Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (52)
- Computer Sciences (46)
- Physical Sciences and Mathematics (46)
- Social and Behavioral Sciences (43)
- Management Sciences and Quantitative Methods (42)
-
- Engineering (31)
- Communication (30)
- Information Security (25)
- Business Administration, Management, and Operations (23)
- Computer Engineering (23)
- Social Media (21)
- Science and Technology Studies (19)
- Business Intelligence (18)
- Communication Technology and New Media (18)
- Medicine and Health Sciences (18)
- Operations and Supply Chain Management (18)
- Computer and Systems Architecture (16)
- Data Storage Systems (16)
- Digital Communications and Networking (16)
- E-Commerce (15)
- Education (15)
- Information Literacy (15)
- Library and Information Science (15)
- Operations Research, Systems Engineering and Industrial Engineering (15)
- Databases and Information Systems (13)
- Operational Research (13)
- Marketing (11)
- Health Information Technology (10)
- Institution
-
- Kennesaw State University (30)
- California State University, San Bernardino (28)
- Wright State University (23)
- Selected Works (17)
- Singapore Management University (17)
-
- Harrisburg University of Science and Technology (12)
- Universitas Indonesia (10)
- Clark University (6)
- University of Nebraska - Lincoln (6)
- Montclair State University (5)
- University of Texas at Arlington (4)
- Liberty University (3)
- Marshall University (3)
- New Jersey Institute of Technology (3)
- San Jose State University (3)
- Virginia Commonwealth University (3)
- Boise State University (2)
- Brigham Young University (2)
- Florida International University (2)
- Lingnan University (2)
- Old Dominion University (2)
- Technological University Dublin (2)
- University of Mississippi (2)
- University of Richmond (2)
- Bard College (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
- DePaul University (1)
- Edith Cowan University (1)
- Fort Hays State University (1)
- Keyword
-
- Information Systems (8)
- Data analytics (6)
- Social media (6)
- Technology (5)
- Big data (4)
-
- Education (4)
- Information security (4)
- Information systems (4)
- Privacy (4)
- Project management (4)
- Agile (3)
- Basis (3)
- Cloud computing (3)
- Commodities (3)
- Commodity (3)
- Curriculum development (3)
- Electronic Health Records (3)
- Encryption (3)
- Information Technology (3)
- Information technology (3)
- Marketing (3)
- Nigeria (3)
- Nonprofit organizations (3)
- Nonprofits (3)
- Price (3)
- Sustainability (3)
- Trust (3)
- Advertising (2)
- Affordable Care Act (2)
- Agile project management (2)
- Publication
-
- Journal of International Technology and Information Management (23)
- Dissertations and Theses (12)
- Research Collection School Of Computing and Information Systems (12)
- The African Journal of Information Systems (11)
- The South East Asian Journal of Management (10)
-
- Journal of Cybersecurity Education, Research and Practice (9)
- KSU Proceedings on Cybersecurity Education, Research and Practice (8)
- Master of Information Systems Capstone Executive Summary (8)
- ISSCM Newsletters (7)
- School of Professional Studies (6)
- Communications of the IIMA (5)
- Department of Information Management and Business Analytics Faculty Scholarship and Creative Works (5)
- Alberto Coustasse, DrPH, MD, MBA, MPH (3)
- Dissertations (3)
- Extension Farm and Ranch Management News (3)
- ISSCM Faculty Publications (3)
- Information Systems & Operations Management Dissertations (3)
- Management Faculty Research (3)
- Theses & Dissertations (3)
- Amy J Connolly (2)
- Dale H Shao (2)
- Dissertations and Theses Collection (2)
- Doctoral (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty Publications (2)
- Honors Theses (2)
- ISSCM Annual Reports (2)
- ISSCM Master Cohort Posters (2)
- IT and Supply Chain Management Faculty Publications and Presentations (2)
- Management Faculty Publications (2)
Articles 1 - 30 of 208
Full-Text Articles in Management Information Systems
Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Vol. 22, December 19, 2017, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A nine page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Journal of Cybersecurity Education, Research and Practice
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
Journal of Cybersecurity Education, Research and Practice
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
Journal of Cybersecurity Education, Research and Practice
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Journal of Cybersecurity Education, Research and Practice
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou
Marriott Student Review
Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.
The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee
The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee
The African Journal of Information Systems
There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between …
Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke
Reflections Of A Doctoral Research On Knowledge Management (Km) Through An Afrocentric Lens In A Nigerian Oil Corporation, Okeoma John-Paul Okeke
The African Journal of Information Systems
This paper focuses on the reflections of a doctoral research that evaluated the challenges of the adoption and implementation of a knowledge management (KM) initiative through the experiences of the knowledge champions. The African/Nigerian socio-cultural view was used to explore the narrative accounts of the knowledge champions. A case study research was carried out using qualitative approaches. Interpretative phenomenological analysis (IPA) was used in data analysis. The findings demonstrated the ability to ground KM adoption within a socio-cultural specific context helped in making sense of the organizational KM experience. The paper serves as an academic expression to the current generation …
Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr.
Deriving Critical Success Factors For Implementation Of Enterprise Resource Planning Systems In Higher Education Institution, Robyn C. Thompson Mrs, Oludayo Olufolorunsho Olugbara Prof, Alveens Singh Dr.
The African Journal of Information Systems
This paper presents the findings of a study that uses the advanced impact analysis (ADVIAN®) method to derive critical success factors (CSFs) of enterprise resource planning implementation in higher education institution. Through analysis of CSFs, the paper contributes towards assisting higher education institution to reduce some of the plethora of challenges in this domain as highlighted in the literature. The ADVIAN® method classified 20 factors into categories of integration, criticality and stability as well as ranked them by measures of precarious, driving and driven. The results of the classification and ranking show 5 factors that are ideal for intervening activities …
Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo
Turnover Intentions Among South African It Professionals: Gender, Ethnicity And The Influence Of Pay Satisfaction, Rennie Naidoo
The African Journal of Information Systems
The South African ICT industry is struggling with high turnover despite the relatively high remuneration packages it offers to its gender and racially diverse IT professionals. This study explored pay satisfaction levels and its relationship with job satisfaction, organizational commitment, and turnover intentions. Survey responses from 158 IT professionals were subjected to descriptive, correlation and regression analysis. The results show that, irrespective of gender or race, employees generally have low pay satisfaction, low organizational commitment, and only moderate job satisfaction levels. However, black ethnic groups did show a difference in their appraisals of pay satisfaction, expressing slightly lower pay satisfaction …
Enabling Context-Based Learning With Kportal Webspace Technology, Anand Jeyaraj, Vijay Sethi, Vikram Sethi, Kevin P. Duffy, Berkwood M. Farmer
Enabling Context-Based Learning With Kportal Webspace Technology, Anand Jeyaraj, Vijay Sethi, Vikram Sethi, Kevin P. Duffy, Berkwood M. Farmer
ISSCM Faculty Publications
Recognizing the importance of context-based learning and the general lack of technology applications in the design and development of the ideal and formal curricula, this paper describes an experimental system at a large public university. The authors describe the creation of a contextual environment for introducing concepts related to information security to undergraduate business students using the KPortal (Knowledge Portals) webspace technology that supports dynamic content gathered from various sources automatically. The KPortal webspace rated highly on the various attributes of effective contexts and the characteristics of technologies that enable context-based learning. The flexibility provided by the webspace permitted the …
Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang
Canines For Disabled Kids, Erin Jerrett, Margarita Mnatsakanyan, Colleen Reynolds, Yin Wang
School of Professional Studies
Canines for Disabled Kids have been working on behalf of children and their families to educate communities and promote service dog partnerships for almost twenty years. Their advocacy with local legislatures, business owners, and community leaders highlighted the difficulties encountered when differentiating service dogs from emotional support/comfort dogs. Service dogs are entitled to access by the Americans with Disabilities Act (ADA), while emotional support/comfort dogs are not protected under the federal statute or to the same rights. Canines for Disabled Kids proposed a study to obtain a current count of licensed service dogs in the Commonwealth and investigate the feasibility …
Exploring Factors Affecting Social E-Commerce Service Adoption: The Case Of Facebook Gifts, Stanislav Mamonov, Raquel Benbunan-Fich
Exploring Factors Affecting Social E-Commerce Service Adoption: The Case Of Facebook Gifts, Stanislav Mamonov, Raquel Benbunan-Fich
Department of Information Management and Business Analytics Faculty Scholarship and Creative Works
Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. …
How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge
How Decision Makers Learn To Choose Organizational Performance Measures, Annemarie N. Hooge
Theses & Dissertations
This study, framed by decision making, program theory, and performance measurement theory, explored the knowledge and experience that enable decision makers to identify organizational performance measures. It used a mixed method, exploratory sequential research design to discover the experience, knowledge, and skills (EKS) senior decision makers felt were important in learning to choose organizational performance measures. From the analyzed interviews, a survey was designed to measure the importance of the EKS characteristics. Qualitative analysis identified 55 life, work, or educational experience; knowledge; or skill characteristics and 23 effective measure characteristics. Regression analysis and PCA were used to extract 6 components. …
Department Of Information Systems & Supply Chain Management Profile, Raj Soin College Of Business, Wright State University
Department Of Information Systems & Supply Chain Management Profile, Raj Soin College Of Business, Wright State University
ISSCM Annual Reports
A three page profile of the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D
Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D
Department of Educational Administration: Faculty Publications
Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang
An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang
Journal of International Technology and Information Management
This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Table Of Contents Jitim Vol 26 Issue 4, 2017
Table Of Contents Jitim Vol 26 Issue 4, 2017
Journal of International Technology and Information Management
Table of Contents
Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor
Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor
Journal of International Technology and Information Management
The Bureau of Labor Statistics projected the demand for information technology (IT) human resources to increase by 13.26 percent between 2014 and 2024. In this survey research, the IT professionals estimated a growth of 34.16 percent in IT human resources over a period of five years from the year 2016. The goal of this survey study was to try to understand the discrepancy in the estimates for IT human Resources requirements by developing a theory-driven model to evaluate the impact of growth in IT outsourcing/offshoring, cloud-computing, end-users-computing, IT applications, and usage of commercial-off-the-shelf/ERP on the need for IT human resources.
Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Vol. 21, November 17, 2017, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A nineteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Using Comment Moderation To Evaluate And Reply To Your Students, Curtis Izen
Using Comment Moderation To Evaluate And Reply To Your Students, Curtis Izen
Publications and Research
This blog discusses how students create a VoiceThread video comment on how they will incorporate an excel macro into their business.
Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime
Overcoming Barriers To Implementing Electronic Health Records In Rural Primary Care Clinics, Patricia Mason, Roger Mayer, Wen-Wen Chien, Judith P. Monestime
The Qualitative Report
Medicare-eligible physicians at primary care practices (PCP) that did not implement an electronic health record (EHR) system by the end of 2015 face stiff penalties. One year prior to the 2015 deadline, approximately half of all primary clinics have not implemented a basic EHR system. The purpose of this phenomenology study was to explore rural primary care physicians and physician assistants’ experiences regarding overcoming barriers to implementing EHRs. Complex adaptive systems formed the conceptual framework for this study. Data were collected through face-to-face interviews with a purposeful sample of 21 physicians and physician assistants across 2 rural PCPs in the …
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Alberto Coustasse, DrPH, MD, MBA, MPH
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …
The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.
The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.
Dale H Shao
This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender, including …
Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.
Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.
Dale H Shao
The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in …