Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Education

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 32

Full-Text Articles in Business

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian Oct 2023

Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian

Communications of the IIMA

Advancement in technology has brought in widespread adoption and utilization of data mining tools. Successful implementation of data mining requires a careful assessment of the various data mining tools. Although several works have compared data mining tools based on usability, opensource, integrated data mining tools for statistical analysis, big/small scale, and data visualization, none of them has suggested the tools for various industry-sectors. This paper attempts to provide a comparative study of various data mining tools based on popularity and usage among various industry-sectors such as business, education, and healthcare. The factors used in the comparison are performance and scalability, …


The Purpose Of Education: Dewey And Maritain Re-Visited, Tony Shannon Aug 2023

The Purpose Of Education: Dewey And Maritain Re-Visited, Tony Shannon

International Journal for Business Education

This paper touches on the views of John Dewey and Jacques Maritain on the purpose of the process of formal education, particularly its social dimension in relation to the environment, which for Dewey means “those conditions that promote or hinder, stimulate or inhibit, the characteristic activities of a living being”. Dewey is concerned with communication and the conditions of growth of the child from every point of view. He was very opposed to those who see education as preparation for something else: he focused on what he saw as the existential needs of the student. Some of Dewey’s views are …


Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly Jul 2022

Security Simulations In Undergraduate Education: A Review, Joseph Simpson, Aaron Brantly

Journal of Cybersecurity Education, Research and Practice

Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related to security, no previous reviews have explored computer-based simulations covering all facets of security. Given the increasing importance and adoption of interdisciplinary educational programs, it is important to take stock of simulations as a tool to broaden the range of problems, perspectives, and solutions presented to students. …


Effects Of Internet Exclusion On The City Of Detroit, Alexander G. Haddad May 2022

Effects Of Internet Exclusion On The City Of Detroit, Alexander G. Haddad

Honors College Theses

Introduction

The rise of Information Technology (IT) in the past 50 years has revolutionized many areas of human life and activity. Information Technology’s most obvious areas of impact are often those where they add a great and obvious value to a particular industry, and it is extremely difficult to find some aspect of life that has not changed since its inception. Some examples include the digitization of stock trading, the automation of factories and life-saving operations, and the enhanced communication and collaboration across public education, enterprise activity, and international affairs. However, what is often overlooked and understudied are the secondary …


Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne Jul 2021

Impacts Of The Covid-19 Pandemic On Business Education: Case For The Aacsb’S Agility Standard, Lucy Ojode, Mulugeta Wolde, June Claiborne

Southwestern Business Administration Journal

We explored an undergraduate business program’s navigation of an unplanned change, response to the Covid-19 pandemic-occasioned move to online learning, and the resilience of its curriculum by following cohorts of students through two consecutive courses from the end of 2019 through 2020 up to summer 2021. The exploration was aimed at the assessment of the impact of the pandemic-induced disruptions, i.e., how the school’s curriculum fared through the pandemic. Premised on the school’s accreditor, AACSB’s agility-cultivating curriculum guideline, the curriculum should adapt and stabilize post-pandemic. To identify the appropriate cohort for observation, we scrutinized the four progressive levels of agility …


The Practical Applications Of Video Games Beyond Entertainment, Jack Martin Dec 2020

The Practical Applications Of Video Games Beyond Entertainment, Jack Martin

School of Professional Studies

Much of the attention directed toward video games is focused on their role as entertainment. However, researchers have found that video games can have other, more practical uses for society. This thesis is designed to examine three specific examples of the practical applications of video games: video games in education, video games as accessible technology, and the social uses of video games. This project is based on pre-existing research conducted by professionals studying the aforementioned subtopics. Anecdotal stories from educators, people with disabilities, and developers are also discussed. The thesis explores specific examples of video games being used practically, and …


Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu Jan 2018

Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu

Management Faculty Publications

How do multinational corporations (MNCs) and domestic firms compensate technical and managerial skills of knowledge workers within and across geographies? This paper answers this question by examining how developed economy MNCs and emerging economy firms value MBA education and firm-specific IT experience of IT professionals in India; and how developed economy MNCs value MBA education and firm-specific IT experience differently across India and the U.S. Our analyses of archival data on more than 20,000 IT professionals reveal two important findings. First, for IT professionals in India, the marginal effect of firm-specific IT experience on compensation is greater for developed economy …


Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D Dec 2017

Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D

Department of Educational Administration: Faculty Publications

Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


The Use Of It In Teaching Accounting In Egypt The Case Of Beckerconviser, Khaled Dahawy, Eskandar Tooma, Sherif Kamel Jan 2015

The Use Of It In Teaching Accounting In Egypt The Case Of Beckerconviser, Khaled Dahawy, Eskandar Tooma, Sherif Kamel

Communications of the IIMA

The use of information and communication technology with its different tools and techniques is penetrating different aspects of life with various implications. The use of the Internet and the World Wide Web as well as the emerging of different communication channels have brought the world closer and contributed to the concepts of globalization and the extended enterprise. The educational sector at large has been one of the beneficiaries of the use of different information and communication technology tools and techniques. This paper focuses on a research that has been conducted in Egypt to study the use of emerging information and …


The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley Jan 2014

The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley

Computer Information Systems Faculty Publications

The field of information systems (IS) faces a credibility crisis, which threatens its stature as a highly-respected academic discipline (Firth, King, Koch, Looney, Pavlou, and Trauth, 2011; Winter and Butler, 2011; among others). This article summarizes a panel discussion at the ICIS 2011 Conference, where a group of distinguished IS professors offered their unique perspectives on the challenges, origins, and solutions related to the global credibility crisis in IS. Using stakeholder theory as an organizing framework, the panel session identifies the key stakeholders influencing the credibility of the IS discipline, as well as the challenges and opportunities facing IS programs …


Extending And Accelerating Global Business-Education Partnerships, Dylan Kissane, John Farrell Jan 2014

Extending And Accelerating Global Business-Education Partnerships, Dylan Kissane, John Farrell

Dylan Kissane

Senior management in contemporary graduate business education must respond are the trends that are leaving a marked impact on the traditional business models of business schools. Key stakeholders in the business education ecosystem, including the students, the corporate employers and the business schools themselves, demand more of graduate education in order that their respective careers flourish, future employees have the requisite skills and experience, and business education institutions survive. Yet as in any system, survival is but a minimum requirement; successful programs seek not only to survive but to thrive, embracing the change that these three trends place on graduate …


Cloud-Based Email Adoption At Higher Education Institutions In South Africa, Melanie Willett, Rossouw Von Solms Jan 2014

Cloud-Based Email Adoption At Higher Education Institutions In South Africa, Melanie Willett, Rossouw Von Solms

Journal of International Technology and Information Management

Cloud computing, in general, is having an impact on organizations today. Cloud-based email, in particular, is being adopted by educational institutions around the world on a large scale. This paper reports on the state of cloud-based email adoption at higher education institutions in South Africa; it does this by describing the findings of a survey of IT managers at sixteen of these institutions. It will show that South Africa follows the global trend of a large uptake of cloud- based email for higher education institutions. The fact that although organizations are satisfied with the service they receive from cloud-based email …


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez Dec 2011

Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez

Maurice Dawson

Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive technology today. The survival of an architectural student depends on being able to communicate multiple drawings, graphics, images, diagrams and more in the most productive method. Each phase in design requires a clear and concise conversation between the designer and the observer. Schematic Designs generate some of the most creative ideas during a projects progression. With this understood, this section of …


Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed Dec 2011

Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed

Maurice Dawson

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …


The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley Jan 2011

The Credibility Crisis In Is: A Global Stakeholder Perspective, Clayton Arlen Looney, David Firth, Hope Koch, Dubravka Cecez-Kecmanovic, J.J. Po-An Hsieh, Christina Soh, Joseph S. Valacich, Edgar Whitley

Computer Information Systems Faculty Publications

The purpose of this panel involves helping the IS community devise strategies for augmenting the field’s credibility. Representing different continents, educational systems, and roles, our panelists will provide a global perspective on IS credibility. Using stakeholder theory as an organizing framework, this panel will identify the key stakeholders that positively and negatively influence the IS discipline as well as strategies for leveraging these stakeholders. Spirited debates will occur concerning the role of regulators, funding sources, faculty, administrators, students, and employers in shaping the credibility of the IS discipline.


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


A Framework For Leadership Development, George Hrivnak, Rebecca Reichard, Ronald Riggio Aug 2010

A Framework For Leadership Development, George Hrivnak, Rebecca Reichard, Ronald Riggio

George Hrivnak

Despite the tremendous amount of time, money, and energy spent by practitioners and scholars alike to understand, promote, and facilitate effective leadership development, the field is still far from fully understanding what is often regarded as both art and science. That is not to suggest, however, that the field's efforts have failed to result in substantial progress. Indeed, after defining some salient concepts and the overall scope of this chapter, we review some of the major theoretical and empirical advances in leadership development. Furthermore, the trends and 'best practices' dominant in today's organizations in leadership development are then summarized and …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


A Practical Information Technology Program, Bijan Mashaw Jan 2009

A Practical Information Technology Program, Bijan Mashaw

Journal of International Technology and Information Management

This paper discusses the challenges facing business in the 21 st century and the dramatic changes in the use of computers and application development process. These challenges, as well as the increase of global economy, coupled with the demand for the business technology workers indicate the need for redesigning the Information System Curriculum. The proposed framework for an Information Technology (IT) Program in this paper offers a pragmatic curriculum model to accommodate the needs and challenges of the 21st century. The framework provides a fundamental IT education for the graduates of such a curriculum, as well as allowing an area …


State And Context-Dependent Information Management And Wealth Accumulation: An Information Analysis Of The Billionaires Between Taiwan And China, Ben-Chieh Liu, Lee-Hsuan Lin Jan 2008

State And Context-Dependent Information Management And Wealth Accumulation: An Information Analysis Of The Billionaires Between Taiwan And China, Ben-Chieh Liu, Lee-Hsuan Lin

Journal of International Technology and Information Management

From the Forbes Magazine survey of the world’s 538 richest, seventy seven (77) or about 14.4% were identified as born in Asia (Asia Week, June 28, 2001). In addition, the top 100 billionaires (in $NT) in Taiwan, 2001 and 2002 were surveyed by Taiwan Smart Monthly magazine ( Nov 11, 2002) and another top 100 billionaires in China (in U.S dollars) were reported by the Forbes magazine in 2004. This paper utilizes Liu ,Lin, Lee and Chou’s (1996) state and context dependent information management model specification (Joseph & John, 2006), and equity account dependent variables to study the underlying intercultural …


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …