Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Information technology

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 52

Full-Text Articles in Business

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton Oct 2022

An Analysis Of The Microsoft 365 Cloud Migration Process, Its Alternatives, And Results, Curtis Barnes, Robert Houghton

Mountain Plains Journal of Business and Technology

This study follows the decision making process of comparing a traditional business software stack to cloud alternatives, comparing different cloud platforms, and planning a migration. It addresses specific workloads of an example company in the financial services industry and how the tools in a Microsoft 365 subscription support that work. The process of transferring an existing Exchange server and its users to Azure is thoroughly detailed, as is the logic behind certain crucial decisions that are part of that procedure. A calculation of real-world savings is also provided. The resulting paper is usable as both a reference and guide for …


It Usage In Auditing And The Impact Of Covid-19, Olivia Beechem May 2021

It Usage In Auditing And The Impact Of Covid-19, Olivia Beechem

Undergraduate Theses

The COVID-19 pandemic has drastically changed the world as we know it, and the audit field is no exception. The transition for a majority of public accounting firms and their clients to remote work amidst a global pandemic sparked my interest in the already rapidly evolving field of audit IT usage, which continually affects audit quality and efficiency. My research expands on existing studies completed on this topic prior to COVID-19 and includes three main research objectives. First, my research examines the usage and perceived importance of common types of IT audit applications, such as CAATs and data analytics, as …


Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu Oct 2020

Traditional And Information Technology Anti-Corruption Strategies For Curbing The Public Sector Corruption In Developing Economies Of Sub-Saharan Africa: A Systematic Literature Review, Ibrahim Inuwa, Chidi G. Ononiwu

The African Journal of Information Systems

The pervasiveness of public sector corruption has been a major concern by successive governments and their citizenry. In order to curb such corruption, previous studies have focused on the anti-corruption strategies adopted by governments in isolation, but little or no study has focused on the interactions of the anti-corruption strategies. Using the concept-centric approach, we reviewed 91 studies systematically to understand the trends of government anti-corruption strategies. From the synthesized studies, we identified three dominant themes of anti-corruption strategies and their associated concepts. In addition, we also identified one dimension that captures information technology (IT) as a vehicle that enhances …


Idea Co-Creation On Social Media Platforms: Towards A Theory Of Social Ideation, Pratyush Bharati, Kui Du, Abhijit Chaudhury, Narendra M. Agrawal Feb 2020

Idea Co-Creation On Social Media Platforms: Towards A Theory Of Social Ideation, Pratyush Bharati, Kui Du, Abhijit Chaudhury, Narendra M. Agrawal

Information Systems and Analytics Department Faculty Journal Articles

Innovation scholars have long been discussing social media as a rich source of information, knowledge, and new ideas, yet, whether or how social media can directly intervene with organizational ideation processes remains unclear. In this study, we investigate the impact of external and enterprise social media platforms on organizational ideation. Grounded in seventy-nine cases and adapting social capital theory in social media contexts, this study attempts to develop a theory of social ideation. Social ideation consists of social media-enabled mechanisms that generate social capital, enable multi-level social exchanges, foster idea co-creation activities such as idea sourcing, filtering, elaboration, and integration, …


Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates Jan 2020

Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates

Information Systems and Analytics Department Faculty Journal Articles

This study examines how the Twittersphere talked about candidates running for the U.S senate in the 2018 congressional elections. We classify Twitter users as Liberal or Conservative to better understand how the two groups use social media during a major national political election. Using tweet sentiment, we assess how the Twittersphere felt about in-group party versus out-group party candidates. When we further break these findings down based on the candidates’ gender, we find that male senatorial candidates were talked about more positively than female candidates. We also find that Conservatives talked more positively about female Republican candidates than they did …


Interrelationship Between Librarians' Level Of Knowledge Of Information Technologies And Their Attitudes In Applying These Technologies In Libraries, Muhammad Ramzan Dr Nov 2019

Interrelationship Between Librarians' Level Of Knowledge Of Information Technologies And Their Attitudes In Applying These Technologies In Libraries, Muhammad Ramzan Dr

Library Philosophy and Practice (e-journal)

The paper presents librarians’ attitudes toward information technology, their level of knowledge in IT, and their relationship with each other. Secondary data was collected through review of the relevant literature. Primary data was collected through a questionnaire survey of 244 librarians of libraries in Pakistan. The study revealed that awareness of the potential of IT, recency of attaining professional qualifications, and knowledge in IT had a significant relationship with librarians’ attitudes. The study also revealed that librarians’ level of knowledge in technology is a good predictor of their attitude toward application of information technology in libraries. Based on the findings, …


Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer Jan 2019

Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer

Information Systems and Analytics Department Faculty Journal Articles

Blockchain has received increased attention from both the academic and practitioner worlds. Numerous papers have been written on how blockchain works and its potential applications. However, few studies have focused on fraudulent activities on blockchain. The purpose of this study is to understand common issues and scams related to blockchain. A literature review was conducted to identify top security issues on blockchain. In addition, we collected tweets on blockchain fraud discussion from November 6, 2018 to December 31, 2008. The results of tweets analysis show that the most frequently mentioned words in tweets include scams, crypto/cryptocurrency, ICO, Bitcoin, Ethereum,combat/fight, Asia, …


Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui Oct 2018

Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui

Communications of the IIMA

Despite significant increases in the growth of online education, a review of research reveals few studies of faculty perceptions of the use of technology in classrooms in higher education. Research can explore and illuminate how to bridge the gap between faculty perceptions and institutional goals and objectives for online programs. The study at hand presents the views of full-time and adjunct faculty across the colleges, both on- and off-campus, and the online community, at the University of La Verne, a private Tier II doctoral degree-granting institution located in Southern California.


Design Thinking: A Case Study Of Implementation Within The It Software Industry., Jean-Baptiste Liberge Jan 2018

Design Thinking: A Case Study Of Implementation Within The It Software Industry., Jean-Baptiste Liberge

Theses

In the global economy, competition and market pressures push the majority of company managers to drive with more efficiency by improving processes, optimizing performance and reducing costs. Companies are increasing shareholder value by improving cash flow' and cutting costs. How many cost savings can finance departments reproduce and for how long? Is this enough to lead their markets to deliver better services to their customers? Is it enough to build customer loyalty? The 11 industry fails to escape these constraints, operating in an intensely competitive market. To compete in this environment, companies need to face frequent new product launches and …


Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin Feb 2017

Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin

Communications of the IIMA

The KPI-centric Strategic Model regarding the Role of Information Technology developed in this research is based on specific details from the University of La Verne’s participation in the 2014 Educause Center for Analysis and Research (ECAR) Study of Undergraduate Students and Information Technology as a benchmarking participant. It also draws on the experience and directions of other institutions such as California State University, University of California. As one of the participating 213 institutions, the University of La Verne’s undergraduate student responses generally mirror the majority view of students enrolled in all institutions of higher education in the United States surveyed …


Feasibility In Applying Agile Project Management Methodologies To Building Design And Construction Industry, Roy S. Moriel Feb 2017

Feasibility In Applying Agile Project Management Methodologies To Building Design And Construction Industry, Roy S. Moriel

Dissertations and Theses

During the past few decades, fundamental changes have taken place in project development, planning, and execution. This has taken form with embracing new techniques such as various agile project management methodologies to develop products, instead of using the traditional waterfall project management methodology commonly used today. Using agile has been very successful as a large portion of the IT world has integrated it within their companies. Unfortunately, professional fields such as the building design and construction industry have remained mostly with the traditional methods impacting the projects in terms of cost, scheduling, and other project elements that can benefit from …


How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson Jan 2017

How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson

Management Faculty Publications

Despite a generally-acknowledged importance of information technology (IT) in enabling global strategy and a broad understanding of the manner in which IT enhances coordination and reduces cost, few studies have focused precisely on how multinational corporations (MNCs) use IT to facilitate globalization. To address this gap in the literature, we conduct a case study across four large MNCs, and use primary data to develop theoretical propositions on the characteristics of products, processes and customers that impact the ways in which MNCs use IT to manage their global operations.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew Jan 2016

Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew

CCE Theses and Dissertations

As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


Information Technology Impacts On Firm Performance: An Extension Of Kohli And Devaraj (2003), Anand Jeyaraj, Rajiv Sabherwal Dec 2015

Information Technology Impacts On Firm Performance: An Extension Of Kohli And Devaraj (2003), Anand Jeyaraj, Rajiv Sabherwal

ISSCM Faculty Publications

Despite the importance of investing in information technology, research on business value of information technology (BVIT) shows contradictory results, raising questions about the reasons for divergence. Kohli and Devaraj (2003) provided valuable insights into this issue based on a meta-analysis of 66 BVIT studies. This paper extends Kohli and Devaraj by examining the influences on BVIT through a meta-analysis of 303 studies published between 1990 and 2013. We found that BVIT increases when the study does not consider IT investment, does not use profitability measure of value, and employs primary data sources, fewer IT-related antecedents, and larger sample size. Considerations …


It Transformation Decision Processes: A Conceptual Framework For Efficiency/Effectiveness Optimization, Jurgen Reiner, Volker Stix Jan 2015

It Transformation Decision Processes: A Conceptual Framework For Efficiency/Effectiveness Optimization, Jurgen Reiner, Volker Stix

Communications of the IIMA

Decision processes are complex managerial challenges for long-term information technology (IT) initiatives with an organization-wide scope (in short: IT transformations). Costs, benefits, and risks of such IT investments are hard to capture, and the dozens ofprescriptive methods proposed for IT project evaluation have proved to contribute little to solve the dilemma in practice. Thus, as opposed to continue the search for another prescriptive evaluation methodology, this paper follows a new approach: it targets the development of a conceptual framework that allows for the improved management of holistic IT decision processes - as opposed to cook-book approaches that attempt optimizing the …


Strategic Information Technology Alignment: Conceptualization, Measurement, And Performance Implications, Magno Queiroz Jan 2015

Strategic Information Technology Alignment: Conceptualization, Measurement, And Performance Implications, Magno Queiroz

Magno Queiroz

Explaining the effect of information technology (IT) on organizational performance is a primary concern for strategic IT alignment research. The central hypothesis is that performance is a function of the alignment between IT and the organization’s business strategy. Preceding theories explain the performance implications of IT alignment within a single line of business. However, they do not explain the need for IT to be aligned with distinct strategies developed at the corporate and strategic business unit (SBU) levels in a multi-business organization. This thesis begins the task of unpacking the concept of IT alignment to explain the performance implications of …


Salesforce.Com, Sean Bielawski, Charles Kempe, Austin Mcdaniel, Adam Tate, Jeffrey S. Harrison Jan 2015

Salesforce.Com, Sean Bielawski, Charles Kempe, Austin Mcdaniel, Adam Tate, Jeffrey S. Harrison

Robins Case Network

Innovation! One of the most innovative companies, and also one of the best companies to work for, is losing money. This case traces the meteoric rise of the number one customer relationship management service provider against huge rivals such as Microsoft and Oracle. Detail regarding their highly innovative Scrum system is provided, along with detail regarding their marketing approach. How can Salesforce.com regain profitability while continuing to grow in a highly competitive industry?


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …


How The Usage Of It Is Effecting Academic Libraries, Mohammed J. Sarwar Dec 2014

How The Usage Of It Is Effecting Academic Libraries, Mohammed J. Sarwar

Mohammed J Sarwar

The purpose of this treatise is to determine how information technology is affecting the usage of services in the academic library. Various studies suggest that there has been a decline in usage of traditional face-to-face reference services. The majority of the college students prefer to use the Web instead of frequenting the library. Librarians and educators are concerned that these students are developing poor research skills if they only use the internet for research. Many of them are not familiar with the best electronic resources. Librarians may have less reference work but they will need to offer instruction on using …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Strategic Dependence On The It Resource And Outsourcing: A Test Of The Strategic Control Model, Detmar Straub, Peter Weill, Kathy Schwaig May 2014

Strategic Dependence On The It Resource And Outsourcing: A Test Of The Strategic Control Model, Detmar Straub, Peter Weill, Kathy Schwaig

Kathy S Schwaig

Using resource dependency theory (RDT), this research analyzes how organizations control their information technology resources to improve organizational performance. According to RDT, organizations must manage their dependency on external organizations and limit external dependencies when resources are considered critical. The current study proposes and tests a portion of a Strategic Control Model positing that managers seek to control important, strategic resources in order to create value for the firm and to avoid dependency on external entities. Utilizing a research design that captured extensive quantitative data on the control of IT functions and services, the research team gathered 5 years of …


Top-Ten It Issues, 2014: Be The Change You See, Susan Grajek, David Rotman Mar 2014

Top-Ten It Issues, 2014: Be The Change You See, Susan Grajek, David Rotman

Administrative Personnel Publications

No abstract provided.


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty and Research Publications

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …


How Does Alignment Of Business And It Strategies Impact Aspects Of It Effectiveness?, Shankar Babu Chebrolu, Lawrence Ness Jan 2013

How Does Alignment Of Business And It Strategies Impact Aspects Of It Effectiveness?, Shankar Babu Chebrolu, Lawrence Ness

International Journal of Applied Management and Technology

Alignment between information technology (IT) and business stakeholders on their strategies has traditionally been viewed as the means to achieve greater IT delivery capabilities, but there is lack of empirical evidence as to how strategic alignment impacts individual aspects of IT effectiveness (e.g., quality of service [QoS], user satisfaction, and IT helpfulness to users); there is also a lack of empirical evidence surrounding how each individual element of strategic alignment impacts overall IT effectiveness. The intent of this research was to contribute to the body of knowledge that could be applied by researchers, businesses, and IT organizations alike to achieve …