Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Theses/Dissertations

2013

Institution
Keyword
Publication
File Type

Articles 1 - 26 of 26

Full-Text Articles in Business

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang Oct 2013

Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang

Information Systems & Operations Management Dissertations

A remanufacturer struggles with uncertainty of returns and quality of products. With regard to the remanufacturing process, this study focuses on the determination of the following policies: a) Acquisition policy and b) Sorting policy. The purpose of this study is to find the optimality of both acquisition and sorting which, to meet demand with the maximization of profits over time, may need to be changed. More specific research questions are as follows: a) How much product returns should be obtained to meet demand through remanufacturing?, b) What level of sorting discrimination should be used for disassembly to meet demand at …


An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House Oct 2013

An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House

Information Systems & Operations Management Dissertations

Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential or sensitive. Individuals are targeted to take action by clicking on a link or providing information. At present, phishing research is lacking in both theory and actual behavioral data. This research aims to fill that gap by introducing a new model and collecting data from multiple sources (including an …


The Competitive Dynamics Of A Firm's Capacity Position And Inventory Leanness Activities: Evidence From Us Manufacturing Industries, Rajat Mishra Oct 2013

The Competitive Dynamics Of A Firm's Capacity Position And Inventory Leanness Activities: Evidence From Us Manufacturing Industries, Rajat Mishra

Information Systems & Operations Management Dissertations

The notion of `perennial gale of creative destruction' by Schumpeter and Austrian economics has been researched in the field of strategic management to study the competitive dynamics among firms' rivalrous activities. However, its application is sparse in operations management. With the advancement of the field and the increasing pressure on the firms, the strategies regarding operations planning and control are argued to be not just internal according to the conventional norms of operations management, but these strategic moves will be impacted by the moves of their immediate rivals. This competitive imitation is studied in the areas of inventory management and …


The Impact Of Organizational Insiders' Psychological Capital On Information Security, A. J. Burns Iii Oct 2013

The Impact Of Organizational Insiders' Psychological Capital On Information Security, A. J. Burns Iii

Doctoral Dissertations

This dissertation research seeks to examine the role of organizational insiders' psychological capital (PsyCap) on the performance of protection motivated behaviors (PMBs). The dissertation examines the role of PsyCap through three studies which were conducted for this research. Using structural equation modeling (SEM), the responses from four distinct samples were analyzed. The results largely support the significant role of PsyCap in information security. The first study takes an expectancy theory (Vroom, 1964) approach and found that PsyCap was a significant consequence of insiders' security-related expectancy dimensions. Additionally, expectancy theory was found to be an appropriate frame-work for promoting PMBs.

The …


Towards Successful Implementation Of 5ss In A U.S. Manufacturing Company With Indian Sub-Continent Workers, Syed Shahzad Naqvi Sep 2013

Towards Successful Implementation Of 5ss In A U.S. Manufacturing Company With Indian Sub-Continent Workers, Syed Shahzad Naqvi

Master's Theses and Doctoral Dissertations

XYZ is a manufacturing organization located in Michigan, in the Eastern North Central U.S., and it has a diverse workforce consisting of immigrants from Asia, Europe, and South America. The majority of the workers are immigrants from the Indian Sub-Continent. XYZ has been in the process of implementing 5Ss; however, it has been unable to sustain 5S standards. This study was conducted to identify the role of the Indian Sub-Continent workers’ culture and religion on 5S implementation and to suggest how this company can work with this group in successfully implementing the 5Ss.

The researcher is employed in this organization …


Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu Aug 2013

Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


A Study On The Application Of Information System In Patrol Vessel Management, Lei Li Aug 2013

A Study On The Application Of Information System In Patrol Vessel Management, Lei Li

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Pricing And Local-Content Decisions Of A Multinational Firm In A Duopoly Market, Nanqin Liu Aug 2013

Pricing And Local-Content Decisions Of A Multinational Firm In A Duopoly Market, Nanqin Liu

Theses & Dissertations

The internationalization of production requires each multinational firm to determine the local content rate for his product that is made and sold in a foreign country. In this thesis, we investigate the local content rate and pricing decisions for a multinational firm who competes with a local firm in a market without and with a local content requirement (LCR). We develop and solve a two-stage decision problem in which the multinational firm determines his optimal local content rate and the two firms then make their pricing decisions. Our analytical results show that the multinational firm sets a lower local content …


Data Science In Supply Chain Management: Data-Related Influences On Demand Planning, Yao Jin Aug 2013

Data Science In Supply Chain Management: Data-Related Influences On Demand Planning, Yao Jin

Graduate Theses and Dissertations

Data-driven decisions have become an important aspect of supply chain management. Demand planners are tasked with analyzing volumes of data that are being collected at a torrential pace from myriad sources in order to translate them into actionable business intelligence. In particular, demand volatilities and planning are vital for effective and efficient decisions. Yet, the accuracy of these metrics is dependent on the proper specification and parameterization of models and measurements. Thus, demand planners need to step away from a "black box" approach to supply chain data science. Utilizing paired weekly point-of-sale (POS) and order data collected at retail distribution …


Your Media Speak So Loud I Can't Hear A Word You're Saying: Impact Of Media And Media Selection On Performance, Martin Hassell Aug 2013

Your Media Speak So Loud I Can't Hear A Word You're Saying: Impact Of Media And Media Selection On Performance, Martin Hassell

Graduate Theses and Dissertations

With the proliferation of communication media and technologies available, it is important for teams to understand the influence of these media on the performance of their communications. Additionally, it is important for researchers to understand how teams choose and use media. Literature on communication media impacts and communication performance has been somewhat fragmented, and researchers have used different theories and paradigms to study this problem. Researchers still do not have a full understanding of how media influences communication, whether teams recognize and select appropriate media for their communication needs, and what makes some communication more effective, irrespective of the communication …


Predicting Hospital Patients' Admission To Reduce Emergency Department Boarding, Mohammadmahdi Moqri Aug 2013

Predicting Hospital Patients' Admission To Reduce Emergency Department Boarding, Mohammadmahdi Moqri

Graduate Masters Theses

Emergency Department (ED) boarding - the inability to transfer emergency patients to inpatient beds- is a key factor contributing to ED overcrowding. This paper presents a novel approach to improving hospital operational efficiency and, therefore, to decreasing ED boarding. Using the historic data of 15,000 patients, admission results and patient information are correlated in order to identify important admission predictor factors. For example, the type of radiology exams prescribed by the ED physician is identified as among the most important predictors of admission. Based on these factors, a real-time prediction model is developed which is able to correctly predict the …


Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen Jul 2013

Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen

Information Systems & Operations Management Dissertations

Long Term Care facilities are a highly regulated industry due to funding sources being subject to Medicare and Medicaid reimbursement. The demand for nursing homes is increasing significantly with anticipation of the Baby Boomers reaching age 65. Most research studies of the long-term care industry are focused on quality improvement and reduced deficiencies. This study provides a different view of how strategic capabilities (adaptive, absorptive, and innovative) and Baldrige Health Care Criteria affect financial returns, operational efficiency, and quality for long-term care providers. The findings indicate that facilities' capabilities are associated with Baldrige criteria and performance. However, the relationship between …


Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik May 2013

Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik

Dissertations

As science advances, the underlying literature grows rapidly providing valuable knowledge mines for researchers and practitioners. The text content that makes up these knowledge collections is often unstructured and, thus, extracting relevant or novel information could be nontrivial and costly. In addition, human knowledge and expertise are being transformed into structured digital information in the form of vocabulary databases and ontologies. These knowledge bases hold substantial hierarchical and semantic relationships of common domain concepts. Consequently, automating learning tasks could be reinforced with those knowledge bases through constructing human-like representations of knowledge. This allows developing algorithms that simulate the human reasoning …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker Mar 2013

Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker

Theses and Dissertations

Due to the up-rise of social media, social networking sites have increased in popularity and use over the last few years. During this time, research related to social networks has also escalated. This study presents social network research trends found in ISR, JMIS, and MISQ for a six year period, 2005-2010. The social network-related articles from these premier MIS journals were examined in terms of topical theme and research strategy employed. Furthermore, the most productive authors and affiliations were identified and presented individually, by state, and by region. An additional outcome of this research is the presentation of a preliminary …


Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane Feb 2013

Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane

Open Access Dissertations

Identity has long been a prolific research interest for organizational scholars. Its popularity can be attributed to the development of post-bureaucratic organizations, where control is no longer achieved through external forms (i.e. rules and procedures), but rather, "softer" mechanisms, such as organizational culture and values. Examining identity therefore becomes crucial for understanding how employees internalize organizational goals to exhibit desired behaviors. While the predominant approach has been to analyze how organizations help shape, control, and regulate member identity, this project calls into question the assumption of organizational employment to explore the micro-processes of identity construction among a growing class of …


Essays On The Digital Divide - Explorations Through Global, National And Individual Lenses, Maria Skaletsky Jan 2013

Essays On The Digital Divide - Explorations Through Global, National And Individual Lenses, Maria Skaletsky

2013

The Digital Divide has emerged as an important research and policy issue during the past thirty years. The divide exists at different levels, such as global, regional and individual levels. While extensive research already exists on this subject, the complexity of the issue presents opportunities for further research. In particular, there is ample scope for significantly contributing to the literature by leveraging recent analytics techniques, all the more since most of the literature on the Digital Divide relies on descriptive methods or on simple or multiple regression models. Therefore, the motivation for this study is two-fold. First, the Digital Divide …


The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino Jan 2013

The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino

2013

In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough Jan 2013

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In Jan 2013

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong Jan 2013

User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong

2013

User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first study to research the relative contributions of vendor trust and IT artifact trust components to user resistance and, as a result, makes a unique contribution to the information systems literature. An understanding of the degree to which technology adoption behavioral beliefs, and particularly system trust, affect user resistance towards information …


The Impact Of Prior Performance On Leadership Appointment In A Merger Of Equals, David A. Hirsch Jan 2013

The Impact Of Prior Performance On Leadership Appointment In A Merger Of Equals, David A. Hirsch

CMC Senior Theses

Leadership appointment during mergers has a logical and established precedent when there is a clear target and acquirer. However, in the extraordinary case of Merger Of Equals (MOEs) – where this is relative equal ownership, board representation, earnings contribution etc - this process is much less defined and can often have serious consequences on the merger, both in closing negotiations as well as post-merger performance. Intuition assumes the better performing CEO should and will be appointed. In practice, however, that is often not the case. It is arguable that performance can be defined through objective means (financially & operationally), yet …


An Exploratory Study Of The Benefits And Inhibitors Of Digital Libraries In Iraq, Basima Abdulbari Fezaa Jan 2013

An Exploratory Study Of The Benefits And Inhibitors Of Digital Libraries In Iraq, Basima Abdulbari Fezaa

Theses: Doctorates and Masters

This research study explores the potential of digital libraries (DLS) in Iraq and identifies inhibitors to adoption. Iraq is an ancient civilisation, with a recorded history of more than 5000 years. The Mesopotamian civilisation and the Babylonian Civilisation (both in Iraq) are amongst the most ancient in the world, and have existed from the times of the ancient Egyptian, Indus Valley, Persian civilisations. Iraq has a rich cultural history, with many rare historical manuscripts, antiques etc., on which many treatises have written and still continues to be a popular subject of research. In its recent history, Iraq has had much …