 2018

Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani

Shaji Khan

Mindfulness is a cognitive process that facilitates the discovery and correction of errors that might escalate. This study applies mindfulness theory to examine the impact of top management support for information systems on collective mindfulness, and that of collective mindfulness on IS performance. It treated such mindfulness in five dimensions, and top management support and IS performance as uni-dimensional. Forty-seven chief executive officers responded to a survey asking their perceptions of the constructs. Top management support predicted four of the dimensions with the strongest effect on sensitivity to IS operations. A negative path from support to commitment to IS resilience …


Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe Jan 2018

Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe

Faculty Publications

Aim/Purpose The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace.

Background The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo.

Methodology This paper presents a …


Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu Jan 2018

Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu

Management Faculty Publications

How do multinational corporations (MNCs) and domestic firms compensate technical and managerial skills of knowledge workers within and across geographies? This paper answers this question by examining how developed economy MNCs and emerging economy firms value MBA education and firm-specific IT experience of IT professionals in India; and how developed economy MNCs value MBA education and firm-specific IT experience differently across India and the U.S. Our analyses of archival data on more than 20,000 IT professionals reveal two important findings. First, for IT professionals in India, the marginal effect of firm-specific IT experience on compensation is greater for developed economy …


Modernizing The Supply Chain Of Airbus By Integrating Rfid And Blockchain Processes, Michael D. Santonino Iii, Constantine M. Koursaris, Michael J. Williams Jan 2018

Modernizing The Supply Chain Of Airbus By Integrating Rfid And Blockchain Processes, Michael D. Santonino Iii, Constantine M. Koursaris, Michael J. Williams

International Journal of Aviation, Aeronautics, and Aerospace

Radio Frequency Identification, or RFID, has been gaining momentum within the aviation industry for improving efficiencies in the supply chain. RFID technology is not new, with many manufacturers outside of aviation being more responsive as early adopters to the technology. Currently, many of the full-scale implementation organizations from late adopters, have strategically integrated RFID technology into the manufacturing supply chain to tag parts and for airports/airlines to track baggage and passengers throughout their airport journey. Literature remains rather sparse in the implementation and success factors within the aviation supply chain as a number of businesses have kept much of the …


Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D Dec 2017

Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D

Department of Educational Administration: Faculty Publications

Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …


Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan Oct 2017

Automation And The Accounting Profession, Clarence Goh, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Automation poses a threat to many of the tasks that are performed by accountants today. Certainly, many emerging technologies have already begun to perform tasks that have traditionally been performed by accountants. For example, advancements in cloud-based accounting software now make it much easier for small businesses to easily and accurately enter and edit financial information on their own without the input of accountants. Looking further into the horizon, newer technologies can now turn hard-copy receipts into a machine-readable format, encrypt them,and allocate them to an account without any input from a human. Such developments will continue to reduce the …


Leveraging Academic Partnerships To Improve Logistics At Nonprofit Organizations, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker Apr 2017

Leveraging Academic Partnerships To Improve Logistics At Nonprofit Organizations, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker

IT and Supply Chain Management Faculty Publications and Presentations

This article presents the results of a partnership between a nonprofit organization and a team of academic researchers that developed a low-cost spreadsheet-based tool that allows organizations to effectively schedule vehicle operations. Specifically, the tool (1) handles the real-world constraints present in moderately complex logistics environments; and (2) uses general computing hardware and software that is already deployed in most organizations, thereby rendering the solution radically low cost (effectively free). We deployed this tool to a humanitarian organization, the Idaho Foodbank, which realized a substantial improvement in its fleet efficiency and a corresponding reduction in route-planning time. The methodology used …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker Mar 2016

Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker

IT and Supply Chain Management Faculty Publications and Presentations

In this paper, we discuss a project in which we developed a spreadsheet-based system that interfaces with a no-fee driving-directions application programming interface to quickly and accurately build a travel time and distance matrix and then rapidly determine near-optimal delivery-route schedules using a modified genetic algorithm. To the best of our knowledge, the method we used to create the travel matrix had not been employed previously in an academic study. The tool was tested and refined in a humanitarian setting—a local branch of the Meals on Wheels Association of America (now Meals on Wheels America), an organization that combats hunger …


Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin Jan 2016

Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin

Communications of the IIMA

China’s aged population has increased dramatically. Because of the one child policy, China now has fewer and fewer children able to support the elderly. The care of China’s elderly is a huge challenge which requires the exploration of all kinds of elderly care models through intelligence and information management technology advances. With the evolving field of Information Management and with the development of newer and cheaper technology, the time has come for a paradigm shift to be explored. A shift in the way China is managing its technology and culture expectations is necessary to address this unique need. This paper …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth Apr 2015

An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth

Doctor of Business Administration Dissertations

This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.

Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.