Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Management Information Systems

Usability Testing To Enhance User Experience: The Catquest Usability Study, Aaron Nichols, Amber Billey, Alice Stokes, Peter Spitzform, Catherine Mundy Aug 2013

Usability Testing To Enhance User Experience: The Catquest Usability Study, Aaron Nichols, Amber Billey, Alice Stokes, Peter Spitzform, Catherine Mundy

UVM Libraries Conference Day

After implementing the discovery tool Primo (eventually renamed CATQuest), the UVM Libraries conducted a usability test to understand how our users approach using this tool without instruction, to discover patterns in searching behavior, and to uncover how compatible Primo is with user search behavior. This presentation will demonstrate the design and implementation of the usability study, as well as reveal some surprising results.


Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof Jul 2013

Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof

Henk LM Kox

An economic perspective on Internet security is useful not only for identifying weak spots, but also for finding solutions to security problems. It focuses on the behaviour and economic incentives of both infrastructure providers and end users. Individual parties may have insufficient incentives to invest in cybersecurity. The free play of markets markets may not deliver a socially optimal level of security on the Internet for at least three reasons: information asymmetry, externalities and market power. Information asymmetry might occur in various situations. For example, end users are not able to verify whether an Internet Service Provider (ISP) correctly informs …


2013 Ijbe Front Matter, Tamra Connor Apr 2013

2013 Ijbe Front Matter, Tamra Connor

International Journal for Business Education

  1. Editorial Board
  2. President's Letter
  3. SIEC-ISBE International


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


A State-Sponsored Approach To Quality Improvement In Nursing Homes: Insights From Providers, Kathleen Abrahamson, Priscilla Arling, Greg Arling Jan 2013

A State-Sponsored Approach To Quality Improvement In Nursing Homes: Insights From Providers, Kathleen Abrahamson, Priscilla Arling, Greg Arling

Scholarship and Professional Work - Business

In 2006, the Minnesota Performance-based Incentive Payment Program (PIPP) was launched to fund provider-initiated quality improvement (QI) projects addressing a wide range of persistent quality issues in nursing homes (eg, falls, pain, mobility, psychotropic medication reduction, care transitions). In this article, the authors describe the perceptions of nursing home providers who participated in a PIPP-funded QI project and completed a survey addressing a variety of QI-related concerns. Respondents noted the importance of support from top leadership, reported being challenged by resource constraints, and generally thought that their project positively impacted quality within their facility. These findings highlight the importance of …


Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling Jan 2013

Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling

Scholarship and Professional Work - Business

Knowledge sharing is a difficult task for most organizations, and there are many reasons for this. In this article, we propose that the nature of the knowledge shared and an individual's social network influence employees to find more value in person-to-person knowledge sharing, which could lead them to bypass the codified knowledge provided by a knowledge management system (KMS). We surveyed employees of a workman's compensation board in Canada and used social network analysis and hierarchical linear modeling to analyze the data. The results show that knowledge complexity and knowledge teachability increased the likelihood of finding value in person-to-person knowledge …


Zycie Wirtualnych Dzikich, Dariusz Jemielniak Jan 2013

Zycie Wirtualnych Dzikich, Dariusz Jemielniak

Dariusz Jemielniak

Wstęp i bibliografia książki "Życie wirtualnych dzikich".


Introduction To Data Science, Jeffrey M. Stanton Jan 2013

Introduction To Data Science, Jeffrey M. Stanton

School of Information Studies - Faculty Scholarship

In this Introduction to Data Science eBook, a series of data problems of increasing complexity is used to illustrate the skills and capabilities needed by data scientists. The open source data analysis program known as "R" and its graphical user interface companion "R-Studio" are used to work with real data examples to illustrate both the challenges of data science and some of the techniques used to address those challenges. To the greatest extent possible, real datasets reflecting important contemporary issues are used as the basis of the discussions.