Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou Dec 2017

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou

Marriott Student Review

Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.


Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson Dec 2017

Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson

Marriott Student Review

Unexpected Connections is the Fall 2017 Issue of Marriott Student Review.


Newsletter Fall 2017, College Of Business And Information Systems Oct 2017

Newsletter Fall 2017, College Of Business And Information Systems

BIS Newsletter

No abstract provided.


Newsletter Summer 2017, College Of Business And Information Systems Jul 2017

Newsletter Summer 2017, College Of Business And Information Systems

BIS Newsletter

No abstract provided.


A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek Feb 2017

A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek

Communications of the IIMA

Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably effective IT systems remains a significant challenge. This paper presents a light weight IT effectiveness model for small businesses to assess their IT and formulate strategies for improvement. Employing an action research approach we investigate a mixed method analysis of 120 survey responses from small family businesses and user participation in 10 semi-structured interviews. We then conduct critical reflection to identify refinements which are validated using 72 survey responses from university students. The results present compelling evidence that employees’ normative patterns (norms) are a significant driver …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


A Hybrid Process-Mining Approach For Simulation Modeling, Waleed Abo-Hamad, Ahmed Ramy, Amr Arisha Jan 2017

A Hybrid Process-Mining Approach For Simulation Modeling, Waleed Abo-Hamad, Ahmed Ramy, Amr Arisha

Conference Papers

This paper presents a hybrid Modeling and Simulation framework to address business process challenges. The framework has integrated process mining techniques in the conceptual modeling phase to support developing simulation models that are unbiased and close reflection of reality in a timely manner. The hybrid approach overcomes the pitfalls of traditional conceptual modeling by using process mining techniques to discover valuable process knowledge from the analysis of event logs. The proposed hybrid framework has been applied to an Emergency Department (ED) in order to identify performance bottlenecks and explore improvement strategies in an attempt to meet national performance targets. A …