Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,469 Full-Text Articles 5,945 Authors 3,557,654 Downloads 162 Institutions

All Articles in Management Information Systems

Faceted Search

4,469 full-text articles. Page 1 of 154.

Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth 2024 University of California, Santa Barbara

Sentinel Surveillance Of Sars-Cov-2 Rates And Equity Impacts Using Labor And Delivery Patients In Phoenix, Arizona, Caitlyn J. Linehan, Trisalyn Nelson, Celeste V. Bailey, Esma Gel, Dean V. Coonrod, Cheryl K. Roth

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Proactive management of SARS-CoV-2 requires timely and complete population data to track the evolution of the virus and identify at risk populations. However, many cases are asymptomatic and are not easily discovered through traditional testing efforts. Sentinel surveillance can be used to estimate the prevalence of infections for geographical areas but requires identification of sentinels who are representative of the larger population. Our goal is to evaluate applicability of a population of labor and delivery patients for sentinel surveillance system for monitoring the prevalence of SARS-CoV-2 infection. We tested 5307 labor and delivery patients from two hospitals in Phoenix, Arizona, …


Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil 2024 American University in Cairo

Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil

Theses and Dissertations

Trading stocks of publicly traded companies in stock markets is a challenging topic since investors are researching what tools can be used to maximize their profits while minimizing risks, which encouraged all researchers to research and test different methods to reach such a goal. As a result, the use of both fundamental analysis and technical analysis started to evolve to support traders in buying and selling stocks. Recently, the focus increased on using Machine learning models to predict stock prices and algorithmic trading as currently there is a huge amount of data that can be processed and used to forecast …


Data-Driven Forecasting For Effective Demand Management In The E-Commerce Ecosystem, Chirag Pandey 2024 California State University, San Bernardino

Data-Driven Forecasting For Effective Demand Management In The E-Commerce Ecosystem, Chirag Pandey

Electronic Theses, Projects, and Dissertations

This culmination project investigated and analyzed the impact of factors influencing sales forecasting models in the e-commerce ecosystem. The research questions are: Q1) To what extent are sales forecasting models in the e-commerce ecosystems influenced by customer demographic variables such as gender, age, and geographic locations? Q2) To what extent are sales forecasting models in the e-commerce ecosystems influenced by product specific factors? The datasets used were from Kaggle, and the Worldometer websites. The findings are: Q1) Individuals aged '55 or over' significantly impact total sales in both the USA and Brazil. Male consumers consistently accounted for a higher proportion …


Impact Of Leadership In Project Management, Ian Wegh 2024 University of Arkansas, Fayetteville

Impact Of Leadership In Project Management, Ian Wegh

Information Systems Undergraduate Honors Theses

Today’s business environment demands effective project management for enterprises to meet their goals and continue to be innovative. Inherently, this also means that project managers must have strong leadership skills. Project management provides a framework of techniques that provides a symbiotic relationship between both the framework and the leader. The idea behind project management is to complete objectives efficiently within a certain time period given a restricted number of resources. This means project management is a process of principles, tools, and methodologies used to effectively manage a team through the System Development Life Cycle. The System Development Life Cycle (SDLC) …


Impacts Of Energy Price Cap System On Electricity And Gas Prices In The Era Of Energy Crisis, Jyothi Swaroop Chava 2024 California State University - San Bernardino

Impacts Of Energy Price Cap System On Electricity And Gas Prices In The Era Of Energy Crisis, Jyothi Swaroop Chava

Electronic Theses, Projects, and Dissertations

29 million households in the United Kingdom (UK) use Energy Price Cap and the UK government spend about 43 billion dollars a year which is 1.7 percent of the GDP in subsidizing the energy price cap subsidies to the households and businesses. The energy prices in the UK have seen a significant rise in the past few years for distinct reasons. This culminating experience project explains the mechanism of the energy price cap used for the household energy supply in the UK and how it has been affected between the years 2022 to 2024. The research questions are: (Q1) How …


An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei 2024 California State University, San Bernardino

An Exploration Of Synergy Evaluation Application Model To Support Implementation On Merger And Acquisition, Jieping Mei

Electronic Theses, Projects, and Dissertations

ABSTRACT

The project focuses on a comprehensive system’s analysis and design of the front-end of the Synergy Evaluation Application Model (SEAM) system for mergers and acquisitions (M&As). The research questions asked are: Q1. How did the SEAM system incorporate the system requirements and design that incorporated the strategic goals and priorities of both the acquirer and the acquiree? Q2. What data sources will the SEAM system rely on, and how does it overcome data integration, automation, visualization challenges? Q3. How will the model identify build in potential synergies, both quantitative and qualitative? The research questions were analyzed through the SEAM …


Examining Bgsu's Degree Audit And How To Make It More Effective, Ella Delzeith 2024 Bowling Green State University

Examining Bgsu's Degree Audit And How To Make It More Effective, Ella Delzeith

Honors Projects

The purpose of this project is to better help students at BGSU schedule their classes throughout their four years while also making sure they are following along with their degree audit. Why are degree audits seen as confusing? Is there a better way to navigate the degree audit? How are students affected by an ineffective degree audit? Can a schedule be produced alongside the degree audit? Why is organization crucial in a degree audit? These are the guiding research questions for my project to help achieve my goal of creating a tool to help students navigate the degree audit in …


Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda 2024 Department of Information Systems, University of Cape Town

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler 2024 Vienna University of Economics and Business

Exploring Entrepreneurial Intention And Subjective Beliefs: A Comparative Analysis Of General Education Schools And Commercial Schools, Julia Riess, Bettina Fuhrmann, Gerhard Geissler

International Journal for Business Education

This study examines the entrepreneurial intentions of Austrian secondary school students, specifically comparing students from commercial schools with those from general education schools. We analyzed 2,329 data sets and found that subjective beliefs, primarily behavioral and control beliefs, significantly influence entrepreneurial intentions. In addition, demographic factors such as gender, language, acquaintance with entrepreneurs, and school type play a significant role in explaining the variance in entrepreneurial intentions.

Our detailed analysis shows that students from commercial schools have stronger entrepreneurial intentions and subjective beliefs. Particularly notable are the differences in behavioral beliefs, where students from commercial schools find all aspects of …


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor 2024 Indiana University - Bloomington

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


Optimizing Oncological Care: The Influence Of Ai On Insurance Approvals, Brian Cox, Alberto Coustasse 2024 Marshall University

Optimizing Oncological Care: The Influence Of Ai On Insurance Approvals, Brian Cox, Alberto Coustasse

Management Faculty Research

Within the United States, oncological treatments represent a considerable portion of the health care landscape, in terms of both their prevalence and associated costs. The year 2022 witnessed 1.9 million new cancer cases and over 600,000 cancer-related deaths, signaling the pressing need for efficient strategies in managing and addressing challenges in oncology. Studies suggest that using AI-based systems to standardize clinical data submissions and integrate electronic health records using the Fast Healthcare Interoperability Resources data standard can optimize these processes further.


Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall 2024 Christopher Newport University

Leading Horses To Water During A Pandemic: Assuring Communication Learning For "Quants", Thomas Hall

International Journal for Business Education

Students who are attracted to quantitative disciplines of study can be reluctant to devote much attention to the important task of communicating, and previous research (Hostager, 2018) has identified statistically significant differences in learning approaches by major among undergraduate business students. This paper presents results of learning assurance for writing skills (direct measures) even when the content of the course relates to the highly quantitative topics of data analytics and finance. The approach combines various pedagogical methods in an undergraduate, writing-intensive setting: traditional testing but in an iterative framework, “flipped classroom” intensive work using spreadsheet software, repeated submission of brief …


Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe 2024 University of Ljubljana, School of Economics and Business, Ljubljana, Slovenia

Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe

Economic and Business Review

For more than six decades, creativity has been the cornerstone of diverse scientific disciplines, including psychology, sociology, and organizational behavior (OB) studies. Its fundamental role in guiding business prospects, driving development, and fueling economic growth has made it an essential research theme in many fields. Yet, despite its importance, scholars within the information systems (IS) discipline have highlighted the significant lack of attention paid to this concept in their research. The transformative role creativity plays in contemporary business environments, along with the ever-present need to innovate, compete, and grow, sparked our curiosity. Is creativity still an understudied area in the …


Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-chi LO, Ee-peng LIM 2024 Singapore Management University

Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-Chi Lo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Knowledge graphs can be used to enhance text search and access by augmenting textual content with relevant background knowledge. While many large knowledge graphs are available, using them to make semantic connections between entities mentioned in the textual content remains to be a difficult task. In this work, we therefore introduce contextual path generation (CPG) which refers to the task of generating knowledge paths, contextual path, to explain the semantic connections between entities mentioned in textual documents with given knowledge graph. To perform CPG task well, one has to address its three challenges, namely path relevance, incomplete knowledge graph, and …


Service Transformation That Will Boost Your Business, Neeta LACHMANDAS-SAKELLARIOU 2024 Singapore Management University

Service Transformation That Will Boost Your Business, Neeta Lachmandas-Sakellariou

Asian Management Insights

Focus on your customers to catapult your company to success. However, leaders must drive a culture change to make it happen.


It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick 2024 University of Johannesburg, Department of Applied Information Systems

It Deployment And Integration – An Assessment Of Enabling And Inhibiting Factors, Lesley Matshwane, Carl Marnewick

The African Journal of Information Systems

Although delivery of services in South Africa is the responsibility of all spheres of government, the provision of basic services lies at the doorstep of local municipalities. Local municipalities have, for many reasons, frequently been unable to live up to this mandate despite the fact that some of the challenges that they face can be addressed by using IT. This paper assesses factors enabling and inhibiting the efficient deployment and integration of IT in local municipalities. The technological, organizational and environmental (TOE) framework was deployed to assess the factors. A multiple case study in which semi-structured interviews were conducted produced …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. 2024 University of North Texas

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger 2024 College of Southern Maryland

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo 2024 University of Johannesburg

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa McKee 2024 University Colorado Colorado Springs

Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …


Digital Commons powered by bepress