Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information systems (4)
- Curriculum development (3)
- DACUM (3)
- Information assurance (3)
- Information security (3)
-
- Job analysis (3)
- Business (2)
- Case study (2)
- Experiential learning (2)
- Open Source Software and Virtualization (2)
- Theory and Meta-Theory (2)
- Adaptive structuration theory (1)
- Assessment (1)
- Business conditions (1)
- Business education (1)
- CSI (1)
- Classroom activities (1)
- Cognitive profiles (1)
- Computer networks (1)
- Computer science (1)
- Conceptual models (1)
- Digital Textbook (1)
- Digitization (1)
- E-book (1)
- E-book adoption (1)
- E-learning (1)
- E-textbook acceptance. (1)
- Education (1)
- Embedded librarianship (1)
- Entrepreneurship (1)
- Publication Year
- Publication
- File Type
Articles 1 - 24 of 24
Full-Text Articles in Management Information Systems
Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik
Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik
Eric A. Kowalik
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Wendi M. Kappers, PhD
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Wendi M. Kappers, PhD
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian
Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian
Leila A. Halawi
This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios.
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Leila A. Halawi
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Donald Wynn
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Thomas Ferratt
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
E-Book Acceptance Among Undergraduate Students: A Look At The Moderating Role Of Technology Innovativeness, Madison Ngafeeson, Jun Sun
E-Book Acceptance Among Undergraduate Students: A Look At The Moderating Role Of Technology Innovativeness, Madison Ngafeeson, Jun Sun
Madison Ngafeeson
This paper utilizes the technology acceptance model (TAM) to uncover the moderating roles of technology innovativeness. A study of 158 undergraduate students revealed that the original TAM constructs and relationships were reliable, supported, and applicable in the measurement of e-book acceptance. Interestingly, personal technology innovativeness was found to moderate in a significant way, the relationship between behavioral intention to use e-book and actual usage of e-book. These findings suggest that while individuals who are more open to technology (adopters) as well as less technologically innovative individuals (late adopters and non-adopters) are likely to have the intention to use web-based instructional …
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
The Effects Of Technology Innovativeness And System Exposure On Student Acceptance Of E-Textbooks., Madison N. Ngafeeson, Jun Sun
The Effects Of Technology Innovativeness And System Exposure On Student Acceptance Of E-Textbooks., Madison N. Ngafeeson, Jun Sun
Madison Ngafeeson
The efforts of educators in the last three decades have, among other things, focused on the use of information technology (IT) in education. It has become commonplace to view in-formation systems both as an effective carrier of course content as well as a cost-effective tool to improve student learning outcomes. One of such technologies is the e-book. Deci-sion-makers in the education field need make sense of this technological transformation. However, despite the growing popularity of e-books in higher education, its adoption by students is yet to be crystalized. This study exploits the technology acceptance model (TAM) framework to examine student …
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Sherri Shade
Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
Arcot Desai NARASIMHALU
This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Maurice Dawson
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …
Etextbooks: A Framework To Understanding Their Potential, Business Research Yearbook, Saurabh Gupta, Charlene Gullett-Scaggs
Etextbooks: A Framework To Understanding Their Potential, Business Research Yearbook, Saurabh Gupta, Charlene Gullett-Scaggs
Saurabh Gupta
No abstract provided.
A Semantic Analysis Approach For Assessing Professionalism Using Free-Form Text Entered Online, Roger H. Blake
A Semantic Analysis Approach For Assessing Professionalism Using Free-Form Text Entered Online, Roger H. Blake
Roger H. Blake
This paper presents the results of an experimental study to measure professionalism for the purpose of assessing a professional development program. Soft skills such as professionalism are increasingly recognized as important, yet measuring and assessing these skills, typically best acquired experientially, has remained challenging. Following established research, we conceptualize professionalism as a construct with the dimensions of autonomy, commitment, belief in public service, self-regulation, and the use of a professional organization as a major referent. We demonstrate how these dimensions can be expressed and the professionalism of free-form text responses measured. These responses are reflections submitted online by participants in …
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
Priscilla Arling
Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
Priscilla Arling
Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.
A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling
A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling
Priscilla Arling
One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and network implementation exercise that can be completed in one or two class periods in any classroom with Internet access. The objective of the exercise is for students to solve a business problem by applying concepts related to basic network configuration, local area networks …
End User Training: What We Know, Need To Know, Saurabh Gupta, Robert Bostrom, Mark Huber
End User Training: What We Know, Need To Know, Saurabh Gupta, Robert Bostrom, Mark Huber
Saurabh Gupta
End-User Training (EUT) has enjoyed a rich tradition of research in Information Systems. However, with the growing pace of change in technology and the dynamic nature of business, organizations are spending an increasing amount of money on end-user training. Training methods are also changing with little research to support new approaches. Thus, extensive research is required in the future. To be credible, end-user training research should preserve and build upon the significant literature that exists, both in IS and Education. This paper provides a review of EUT literature focusing on training methods. It summarizes research findings, while pointing out key …
A Meta-Theory For Understanding Systems Within Socio-Technical Systems, Robert Bostrom, Saurabh Gupta, Dominic Thomas
A Meta-Theory For Understanding Systems Within Socio-Technical Systems, Robert Bostrom, Saurabh Gupta, Dominic Thomas
Saurabh Gupta
Information systems (IS) research often attempts to examine and explain how technology leads to outcomes through usage of IS. Although extensive research in this area has resulted in a significant number of theories, limited work has been done on integrating these theories. This paper presents adaptive structuration theory (AST) as a meta-theory for examining IS within an organizational context. The two main contributions of the paper are an understanding of meta-theory’s role in IS and building a case for using AST as a meta-theory to (1) provide an overarching perspective for understanding and integrating existing literature and theories, (2) provide …
Living Electronically, Wayne Dennison
Living Electronically, Wayne Dennison
Wayne Dennison
Moving your office from paper to electronic, including electronic surveys and overcoming the hurdles that are involved with this transition.
Improving Service And Reducing Risks With Touchnet: Ksu’S Experience, Wayne Dennison
Improving Service And Reducing Risks With Touchnet: Ksu’S Experience, Wayne Dennison
Wayne Dennison
No abstract provided.
Improving Service And Reducing Risks With Touchnet: Ksu’S Experience, Wayne Dennison
Improving Service And Reducing Risks With Touchnet: Ksu’S Experience, Wayne Dennison
Wayne Dennison
No abstract provided.
Improve The Quality Of Data Used To Make Decisions Using Electronic Surveys, Wayne Dennison
Improve The Quality Of Data Used To Make Decisions Using Electronic Surveys, Wayne Dennison
Wayne Dennison
No abstract provided.