Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Management Information Systems

Design And Evaluation Of A List Gathering Tool In A Web-Based Collaborative Environment, Yuanqiong Wang Aug 2003

Design And Evaluation Of A List Gathering Tool In A Web-Based Collaborative Environment, Yuanqiong Wang

Dissertations

This research focuses on how to build a "list" structure to combine individual items of information into some sort of structure that converts the individual items of information into a structure of knowledge relative to the problem. Software was designed to provide relationships among and comparisons of the contributions in a "list" structure, so that individual members of a group process will be able to understand the contributions of information made by the group as a whole.

A List Gathering Tool was designed and implemented, which is one component in a Web-based Social Decision Support System (SDSS) Toolkit. Then, a …


Design And Evaluation Of A Voting Tool In A Collaborative Environment, Zheng Li Aug 2003

Design And Evaluation Of A Voting Tool In A Collaborative Environment, Zheng Li

Dissertations

This dissertation researchdesigned, implemented, and evaluated a Web-based Dynamic Voting Toolfor small group decision-making in a collaborative environment.

In this dissertation, theliterature on voting tools in current GDSS research is presented. Variousvoting theories and methods are analyzed, and the advantages and weaknessesare compared, so as to gain a better understanding of how to apply thesedifferent voting methods to diverse decision-making situations. A briefoverview of scaling theories is also given, with an emphasis on Thurstone'sLaw.

The basic features of someweb-based voting tool implementations are reviewed along with a discussionof the pros and cons of Intemet voting. A discussion of Human DynamicVoting …


Enemy At The Gate: Threats To Information Security, Michael E. Whitman Aug 2003

Enemy At The Gate: Threats To Information Security, Michael E. Whitman

Faculty and Research Publications

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.


Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng May 2003

Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng

CGU Faculty Publications and Research

To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. GeneScene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available. The extracted relations were evaluated by qualified researchers and are precise. A qualitative ongoing evaluation of the current online interface indicates that this method to search the literature is more useful and efficient than keyword based searching.


Cio Lateral Influence Behaviors: Gaining Peers' Commitment To Strategic Information Systems, Harvey Enns, Sid L. Huff, Christopher A. Higgins Mar 2003

Cio Lateral Influence Behaviors: Gaining Peers' Commitment To Strategic Information Systems, Harvey Enns, Sid L. Huff, Christopher A. Higgins

MIS/OM/DS Faculty Publications

In order to develop and bring to fruition strategic information systems (SIS) projects, chief information officers (CIOs) must be able to effectively influence their peers. This research examines the relationship between CIO influence behaviors and the successfulness of influence outcomes, utilizing a revised model initially developed by Yukl (1994). Focused interviews were first conducted with CIOs and their peers to gain insights into the phenomenon. A survey instrument was then developed and distributed to a sample of CIO and peer executive pairs to gather data with which to test a research model. A total of 69 pairs of surveys were …


Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell Jan 2003

Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell

Conference papers

Writing research papers presents numerous different challenges, which vary from how to layout the various pages and format the text to what to include in the different sections that make up the paper. In order to clarify these issues this paper sets out guidelines and best practice approaches and demonstrates their use in the style of this paper.