Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2019

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 186

Full-Text Articles in Business

Early Detection Of Fake News On Social Media, Yang Liu Dec 2019

Early Detection Of Fake News On Social Media, Yang Liu

Dissertations

The ever-increasing popularity and convenience of social media enable the rapid widespread of fake news, which can cause a series of negative impacts both on individuals and society. Early detection of fake news is essential to minimize its social harm. Existing machine learning approaches are incapable of detecting a fake news story soon after it starts to spread, because they require certain amounts of data to reach decent effectiveness which take time to accumulate. To solve this problem, this research first analyzes and finds that, on social media, the user characteristics of fake news spreaders distribute significantly differently from those …


Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia Dec 2019

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia

Communications of the IIMA

This paper explores issues of accessibility in Web design, including the applicability of various federal statutes such as the Americans with Disabilities Act of 1990 (ADA) and Section 508 of the Rehabilitation Act of 1973. A pilot study of six private sector websites is completed to gauge the effectiveness of current accessibility standards as interpreted from the ADA and Section 508. Evaluating these sites shows that even after 25 years, sites still have accessibility issues.


Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari Dec 2019

Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari

Communications of the IIMA

Retail industry has suffered some of the biggest data breaches in recent times. Organizations are deploying technological tools to limit data breaches. However, purely technological solution is not going to be sufficient because human-factor is often considered to be the weakest link in Information Security. In this paper, the authors investigate the behavioral aspect of information security in a retail setting. Specifically, the factors that influence compliance behaviors to information security policies (ISP) in retail stores are identified. Attitude, awareness, and sanctions are proposed as key variables that influence compliance intentions to ISP. The authors test the proposed model using …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer Dec 2019

A Desire Fulfillment Theory Of Digital Game Enjoyment, Owen M. Schaffer

College of Computing and Digital Media Dissertations

Empirical research on what makes digital games enjoyable is critical for practitioners who want to design for enjoyment, including for Game Design, Gamification, and Serious Games. But existing theories of what leads to digital game enjoyment have been incomplete or lacking in empirical support showing their impact on enjoyment.

Desire Fulfillment Theory is proposed as a new theory of what leads to digital game enjoyment and tested through research with people who have recently played a digital game. This theory builds on three established theories: Expectancy Disconfirmation Theory, Theory of Basic Human Desires, and Flow Theory. These three theories are …


Feasibility Of Collaborative Alliance Association For Non-Competitive Small Business Contractors, Brody Allen Gill Dec 2019

Feasibility Of Collaborative Alliance Association For Non-Competitive Small Business Contractors, Brody Allen Gill

Construction Management

Small business construction contracting firms around the country struggle with growing their business successfully. This is a result of unknown results from new business practices and few resources to initiate programs that can improve productivity and efficiency. A simple solution could give small business construction contractors the opportunity to share ideas, compare company analytics and promote professional networking in a non-competitive, collaborative alliance. The goal of this project is to determine if a collaborative alliance association using data benchmarking would be an effective solution for non-competitive small business contractors to grow their businesses. Thereafter being proven effective, is such an …


Contextual Influences On Human Resources Development: Considerations And Evaluations On The Various External And Internal Factors That Shape And Influence Hrd In Organisations, Charles Alves De Castro Dec 2019

Contextual Influences On Human Resources Development: Considerations And Evaluations On The Various External And Internal Factors That Shape And Influence Hrd In Organisations, Charles Alves De Castro

Articles

This article aims to briefly understand and evaluate the main external and internal factors that impact directly on human resources development area within the organisations, mainly related to multinational companies. Also, it discusses the various aspects and influences on HRD-(Human Resources Development) such as societal, organisational/local, global, that impacts on costs, environment, regulations, policies, culture, beliefs, technology and values. This research was carried out by way of a literature review. This is important to demonstrate, explain and evaluate the current existent literature about this specific theme covered in this article. Furthermore, through this review we compared previous research on HRD. …


Technology Acceptance Models And Theories In Library And Information Science Research, Muhamad Prabu Wibowo Nov 2019

Technology Acceptance Models And Theories In Library And Information Science Research, Muhamad Prabu Wibowo

Library Philosophy and Practice (e-journal)

There is a growing interest of studying technology implementation, acceptance, and adoption as there are a lot of new innovations regarding potential technologies that can be implemented in information institutions. This study tries to explore the application of theories and models of acceptance models in library and information science research. This study employs a systematic literature review to discuss the historical development of theories and models of technological acceptance and their potential use in the library and information science research. Models and theories of acceptance models have been continuously developed to accommodate reasons explaining users would accept and adopt new …


Design Of A Virtual Reality Scenario And Scent Generator For Sensory Training, Yosselin Castro Islas Nov 2019

Design Of A Virtual Reality Scenario And Scent Generator For Sensory Training, Yosselin Castro Islas

Morehead State Theses and Dissertations

A thesis presented to the faculty of the Elmer R. Smith College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Yosselin Castro Islas on November 15, 2019.


Using Machine Learning To Predict Sales Conditional On Bid Acceptance, Barry E. King, Jason Davidson Nov 2019

Using Machine Learning To Predict Sales Conditional On Bid Acceptance, Barry E. King, Jason Davidson

Scholarship and Professional Work - Business

A North American provider of vehicle parking solutions seeks to predict if a bid will be successful and, for those that are successful, what will be the cumulative sales revenue. Both traditional statistical methods and machine learning algorithms were employed. The machine learning techniques performed better than the statistical methods. There is no statistically significant difference between random forest and extreme gradient boosting for either the binary classification task or the regression task.


Corporate Innovation: Digitising Innovation Management, Suraya Sulaiman, Azim Pawanchik Nov 2019

Corporate Innovation: Digitising Innovation Management, Suraya Sulaiman, Azim Pawanchik

Asian Management Insights

Digitisation of innovation management allows organisations to spend less time managing innovation and more time on things that really matter.


Interrelationship Between Librarians' Level Of Knowledge Of Information Technologies And Their Attitudes In Applying These Technologies In Libraries, Muhammad Ramzan Dr Nov 2019

Interrelationship Between Librarians' Level Of Knowledge Of Information Technologies And Their Attitudes In Applying These Technologies In Libraries, Muhammad Ramzan Dr

Library Philosophy and Practice (e-journal)

The paper presents librarians’ attitudes toward information technology, their level of knowledge in IT, and their relationship with each other. Secondary data was collected through review of the relevant literature. Primary data was collected through a questionnaire survey of 244 librarians of libraries in Pakistan. The study revealed that awareness of the potential of IT, recency of attaining professional qualifications, and knowledge in IT had a significant relationship with librarians’ attitudes. The study also revealed that librarians’ level of knowledge in technology is a good predictor of their attitude toward application of information technology in libraries. Based on the findings, …


Employee Rhetorical Sensitivity As A Mediator In The Relationship Between Customer Orientation And Customer Retention, Suraya Akmar Mokhtaruddin, Che Aniza Che Wel, Nor Rahimy Khalid Oct 2019

Employee Rhetorical Sensitivity As A Mediator In The Relationship Between Customer Orientation And Customer Retention, Suraya Akmar Mokhtaruddin, Che Aniza Che Wel, Nor Rahimy Khalid

The South East Asian Journal of Management

Research Aims: The current study proposes to fill in the gap in customer orientation literature by focusing on the relationship between customer orientation, employee rhetorical sensitivity and customer retention from the customer perspective. Design/methodology/approach: The questionnaires were distributed at the KLIA and KLIA2 among experienced customer of travel agency, where the respondents were selected using convenience sampling. Research Findings: The finding indicates that customer orientation and employee rhetorical sensitivity has positively influence customer retention. Additionally, employee rhetorical sensitivity partially mediates the relationship between customer orientation and customer retention. Theoretical Contribution/Originality: Academically, this study contributes to the literature of customer orientation …


Work Life Balance And Level Of Satisfaction Among Women Teachers Assigned In The Northernmost Part Of The Province Of Surigao Del Sur, Philippines, Jillard O. Mercado Oct 2019

Work Life Balance And Level Of Satisfaction Among Women Teachers Assigned In The Northernmost Part Of The Province Of Surigao Del Sur, Philippines, Jillard O. Mercado

The South East Asian Journal of Management

Research Aims - This research intends to study the extent of work-life balance and the level of satisfaction among women teachers assigned in the northernmost part of the province of Surigao del Sur and to determine if there is a significant relationship between them. Design/methodology/approach - This study used the descriptive normative and correlation method. The adopted questionnaire was modified and used. A total of 226 women teachers were chosen as respondent but only 210 participated. The data gathered from the questionnaire were tallied, tabulated, analyzed and presented in tables. Research Findings - The result shows that majority of the …


How Technology Affects Behavioral Intention (Case Study Of Online Transportation In Indonesia And Thailand), Jono M. Munandar, Ribka Cynthia F. Munthe Oct 2019

How Technology Affects Behavioral Intention (Case Study Of Online Transportation In Indonesia And Thailand), Jono M. Munandar, Ribka Cynthia F. Munthe

The South East Asian Journal of Management

Research Aims: Using two countries as the object, this study aims to analyze the influence of technology readiness towards favorableness on online transportation consumers in Indonesia and Thailand. Design/methodology/approach: Empirical evidence for the research was derived from a survey that collected data from 500 students in Indonesia and Thailand, analyzed using Logit Biner method with the help of software SPSS. Research Findings: The result of this study shows that there were two hypotheses accepted, H1 (optimism influences favorableness) and H3 (insecurity has an effect on favorableness), while other hypotheses (H2 and H4) are not significant. Theoretical Contribution/Originality: This study analyzes …


Trust In Supervisor As A Mediator Of The Relationship Between Perceived Interactional Fairness In Reward Systems And Organizational Commitment, Fatmawati Abdin, Azman Ismail, Azmawaty Mohamad Nor Oct 2019

Trust In Supervisor As A Mediator Of The Relationship Between Perceived Interactional Fairness In Reward Systems And Organizational Commitment, Fatmawati Abdin, Azman Ismail, Azmawaty Mohamad Nor

The South East Asian Journal of Management

Research Aims - This study was undertaken to extend existing literature by examining the mediating effect of trust in supervisors in the relationship between perceived interactional fairness in reward systems and organizational commitment. Design/methodology/approach - The SmartPLS method was applied to analyze the survey questionnaire data collected from employees at a national audit department in Malaysia. Research Findings - The results reveal that the effect of perceived interactional fairness in reward systems on organizational commitment is mediated by trust in supervisors. Theoretical Contribution/Originality - This study has proved the effectiveness of perceived interactional fairness as an essential mediating variable in …


The Role Of Capital On Islamic Bank Spin-Offs In Indonesia, Muhammad Budi Prasetyo, Rizky Luxianto, Rahmat Aryo Baskoro, Wardatul Adawiyah, Niken Iwani S. Putri Oct 2019

The Role Of Capital On Islamic Bank Spin-Offs In Indonesia, Muhammad Budi Prasetyo, Rizky Luxianto, Rahmat Aryo Baskoro, Wardatul Adawiyah, Niken Iwani S. Putri

The South East Asian Journal of Management

Research Aims: Some Islamic banks have experienced decreasing performance after spinning off from the parent company, and it is presumed that the amount of capital may have contributed to the decline. Hence, this paper aims to find a minimum amount of capital that Islamic banks must own after spin-offs in order to be able to compete in the market and to achieve excellent performance. Design/Methodology/Approach: We employ the OLS method for small banks (assets below Rp 5 trillion) with variable Capital as the dependent variable and Bank Performance (ROA, ROE, BOPO, and NPL) as the independent variable. We conduct several …


Perceived Severity Of Halal Violation: Csr And Consumer Boycott, Nor Asiah Omar, Muhamad Azrin Nazri, Zuraidah Zainol, Mohd Helmi Ali, Syed Shah Alam Oct 2019

Perceived Severity Of Halal Violation: Csr And Consumer Boycott, Nor Asiah Omar, Muhamad Azrin Nazri, Zuraidah Zainol, Mohd Helmi Ali, Syed Shah Alam

The South East Asian Journal of Management

Research Aims: The halal industry has become one of the fastest growing business in the global market. Halal certification provides assurance to all Muslim consumers because it fulfills the Shariah law and follows the concept of halalan-toyyiban. The purpose of this research is to examine the effect of severity of halal violation and CSR on boycott towards the company that involved in halal violation incidents. Design/methodology/approach: In total of 400 questionnaires were distributed amongst customers who were aware and/or had experienced the violation of a halal product. Data were analyzed using structural equation modelling techniques, were partial least squares (PLS) …


The Effect Of Enterprise Risk Management Practice On Sme Performance, Sajiah Yakob, Hafizuddin -Syah B.A.M., Rubayah Yakob, Nur Aufa Muhammad Raziff Oct 2019

The Effect Of Enterprise Risk Management Practice On Sme Performance, Sajiah Yakob, Hafizuddin -Syah B.A.M., Rubayah Yakob, Nur Aufa Muhammad Raziff

The South East Asian Journal of Management

Research Aims - This study aims to identify the effect of Enterprise Risk Management (ERM) on Small and Medium Enterprise (SME) performance. Design/methodology/approach - This study employed a multiple regression analysis. SME performance was treated as dependent variable, whereas ERM was the independent variable. Research Findings - Multiple regression analysis indicated that ERM has a significant effect to- wards firm performance. However, only one of the ERM elements namely objective determination has a significant effectt on SME performance. Theoretical Contribution/Originality - This study contributes to the body of knowledge from the standpoint of ERM by testing the effect of each …


Design And Implementation Of Electronic Gemba Boards, Lindsey R. Childs Oct 2019

Design And Implementation Of Electronic Gemba Boards, Lindsey R. Childs

Morehead State Theses and Dissertations

A thesis presented to the faculty of the Elmer R. Smith College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Lindsay R. Childs on October 28, 2019.


Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek Oct 2019

Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

[Invited adaptation from presentation proposal, "A Matter of Time: Exploring Survival Analysis Through Cybersecurity] Given that employees pose a large threat to organizational cybersecurity, much research attention has been directed to identifying individual risk factors for cybersecurity noncompliance and misbehavior at the cost of examining broad organizational risk factors. However, no study to date has formally examined how the risk of organizational cybersecurity incident changes over time, or how organizational characteristics affect this risk. The proposed study aims to conduct a survival analysis (SA) of cybersecurity events across the past decade, examining broad factors that impact the changing probability of …


A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek Oct 2019

A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

Despite the impact of employee behavior on organizational security, the topic of cybersecurity historically remains the responsibility of Information Security Management researchers and Information Technology professionals. However, the exponential increase in the prevalence and repercussions of cyber-related incidents invites collaboration between the fields of I-O Psychology and cybersecurity. The proposed presentation discusses the potential for I-O Psychology to contribute to cybersecurity efforts while demonstrating the fundamentals and applicability of survival analysis.


International Conference On Mechatronics, System Engineering And Robotics & Information System And Engineering, University For Business And Technology - Ubt Oct 2019

International Conference On Mechatronics, System Engineering And Robotics & Information System And Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 8th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


Making Good Decisions: An Attribution Model Of Decision Quality In Decision Tasks, Bethany Niese Oct 2019

Making Good Decisions: An Attribution Model Of Decision Quality In Decision Tasks, Bethany Niese

PhD in Business Administration Dissertations

Decision-makers endeavor to obtain the decision quality which puts them in a position to reach their goals. In order to control or influence decision quality, the processes by which individuals form their beliefs must be understood. In addition, many decision makers rely on decision support technologies to help find patterns in data and make sense of the input, so these technologies must be considered in parallel with the processes.

There have been numerous studies conducted to illuminate the factors which affect decision quality, however, many of these studies focused on objective measures and factors. This approach ignores individual perception, belief, …


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …