Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,256 Full-Text Articles 5,548 Authors 3,133,614 Downloads 159 Institutions

All Articles in Management Information Systems

Faceted Search

4,256 full-text articles. Page 1 of 146.

Compete To Learn: Toward Cybersecurity As A Sport, TJ OConnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk 2023 Florida Tech

Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk

Journal of Cybersecurity Education, Research and Practice

To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to integrate e-sports and gamified cybersecurity approaches into the inaugural US Cyber Games Team. During this tenure, we learned many lessons about recruiting, assessing, and training cybersecurity teams. We share our approach, materials, and lessons learned to serve as a model for fielding amateur cybersecurity teams for future competition.


How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang 2023 Pittsburg State University

How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang

Journal of Cybersecurity Education, Research and Practice

Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak 2023 Robert Morris University

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu 2023 Marymount University

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki 2023 Portland State University

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki

University Honors Theses

Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.


How Are Senior Citizens Capable To Cope With The World Of Digital Natives?, Hely Westerholm, Pirjo Takanen-Körperich 2023 DACUM Finland, Helsinki, Finland

How Are Senior Citizens Capable To Cope With The World Of Digital Natives?, Hely Westerholm, Pirjo Takanen-Körperich

International Journal for Business Education

This study discusses the continuously growing threat to the senior citizens*), later called seniors, who can be isolated from the society if their digital competences and experiences are too poor in today’s digital world. It has been noted that to cope with one’s pursuits seniors need to actively construct and maintain their capabilities in ways that are flexible in the world of the digital devices, in response to the changing vicissitudes of life. Thus, the claim above illuminates the issue that the ability to learn from experiences is highly valued in the digital world.

The seniors are obliged to closely …


A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle 2023 IT-Doctoral Program, Information Systems Specialty, Addis Ababa University

A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle

The African Journal of Information Systems

Prescriptive knowledge constitutes one of the important contributions of information systems design theorizing in information systems (IS) research. Existing methods for IS design theorizing apply kernel/reference theories as sources of justificatory knowledge that serve to justify and validate the knowledge produced. This has gaps in guiding how specific contexts of stakeholders and their practices can be entertained in the design process. This research attempts to address the above void, taking a socio-technically complex agricultural extension information service and the contexts that define it into account. The research builds on an existing IS design theory framework and shows how it can …


Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials, Keiasha Hypolite 2023 The University of Southern Mississippi

Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials, Keiasha Hypolite

Dissertations

ABSTRACT

Millennials comprise the largest group of individuals in the workforce, yet organizations struggle to keep millennials engaged in the workplace. Millennials move from job to job, with an average stay at one employer between 12 and 18 months (Hechl, 2017). Researchers have reported that millennials cause the majority of turnover in the workplace. Globally, human resources practitioners experience difficulties retaining millennials (Sahraee et al., 2021). Previous studies have researched millennials, affective commitment, mentoring, and turnover. However, no known research has used all four factors to solve a global problem. In their discussion of the highly competitive labor market, Ramírez …


Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich 2023 Utah State University

Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich

The Journal of Extension

Technology is a strategic asset in accomplishing the land grant mission. Selecting appropriate technology for Extension program management and delivery is essential to achieving planned outcomes, but can be challenging. This article describes the technology platforms selected by a new, legislatively funded Extension program delivering an online course in a hybrid distance-learning experience. The descriptions and application of these technology platforms will assist Extension professionals in choosing technology suitable for delivery and management of their programs as they plan for impact.


Combining Frameworks To Improve Military Health System Quality And Cybersecurity, Dr. Maureen L. Schafer, Dr. Joseph H. Schafer 2023 Georgetown University

Combining Frameworks To Improve Military Health System Quality And Cybersecurity, Dr. Maureen L. Schafer, Dr. Joseph H. Schafer

Military Cyber Affairs

Existing conceptual frameworks and commercially available technology could be considered to rapidly operationalize the use of Quality Measures (QM) within military health systems (Costantino et al. 2020). Purchased healthcare as well as digital healthcare services have paved the way for data collection from multiple information systems thus offering stakeholders actionable intelligence to both guide and measure healthcare outcomes. However, the collection of data secondary to Smart Devices, disparate information systems, cloud services, and the Internet of Medical Things (IOMT) is a complication for security experts that also affect clients, stakeholders, organizations, and businesses delivering patient care. We have combined three …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob 2023 Liberty University

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon 2023 California State University, San Bernardino

A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon

Electronic Theses, Projects, and Dissertations

This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …


Tesla Energy Division Strategic Audit, Kaleb Strawhecker 2023 University of Nebraska-Lincoln

Tesla Energy Division Strategic Audit, Kaleb Strawhecker

Honors Theses, University of Nebraska-Lincoln

Tesla’s electric vehicle manufacturing operation is the major revenue source for the company. Tesla has established itself as a significant player amongst other automotive manufacturers, specifically in the electric vehicle sector. Many trends are favoring Tesla’s expansion. This audit takes a look at trends and changes through a PESTEL analysis along with Porter’s Five Forces. Both provide an in-depth look into what the environment around Tesla is like. Then, these are used to evaluate Tesla’s major strategies, competitive advantages, and resources it has at its disposal. Finally, the audit will address how the factors allow Tesla to take advantage of …


Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies, Adhi Ari Utomo, Mira Maulida, Soebowo Musa 2023 Swiss German University

Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies, Adhi Ari Utomo, Mira Maulida, Soebowo Musa

The South East Asian Journal of Management

Research Aims: This research aims to investigate the impact of organizational inertia on digital capabilities and digital transformation to optimize firm competencies.

Design/Methodology/Approach: The dataset was produced through a quantitative survey of 125 firms in Indonesia using the Structural Equation Model (SEM) to analyse the data.

Research Findings: The results of this study indicate that organizational inertia indirectly impacts firm competencies through digital capabilities and digital transformation. Organizational inertia impacts digital capabilities, not digital transformation, whereas digital capabilities impact digital transformation and a firm’s competencies.

Theoretical Contribution/Originality: This study contributes to the literatures on organizational behaviour and strategic management by …


The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta, Eka Yunita, Jono Mintarto Munandar 2023 IPB University

The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta, Eka Yunita, Jono Mintarto Munandar

The South East Asian Journal of Management

Research Aims: This research aims to identify the characteristics of Generation Z e-wallet customers in DKI Jakarta; analyse the effect of push-pull-mooring effects on switching intention, the moderating effect of the mooring effects on the relationship between push effects and pull effects with switching intention, and the effect of switching intention on the switching behaviour of Generation Z e-wallet customers.

Design/Methodology/Approach: There were 262 respondents, using non-probability sampling with the purposive sampling method. The data analysis technique used is descriptive analysis and SEM-PLS.

Research Findings: The results of this study indicate that the push effects do not affect switching intention. …


Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital, Qian Ye, Weijun Zheng 2023 University of Wisconsin Parkside

Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital, Qian Ye, Weijun Zheng

Journal of Business & Entrepreneurship

This study examines the impacts of R&D on new-born startups’ revenue during the 0-3 age period, as well as investigating the moderating role of founding team human capital in the R&D-revenue relationship. The sample is from a longitudinal panel data from the Kauffman Firm Survey (KFS), including a total of 1369 technology-based startups established in year 2004 and a total of 286 founding teams. Consistent with findings of previous research, results of this study suggest that startups who engage in R&D investments and activities in gestation/initial stage of business development have significant higher likelihood of obtaining high revenue in the …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın 2023 Dokuz Eylul University

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


Isscm Newsletter, Spring 2023, Raj Soin College of Business, Wright State University 2023 Wright State University

Isscm Newsletter, Spring 2023, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


Ais Teaching Curation Project: The Introductory Course In Information Systems, James Burleson, Teagen Nabity-Grover, Karim Jetha 2023 California Polytechnic State University

Ais Teaching Curation Project: The Introductory Course In Information Systems, James Burleson, Teagen Nabity-Grover, Karim Jetha

IT and Supply Chain Management Faculty Publications and Presentations

The Association for Information Systems (AIS) Teaching Curation Project aims to highlight and summarize research within the association that focuses on the major courses taught in Information Systems (IS) programs. The present literature review is a companion to a curation website specific to the introductory course in IS. In this review, we identify three major themes that pervade this literature: IS program enrollment, pedagogy, and curriculum. We use these themes to structure our summary of the research on the importance of the introductory course and various approaches to instruction. These themes also provide a framework for positioning future research. For …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn 2023 Southern Methodist University

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Digital Commons powered by bepress