Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Management Information Systems

Mont Ripley Ski Area: A3 Goals Celebration, Nick Sirdenis May 2020

Mont Ripley Ski Area: A3 Goals Celebration, Nick Sirdenis

Annual Copper Country Lean Conference

No abstract provided.


Facets Of The Museum Goals: Using Mtu's A3 Goals To Help The Museum Better Serve Our Guests, Patrice Cobin May 2020

Facets Of The Museum Goals: Using Mtu's A3 Goals To Help The Museum Better Serve Our Guests, Patrice Cobin

Annual Copper Country Lean Conference

No abstract provided.


Transportation Services Spring 2020 A3 Accomplishments, Gail Kotajarvi-Gerard May 2020

Transportation Services Spring 2020 A3 Accomplishments, Gail Kotajarvi-Gerard

Annual Copper Country Lean Conference

No abstract provided.


Creating A Universal Working Definition Of Smooth Operations, Theresa Coleman-Kaiser May 2020

Creating A Universal Working Definition Of Smooth Operations, Theresa Coleman-Kaiser

Annual Copper Country Lean Conference

Every day striving to achieve an increasingly greater concurrence between processes and expectations produces increasingly smooth operations and is supported by our foundational strategies.


Gun Room 5s, Kathy Wardynski, Alexandra Holmstrom, Paul Rayment May 2020

Gun Room 5s, Kathy Wardynski, Alexandra Holmstrom, Paul Rayment

Annual Copper Country Lean Conference

Problem Statement: Dining Services uses two storage rooms. Only one storage room, what used to the Gun Room, is now available. The storage rooms contain items that are used seasonally infrequently or are no longer used. Items are disorganized, overcrowded, and unlabeled, making it difficult to find items. This leads to waste in resources as items that cannot be found are reordered again. Time is wasted searching for stored items, leading to employee inefficiency. An employee safety hazard was created due to items stacked up.


Pavlis Honors College Pathways Kaizen, Briana Tucker May 2020

Pavlis Honors College Pathways Kaizen, Briana Tucker

Annual Copper Country Lean Conference

Some students are not completing components and are missing opportunities due to communication gaps, flexibility of program (lack of deadlines), insufficient support for advising, and misconception regarding expectations (the Why).


Wadsworth Hall Big Freezer 5s, Megan Goke, Lori Hardyniec May 2020

Wadsworth Hall Big Freezer 5s, Megan Goke, Lori Hardyniec

Annual Copper Country Lean Conference

Project Goal: Evaluation the usage of the freezer space and identify waste. Reorganize the items within the freezer to make the flow work faster. By addressing these issues, it would lead to less confusion as to where items belong and less time wasted by having to ask questions.


Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek Oct 2019

Survival Of The Safest: Examining Organization Risk Factors For Cybersecurity Incidents, Rachel Whitman, Ana Kriletic, Thomas Wilmore, Kate Conkey, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

[Invited adaptation from presentation proposal, "A Matter of Time: Exploring Survival Analysis Through Cybersecurity] Given that employees pose a large threat to organizational cybersecurity, much research attention has been directed to identifying individual risk factors for cybersecurity noncompliance and misbehavior at the cost of examining broad organizational risk factors. However, no study to date has formally examined how the risk of organizational cybersecurity incident changes over time, or how organizational characteristics affect this risk. The proposed study aims to conduct a survival analysis (SA) of cybersecurity events across the past decade, examining broad factors that impact the changing probability of …


A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek Oct 2019

A Matter Of Time: Exploring Survival Analysis Through Cybersecurity, Rachel Whitman, Ana Kriletic, Daniel Svyantek

River Cities Industrial and Organizational Psychology Conference

Despite the impact of employee behavior on organizational security, the topic of cybersecurity historically remains the responsibility of Information Security Management researchers and Information Technology professionals. However, the exponential increase in the prevalence and repercussions of cyber-related incidents invites collaboration between the fields of I-O Psychology and cybersecurity. The proposed presentation discusses the potential for I-O Psychology to contribute to cybersecurity efforts while demonstrating the fundamentals and applicability of survival analysis.


Closing Keynote, Theresa Coleman-Kaiser May 2019

Closing Keynote, Theresa Coleman-Kaiser

Annual Copper Country Lean Conference

No abstract provided.


Track A: Building Your House Of Lean: Standard Work And Effective Communication - Active Learning Session, Laurie Stark, Annelise Doll May 2019

Track A: Building Your House Of Lean: Standard Work And Effective Communication - Active Learning Session, Laurie Stark, Annelise Doll

Annual Copper Country Lean Conference

This session will introduce the concept of standard work through a hands-on activity. Attendees will learn the importance of clear communication and language choices in growing a sustainable Lean environment. Presenters will share their experiences regarding how the Van Pelt and Opie Library has grown Lean through the use of standard work and effective communication.


Track B: Growing Continuous Improvement: An Example Of Pdca On Student Employee Visual Management Boards - Case Study, Dominique Aleo May 2019

Track B: Growing Continuous Improvement: An Example Of Pdca On Student Employee Visual Management Boards - Case Study, Dominique Aleo

Annual Copper Country Lean Conference

Visual Management and the Plan, Do, Check, Act (PDCA) Cycle are well known Lean methods. The Student Process Improvement Coordinators in the Office of Continuous Improvement at Michigan Technological University use white boards to track progress on recurring performance duties.These boards cover multiple areas of work and showcase how many students with different schedules keep track of their workload within the office. This case study examines how the Visual Management boards have changed through multiple cycles of PDCA, in pursuit of perfect visual communication between the students who work in the office, and also perfect performance. Specifically, this presentation will …


1st Annual Conference Program, Michigan Technological University May 2019

1st Annual Conference Program, Michigan Technological University

Annual Copper Country Lean Conference

Full conference program, including presenter bios and presentation descriptions.


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …


User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye Oct 2016

User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye

KSU Proceedings on Cybersecurity Education, Research and Practice

With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.


Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman Oct 2016

Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman

KSU Proceedings on Cybersecurity Education, Research and Practice

Thanks to an abundance of highly publicized data breaches, Information Security (InfoSec) is taking a larger place in organizational priorities. Despite the increased attention, the threat posed to employers by their own employees remains a frightening prospect studied mostly in a technical light. This paper presents a categorization of insider deviant behavior and misbehavior based off of the neuropsychological foundations of three main types of insiders posing a threat to an organization: accidental attackers; neurologically “hot” malcontents, and neurologically “cold” opportunists.


Usability Testing To Enhance User Experience: The Catquest Usability Study, Aaron Nichols, Amber Billey, Alice Stokes, Peter Spitzform, Catherine Mundy Aug 2013

Usability Testing To Enhance User Experience: The Catquest Usability Study, Aaron Nichols, Amber Billey, Alice Stokes, Peter Spitzform, Catherine Mundy

UVM Libraries Conference Day

After implementing the discovery tool Primo (eventually renamed CATQuest), the UVM Libraries conducted a usability test to understand how our users approach using this tool without instruction, to discover patterns in searching behavior, and to uncover how compatible Primo is with user search behavior. This presentation will demonstrate the design and implementation of the usability study, as well as reveal some surprising results.