Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Management Information Systems

A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma Dec 2013

A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma

Research Collection School Of Computing and Information Systems

Traditional methods to evaluate research performance focus on citation count, quality and quantity of research output by individual researchers. These measures overlook the roles an individual plays in research collaboration, which is critical in an institutional research management environment due to the inherent interdependency among research entities. In order to address the organizational research management needs, we propose a research social network approach to better analyze local collaboration networks. For this purpose, we develop a new “collaboration supportiveness” measure to quantify an individual researcher's collaboration ability. Insights derived from this research are very helpful for managers to effectively allocate resources, …


Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Assessing The Moderating Effect Of Consumer Product Knowledge And Online Shopping Experience On Using Recommedation Agents For Customer Loyalty, Victoria Y. Yoon, R. Eric Hostler, Zhiling Guo, Tor Guimaraes Nov 2013

Assessing The Moderating Effect Of Consumer Product Knowledge And Online Shopping Experience On Using Recommedation Agents For Customer Loyalty, Victoria Y. Yoon, R. Eric Hostler, Zhiling Guo, Tor Guimaraes

Research Collection School Of Computing and Information Systems

Social media technologies have greatly facilitated the creation of many types of user-generated information, e.g., product rating information can be used to generate preference-based recommendation. As a decision support tool, a Recommendation Agent (RA) has been widely adopted by many e-commerce websites. The impact of RAs on online shopping has been extensively examined in the IS literature. However, from Marketing and Social Media perspectives, the widely adopted cognitive–affect–conative–action framework of customer loyalty has not been tested in the presence of RAs. Moreover, there has been little research assessing the impact of increasing consumer knowledge about specific product domains on customer …


Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede Oct 2013

Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede

The African Journal of Information Systems

Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used …


Understanding Online Consumer’S Inter-Purchase Time, Youngsoo Kim Oct 2013

Understanding Online Consumer’S Inter-Purchase Time, Youngsoo Kim

Research Collection School Of Computing and Information Systems

This study is motivated by the premise that online consumers can make a purchase at any time of day if they have even a tiny time slot along with Internet access. Given the increased shopping time flexibility, we first examine the patterns of online purchase timing at an online shopping mall handling diverse products (e.g., Amazon.com). The results show (1) the breakdown of purchase timing regularity and (2) the change of weekly spike purchase occurrence. Second, we build online inter-purchase time and price promotion utilization models and estimate them with the data collected from one of the premier online shopping …


An Investigation Of Decision Analytic Methodologies For Stress Identification, Yong Deng, Chao-Hsien Chu, Huayou Si, Qixun Zhang, Zhonghai Wu Sep 2013

An Investigation Of Decision Analytic Methodologies For Stress Identification, Yong Deng, Chao-Hsien Chu, Huayou Si, Qixun Zhang, Zhonghai Wu

Research Collection School Of Computing and Information Systems

In modern society, more and more people are suffering from some type of stress. Monitoring and timely detecting of stress level will be very valuable for the person to take counter measures. In this paper, we investigate the use of decision analytics methodologies to detect stress. We present a new feature selection method based on the principal component analysis (PCA), compare three feature selection methods, and evaluate five information fusion methods for stress detection. A driving stress data set created by the MIT Media lab is used to evaluate the relative performance of these methods. Our study show that the …


Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu Aug 2013

Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


A Study On The Application Of Information System In Patrol Vessel Management, Lei Li Aug 2013

A Study On The Application Of Information System In Patrol Vessel Management, Lei Li

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Performance Measurement Design For A Parcel Delivery Company, Junyu Choy, Nang Laik Ma, Ping Shung Koo Jul 2013

Performance Measurement Design For A Parcel Delivery Company, Junyu Choy, Nang Laik Ma, Ping Shung Koo

Research Collection School Of Computing and Information Systems

There were extensive researches on the topic of performance management in various organizations across multiple fields. Literature on performance measurements in logistics can be divided into specific measures and their application in the context or complete framework for performance measurements. In this paper, the focus of the discussion will be the formulation of the framework which handles performance measurements for package delivery service and how the metrics measure the performance and their application in the context of package delivery service.


Platform Regulation On Seller Heterogeneity, Ruhai Wu, Mei Lin Jul 2013

Platform Regulation On Seller Heterogeneity, Ruhai Wu, Mei Lin

Research Collection School Of Computing and Information Systems

On a "marketplace" platform, where two sides of users trade, the platform owner has an incentive to regulate its marketplace for a higher profit. This study focuses on a monopoly platform's nonpricing, regulatory strategies in governing quality heterogeneity of competing sellers. In contrast to related studies, we endogenize strategic interactions among platform users. Our model extends the circular city model to capture seller heterogeneity in both variety and quality. The closed-form equilibrium solution reveals a ripple effect that exerts competitive pressure from seller to seller at a diminishing magnitude. The equilibrium analysis enables us to connect the economic mechanisms in …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2013

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

Research Collection School Of Computing and Information Systems

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloudbased computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu Jun 2013

Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing, Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Today’s organizations raise an increasing need for information sharing via on-demand access. Information brokering systems (IBSs) have been proposed to connect large-scale loosely federated data sources via a brokering overlay, in which the brokers make routing decisions to direct client queries to the requested data servers. Many existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. In this …


Design Capital And Design Moves: The Logic Of Digital Business Strategy, C. Jason Woodard, Narayan Ramasubbu, F. Ted Tschang, V. Sambamurthy Jun 2013

Design Capital And Design Moves: The Logic Of Digital Business Strategy, C. Jason Woodard, Narayan Ramasubbu, F. Ted Tschang, V. Sambamurthy

Research Collection Lee Kong Chian School Of Business

As information technology becomes integral to the products and services in a growing range of industries, there has been a corresponding surge of interest in understanding how firms can effectively formulate and execute digital business strategies. This fusion of IT within the business environment gives rise to a strategic tension between investing in digital artifacts for long-term value creation and exploiting them for short-term value appropriation. Further, relentless innovation and competitive pressures dictate that firms continually adapt these artifacts to changing market and technological conditions, but sustained profitability requires scalable architectures that can serve a large customer base and stable …


Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik May 2013

Concept Graphs: Applications To Biomedical Text Categorization And Concept Extraction, Said Bleik

Dissertations

As science advances, the underlying literature grows rapidly providing valuable knowledge mines for researchers and practitioners. The text content that makes up these knowledge collections is often unstructured and, thus, extracting relevant or novel information could be nontrivial and costly. In addition, human knowledge and expertise are being transformed into structured digital information in the form of vocabulary databases and ontologies. These knowledge bases hold substantial hierarchical and semantic relationships of common domain concepts. Consequently, automating learning tasks could be reinforced with those knowledge bases through constructing human-like representations of knowledge. This allows developing algorithms that simulate the human reasoning …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe Apr 2013

Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe

The African Journal of Information Systems

The inefficiencies of current intrusion detection system against fraudulent cyber activities attracts the attention of computer gurus, also known as “hackers” to exploit known weakness on a particular host or network. These hackers are expert programmers who mainly focus on how the Internet works, and they interact with each other to know its strengths and weaknesses. Then they develop advanced tools which an average attacker with little background can use to know the liveness, reachability and running service on the network. Once an attacker identifies these details, he can accurately launch an effective attack and get maximum benefit out of …


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman Apr 2013

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

MIS/OM/DS Faculty Publications

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr Mar 2013

Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The innovation in the 21st century goes significantly beyond the high-tech picture driven by small or large industry clusters in a specific region-typically Silicon Valley and M4Corridor. The future of innovation will lie within knowledge management and seamless technological applications. These will be supported by planned funding strategies, possibly with clients as drivers of the innovation. This view seems to be supported by the UK government “Technology and Innovation Futures” (2011); the USA government (2011), study into which leading scholars concede that the future innovation and technological applications for economic growth will include products and processes, improvements in areas such …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter Feb 2013

Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter

Dr Samuel Fosso Wamba

Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough Jan 2013

Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough

Theses Digitization Project

The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.


The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In Jan 2013

The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In

Theses Digitization Project

The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.


Firm Strategy And The Internet In U.S. Commercial Banking, K. H. Goh, Robert J. Kauffman Jan 2013

Firm Strategy And The Internet In U.S. Commercial Banking, K. H. Goh, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

As information technology (IT) becomes more accessible, sustaining any competitive advantage from it becomes challenging. This has caused some critics to dismiss IT as a less valuable resource. We argue that, in addition to being able to generate strategic advantage, IT should also be viewed as a strategic necessity that prevents competitive disadvantage in rapidly changing business environments. We test a set of hypotheses on strategic advantage and strategic necessity in the context of Internet banking investments among the entire population of the United States Federal Deposit Insurance Corporation (FDIC) banks from 2003 to 2005. We seek to understand whether …


Technology Investment Decision-Making Under Uncertainty: The Case Of Mobile Payment Systems, Robert J. Kauffman, Jun Liu, Dan Ma Jan 2013

Technology Investment Decision-Making Under Uncertainty: The Case Of Mobile Payment Systems, Robert J. Kauffman, Jun Liu, Dan Ma

Research Collection School Of Computing and Information Systems

The recent launch of Google Wallet has brought the issue of technology solutions in mobile payments (m-payments) to the forefront. In deciding whether and when to adopt m-payments, senior managers in banks are concerned about uncertainties regarding future market conditions, technology standards, and consumer and merchant responses, especially their willingness to adopt. This study applies economic theory and modeling for decision-making under uncertainty to bank investments in m-payment systems technology. We assess the projected benefits and costs of investment as a continuous-time stochastic process to determine optimal investment timing. We find that the value of waiting to adopt jumps when …


Analyzing The Impact Of Cloud Services Brokers On Cloud Computing Markets, Richard D. Shang, Jianhui Huang, Yinping Yang, Robert J. Kauffman Jan 2013

Analyzing The Impact Of Cloud Services Brokers On Cloud Computing Markets, Richard D. Shang, Jianhui Huang, Yinping Yang, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

This research offers a theoretical model of brokered services and provides an analysis of their impact on the cloud computing market with risk preference-based stratification of client segments. The model structures the decision problem that clients face when they choose among spot, reserved and brokered services. Although all the three types of services do not indemnify the cloud services client against other kinds of service outages, due to changes in market demand, service interruptions occur most frequently in the spot market, and are lower when brokered services are offered, and no risk of inter-ruption is involved in reserved services. Based …