Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Information systems

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 45

Full-Text Articles in Business

Using Information Systems To Help Chatham County With Dental Services, Taylor Gray Apr 2022

Using Information Systems To Help Chatham County With Dental Services, Taylor Gray

Honors College Theses

Due to the extreme lack of access to dental work in Chatham county, this consulting thesis was formed. I assisted the Chatham County Safety Net Planning Council by using information systems to help with dental assistance in the county both short and long term. This is a very important issue in the county and it has caused many issues among people without dental insurance. I helped by creating a website platform for the Chatham County Safety Net, and used data analysis to help make the event more streamlined.


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Diseño De Un Prototipo De Sistema De Información Empresarial Para La Gestión Del Conocimiento En Una Mipyme Familiar Del Sector Ferretero En Bogotá, Nicolás Méndez Jiménez, Jonhatan Stiven Olarte Forero Jan 2021

Diseño De Un Prototipo De Sistema De Información Empresarial Para La Gestión Del Conocimiento En Una Mipyme Familiar Del Sector Ferretero En Bogotá, Nicolás Méndez Jiménez, Jonhatan Stiven Olarte Forero

Ingeniería Industrial

En Colombia las micro, pequeñas y medianas empresas - MiPymes constituyen más del 95% del total de negocios establecidos y absorben más del 85% del empleo total en la mayoría de los países de la región (Banco Interamericano para el Desarrollo, 2010); el 65% de estas empresas son familiares, pero solo el 13% logra sobrevivir a primer cambio generacional. Entre otros aspectos, porque la gestión del conocimiento y el manejo de la información en estas organizaciones familiares se ve centralizado por la primera generación de la empresa: el(los) Fundador(es). La teoría de la gestión del conocimiento promueve que este solo …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Roli Dhe Rëndësia E Sistemeve Të Informacionit Në Kohë Pasigurie, Albion Rexhepi Dec 2020

Roli Dhe Rëndësia E Sistemeve Të Informacionit Në Kohë Pasigurie, Albion Rexhepi

Theses and Dissertations

Punimi shtjellon problemet që u paraqiten me rastin e përhapjes së pandemisë së fundit globale. Problemet janë në shumë aspekte, problemet në menaxhimin e mirë të shëndetsisë, probleme tek kompanitë e fluturimeve, problemet me turizmin, problemet tek aktivetetet sportive, tek ndërmarrjet e mëdha, të mesme dhe të vogla, e të tjera. Problemet tek këta sektorë u shfaqën kur shtetet filluan mbylljen e disa prej veprimtarive. Pasojat ishin të pashmangshme, vetëm se niveli i pasojave do të dallonte prej veprimtarisë në veprimtari, përshembull, tek sektori i ndërtimit dhe sektori i pjesëve të këmbimit. Pra, në këtë punim fokusi do të jetë …


Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah May 2020

Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah

Graduate Theses and Dissertations

The role of information in today’s economy is essential as organizations that can effectively store and leverage information about their stakeholders can gain an advantage in their markets. The extensive digitization of business information can make organizations vulnerable to data breaches. A data breach is the unauthorized access to sensitive, protected, or confidential data resulting in the compromise of information security. Data breaches affect not only the breached organization but also various related stakeholders. After a data breach, stakeholders of the breached organizations show negative behaviors, which causes the breached organizations to face financial and non-financial costs. As such, the …


Assessing Public Health Workforce Informatics Competencies: A Study Of Three Health Departments In Metro Atlanta, Olatanwa Adewale Jan 2020

Assessing Public Health Workforce Informatics Competencies: A Study Of Three Health Departments In Metro Atlanta, Olatanwa Adewale

Electronic Theses and Dissertations

Background: There is a need for the public health workforce to be current and versatile in technology usage. Public health leveraging technology usage in service delivery has the potential to improve efficiency and bring it to the forefront in the provision of healthcare services. The purpose of this study was to assess public health workforce informatics competencies in select Atlanta health districts and determine the correlates of public health informatics proficiency.

Methods: A 10-item instrument adapted from the recommendations of a Working Group document by the Centers for Disease Control and Prevention and the 2015 Informatics Capacity and …


Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook Aug 2019

Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook

Graduate Theses and Dissertations

The purpose of this study was to examine student perceptions of factors affecting the decision to select information systems as an undergraduate major. Additionally, information systems students were compared to other business students to see if significant differences existed between groups. The four factors studied included: (a) personal interest in the major, (b) student competence, (c) value and utility, and (d) external influences of other people and academic experiences.

A convenience sample was used at a public university in the Southeastern region of the United States. Two hundred junior/senior students were selected as participants. One hundred of the students were …


Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena Dec 2016

Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena

Graduate Theses and Dissertations

Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


Understanding Agile Software Development Assimilation Beyond Acceptance, Corey Wayne Baham Jan 2016

Understanding Agile Software Development Assimilation Beyond Acceptance, Corey Wayne Baham

LSU Doctoral Dissertations

Agile software development methods represent a departure from the heavily regimented and document-driven procedures of traditional, waterfall approaches. Despite the highly touted benefits of employing agile ISD methods and the growth of agile adoption rates over the past two decades, it is not clear why some organizations fail to routinize agile methods, while others do so and realize their promised benefits. Motivated by the need to understand the factors that influence agile routinization, this study empirically examines the deep contextual factors that impact the extent to which agile methods are proliferated throughout an organization. Findings indicate that project success from …


The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu Jul 2015

The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu

Information Technology & Decision Sciences Theses & Dissertations

Each year, huge investments into healthcare information systems (HIS) are being made all over the world. Despite the enormous cost for the hospitals, the overall benefits and costs of the healthcare information systems have not been deeply assessed. In recent years, much previous research has investigated the link between the implementation of Information Systems and the performance of organizations. Although the value of Healthcare Information System or Healthcare Information Technology (HIS/HIT) has been found in many studies, some questions remain unclear. Do HIS/HIT systems influence different hospitals the same way? How to understand and explain the mechanism that HIS/HIT improves …


Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa May 2015

Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa

Dissertations

A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …


An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth Apr 2015

An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth

Doctor of Business Administration Dissertations

This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.

Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …


The Impact Of User Involvement On Information System Projects, Bradford Reese Eichhorn Jan 2014

The Impact Of User Involvement On Information System Projects, Bradford Reese Eichhorn

ETD Archive

Information systems (IS) development has been studied from many perspectives. Information systems are being viewed as a service as the economy shifts from being industrial-based to service-based. This shift is motivating the business user to become more involved with the development of the system. The once clear roles of user-as-specifier and IT professional-as-developer are blurring. This research addresses three objectives. First, we survey the actual business users themselves for their perception of activities and satisfaction with the completed system. Second, we analyze the separation of business requirements into two constructs representing the functional and presentation dimensions of these requirements to …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino Jan 2013

The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino

2013

In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …


User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong Jan 2013

User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong

2013

User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first study to research the relative contributions of vendor trust and IT artifact trust components to user resistance and, as a result, makes a unique contribution to the information systems literature. An understanding of the degree to which technology adoption behavioral beliefs, and particularly system trust, affect user resistance towards information …


Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen Jun 2012

Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen

Electronic Thesis and Dissertation Repository

Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.

Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.

The key findings of this research are fourfold. First, the core category developed in this …


Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell May 2012

Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.

The findings of this …


Disruptive Innovation In Agribusiness, Tyler Mcgee Jan 2012

Disruptive Innovation In Agribusiness, Tyler Mcgee

Undergraduate Theses, Professional Papers, and Capstone Artifacts

The purpose of this thesis is to analyze how the process of disruptive innovation will impact the agribusiness industry, and how this transition will take place. This analysis will be demonstrated through scenario analysis, with three potential scenarios being demonstrated and explained. This project was developed using research from a broad range of sources over the course of several years, as well as studies conducted within the industry itself through firsthand experience gained while working for one of the largest firms operating in this industry. While disruptive innovation has been a phenomenon studied in several industries and areas, it has …


The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell Dec 2011

The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell

Graduate Theses and Dissertations

A mature body of research on leadership has investigated the impact of a variety of leadership behaviors and styles on team performance. This corpus of work is built on an assumption that team leaders can motivate, direct, and monitor teams by way of sustained, personal contact with team members. However, this assumption is being challenged by recent advances in information and communication technologies (ICTs). Use of ICTs has altered traditional team-based structures, enabling organizations to employ teams composed of members who are dispersed across geographic boundaries, while severing the direct, personal ties leaders have to team members. Recent reviews of …


Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley Dec 2011

Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley

Undergraduate Honors Capstone Projects

Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …


Health Information Systems Affordances: How The Materiality Of Information Technology Enables And Constrains The Work Practices Of Clinicians, Chad Anderson Aug 2011

Health Information Systems Affordances: How The Materiality Of Information Technology Enables And Constrains The Work Practices Of Clinicians, Chad Anderson

Computer Information Systems Dissertations

The IT artifact is at the core of the information systems (IS) discipline and yet most IS research does not directly theorize the IT artifact or its nomological network (Benbasat and Zmud 2003; Orlikowski and Iacono 2001). This research seeks to answer a repeated call for more direct engagement with the IT artifact and its nomological net with affordance theory adopted as the basis for this theoretical work. An exploratory case study was conducted to answer the research question, how do the material properties of health information systems enable and constrain the work practices of clinicians? The study was …


The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar Jan 2009

The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar

Theses: Doctorates and Masters

This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …


Structural Influences In Information Systems Projects: A Virtual Experiment In A Multi-Agent System, Pierce Hopkins Jan 2009

Structural Influences In Information Systems Projects: A Virtual Experiment In A Multi-Agent System, Pierce Hopkins

LSU Doctoral Dissertations

A virtual experiment (in silico) of a complex social system is conducted in order to investigate the effects of social structure and organizational culture on an information system development project’s outcome. This is performed within the context of user participation and project success. A 2x2 factorial design is employed with the social factor being measured as either low or high initial relationships between the customer and developer groups working on the project. The cultural factor is measured dichotomously with the two groups either having the same or different cultural beliefs. The project success outcome variable is measured as a percentage …


Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi Aug 2008

Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi

Computer Information Systems Dissertations

This study investigates the impact of environmental factors on the decision to electronically integrate operations with international customers and/or suppliers. The following research question motivates the study: How does the environmental context affect the level of electronic integration of an organization with its international partners? This study elaborates on the concept of electronic integration. Studies on integration in general and electronic integration in particular adopt a loose definition of integration: they all agree in that integration is the opposite of markets, but they define this opposite in different terms: relationship contracting, long-term contracting, coordination, etc. Finally, the study also responds …


The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan May 2008

The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan

Dissertations

This dissertation investigated the impact of cultural differences in temporal perception on globally dispersed software development teams. Literature and anecdotal evidence suggest that these temporal differences affect individual communication quality, which in turn will affect individual satisfaction and trust within global teams. Additionally, the temporal dispersion of the team was expected to affect an individual's sense of temporal disruption which, in turn, was expected to affect individual satisfaction and trust. Differences in temporal perception were expected to moderate this impact on perceived temporal disruption. A Fortune 100 Company that carried out software testing in Ireland, the United States, China and …


Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke Jan 2008

Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke

Theses and Dissertations

This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …