Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,261 Full-Text Articles 5,555 Authors 3,133,614 Downloads 160 Institutions

All Articles in Management Information Systems

Faceted Search

4,261 full-text articles. Page 1 of 146.

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan 2023 Kennesaw State University

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan

Master of Science in Computer Science Theses

This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …


The Effect Of Technostress On The Motivation To Teach Online In Higher Education Before And During The Covid-19 Pandemic: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper 2023 Northern Michigan University

The Effect Of Technostress On The Motivation To Teach Online In Higher Education Before And During The Covid-19 Pandemic: Perceptions Of Business Faculty, Stacy Boyer-Davis, Kevin Berry, Amy Cooper

International Journal for Business Education

This study investigated the relationships among technostress creators (techno-complexity, techno-insecurity, techno-invasion, techno-overload, and techno-uncertainty) on the motivation to teach online using the Motivation to Teach Online – Faculty Version scale. Data were collected from faculty members of the Management and Organizational Behavior Teaching Society (MOBTS), a member of the AACSB Business Education Alliance, and the American Society of Business and Behavioral Sciences (ASBBS), an interdisciplinary professional organization comprised of faculty teaching in accounting, finance, management, marketing, organizational behavior, and computer information systems early 2020 (N = 307). The findings indicated that techno-stressed faculty are less motivated to teach online. Techno-insecurity …


Compete To Learn: Toward Cybersecurity As A Sport, TJ OConnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk 2023 Florida Tech

Compete To Learn: Toward Cybersecurity As A Sport, Tj Oconnor, Dane Brown, Jasmine Jackson, Bryson Payne, Suzanna Schmeelk

Journal of Cybersecurity Education, Research and Practice

To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to integrate e-sports and gamified cybersecurity approaches into the inaugural US Cyber Games Team. During this tenure, we learned many lessons about recruiting, assessing, and training cybersecurity teams. We share our approach, materials, and lessons learned to serve as a model for fielding amateur cybersecurity teams for future competition.


How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang 2023 Pittsburg State University

How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang

Journal of Cybersecurity Education, Research and Practice

Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak 2023 Robert Morris University

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu 2023 Marymount University

Sociocultural Barriers For Female Participation In Stem: A Case Of Saudi Women In Cybersecurity, Alanoud Aljuaid, Xiang Michelle Liu

Journal of Cybersecurity Education, Research and Practice

The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly covered the Western world leaving more knowledge gaps in the context of Middle Eastern countries such as Saudi Arabia. Thus, to fill the existing knowledge gaps, the current study focused on women in Saudi Arabia. The aim of the study was to investigate the factors behind the underrepresentation of …


The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki 2023 Portland State University

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki

University Honors Theses

Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.


How Are Senior Citizens Capable To Cope With The World Of Digital Natives?, Hely Westerholm, Pirjo Takanen-Körperich 2023 DACUM Finland, Helsinki, Finland

How Are Senior Citizens Capable To Cope With The World Of Digital Natives?, Hely Westerholm, Pirjo Takanen-Körperich

International Journal for Business Education

This study discusses the continuously growing threat to the senior citizens*), later called seniors, who can be isolated from the society if their digital competences and experiences are too poor in today’s digital world. It has been noted that to cope with one’s pursuits seniors need to actively construct and maintain their capabilities in ways that are flexible in the world of the digital devices, in response to the changing vicissitudes of life. Thus, the claim above illuminates the issue that the ability to learn from experiences is highly valued in the digital world.

The seniors are obliged to closely …


A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle 2023 IT-Doctoral Program, Information Systems Specialty, Addis Ababa University

A Methodology For Context—Specific Information Systems Design Theorizing, Muluneh Atinaf, Salehu Anteneh, Mesfin Kifle

The African Journal of Information Systems

Prescriptive knowledge constitutes one of the important contributions of information systems design theorizing in information systems (IS) research. Existing methods for IS design theorizing apply kernel/reference theories as sources of justificatory knowledge that serve to justify and validate the knowledge produced. This has gaps in guiding how specific contexts of stakeholders and their practices can be entertained in the design process. This research attempts to address the above void, taking a socio-technically complex agricultural extension information service and the contexts that define it into account. The research builds on an existing IS design theory framework and shows how it can …


Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials, Keiasha Hypolite 2023 The University of Southern Mississippi

Affective Commitment, Mentoring, And Anticipated Turnover Among Millennials, Keiasha Hypolite

Dissertations

ABSTRACT

Millennials comprise the largest group of individuals in the workforce, yet organizations struggle to keep millennials engaged in the workplace. Millennials move from job to job, with an average stay at one employer between 12 and 18 months (Hechl, 2017). Researchers have reported that millennials cause the majority of turnover in the workplace. Globally, human resources practitioners experience difficulties retaining millennials (Sahraee et al., 2021). Previous studies have researched millennials, affective commitment, mentoring, and turnover. However, no known research has used all four factors to solve a global problem. In their discussion of the highly competitive labor market, Ramírez …


Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich 2023 Utah State University

Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich

The Journal of Extension

Technology is a strategic asset in accomplishing the land grant mission. Selecting appropriate technology for Extension program management and delivery is essential to achieving planned outcomes, but can be challenging. This article describes the technology platforms selected by a new, legislatively funded Extension program delivering an online course in a hybrid distance-learning experience. The descriptions and application of these technology platforms will assist Extension professionals in choosing technology suitable for delivery and management of their programs as they plan for impact.


Combining Frameworks To Improve Military Health System Quality And Cybersecurity, Dr. Maureen L. Schafer, Dr. Joseph H. Schafer 2023 Georgetown University

Combining Frameworks To Improve Military Health System Quality And Cybersecurity, Dr. Maureen L. Schafer, Dr. Joseph H. Schafer

Military Cyber Affairs

Existing conceptual frameworks and commercially available technology could be considered to rapidly operationalize the use of Quality Measures (QM) within military health systems (Costantino et al. 2020). Purchased healthcare as well as digital healthcare services have paved the way for data collection from multiple information systems thus offering stakeholders actionable intelligence to both guide and measure healthcare outcomes. However, the collection of data secondary to Smart Devices, disparate information systems, cloud services, and the Internet of Medical Things (IOMT) is a complication for security experts that also affect clients, stakeholders, organizations, and businesses delivering patient care. We have combined three …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob 2023 Liberty University

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon 2023 California State University, San Bernardino

A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon

Electronic Theses, Projects, and Dissertations

This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …


Discovering Data-Driven Solutions: A Practical Guide For Small Businesses Implementing Data Analytics, Katherine Richoux 2023 University of Arkansas, Fayetteville

Discovering Data-Driven Solutions: A Practical Guide For Small Businesses Implementing Data Analytics, Katherine Richoux

Information Systems Undergraduate Honors Theses

In today’s highly competitive business environment, small businesses are under growing pressure to fight for market share. To do this, a competitive advantage must be established to outperform other business competitors both big and small. One way that small businesses can create a competitive advantage is by utilizing their data and applying basic data analytics. Data analytics is the process of collecting and analyzing large sets of raw data using statistical tests to identify patterns and insights to make conclusions that inform business decisions. The use of data analytics is not exclusive to large corporations and can be greatly beneficial …


Tesla Energy Division Strategic Audit, Kaleb Strawhecker 2023 University of Nebraska-Lincoln

Tesla Energy Division Strategic Audit, Kaleb Strawhecker

Honors Theses, University of Nebraska-Lincoln

Tesla’s electric vehicle manufacturing operation is the major revenue source for the company. Tesla has established itself as a significant player amongst other automotive manufacturers, specifically in the electric vehicle sector. Many trends are favoring Tesla’s expansion. This audit takes a look at trends and changes through a PESTEL analysis along with Porter’s Five Forces. Both provide an in-depth look into what the environment around Tesla is like. Then, these are used to evaluate Tesla’s major strategies, competitive advantages, and resources it has at its disposal. Finally, the audit will address how the factors allow Tesla to take advantage of …


Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies, Adhi Ari Utomo, Mira Maulida, Soebowo Musa 2023 Swiss German University

Organizational Inertia, Digital Capabilities, Digital Transformation, And Firm Competencies, Adhi Ari Utomo, Mira Maulida, Soebowo Musa

The South East Asian Journal of Management

Research Aims: This research aims to investigate the impact of organizational inertia on digital capabilities and digital transformation to optimize firm competencies.

Design/Methodology/Approach: The dataset was produced through a quantitative survey of 125 firms in Indonesia using the Structural Equation Model (SEM) to analyse the data.

Research Findings: The results of this study indicate that organizational inertia indirectly impacts firm competencies through digital capabilities and digital transformation. Organizational inertia impacts digital capabilities, not digital transformation, whereas digital capabilities impact digital transformation and a firm’s competencies.

Theoretical Contribution/Originality: This study contributes to the literatures on organizational behaviour and strategic management by …


The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta, Eka Yunita, Jono Mintarto Munandar 2023 IPB University

The Influence Of Push-Pull-Mooring Effects On E-Wallet Customer Switching In Generation Z In Dki Jakarta, Eka Yunita, Jono Mintarto Munandar

The South East Asian Journal of Management

Research Aims: This research aims to identify the characteristics of Generation Z e-wallet customers in DKI Jakarta; analyse the effect of push-pull-mooring effects on switching intention, the moderating effect of the mooring effects on the relationship between push effects and pull effects with switching intention, and the effect of switching intention on the switching behaviour of Generation Z e-wallet customers.

Design/Methodology/Approach: There were 262 respondents, using non-probability sampling with the purposive sampling method. The data analysis technique used is descriptive analysis and SEM-PLS.

Research Findings: The results of this study indicate that the push effects do not affect switching intention. …


Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital, Qian Ye, Weijun Zheng 2023 University of Wisconsin Parkside

Performance Of Technological Startups: The Interaction Of R&D And Founding Team Human Capital, Qian Ye, Weijun Zheng

Journal of Business & Entrepreneurship

This study examines the impacts of R&D on new-born startups’ revenue during the 0-3 age period, as well as investigating the moderating role of founding team human capital in the R&D-revenue relationship. The sample is from a longitudinal panel data from the Kauffman Firm Survey (KFS), including a total of 1369 technology-based startups established in year 2004 and a total of 286 founding teams. Consistent with findings of previous research, results of this study suggest that startups who engage in R&D investments and activities in gestation/initial stage of business development have significant higher likelihood of obtaining high revenue in the …


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın 2023 Dokuz Eylul University

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


Digital Commons powered by bepress