Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2018

Discipline
Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 211

Full-Text Articles in Management Information Systems

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America …


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards Oct 2018

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address this …


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson Oct 2018

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best quality …


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …


Car Hacking: Can It Be That Simple?, Bryson Payne Oct 2018

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full …


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy Oct 2018

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the …


Digital Identity, Philip Andreae Oct 2018

Digital Identity, Philip Andreae

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger Oct 2018

Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Six Things I Wish New Employees Knew, Brian Albertson Oct 2018

Six Things I Wish New Employees Knew, Brian Albertson

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Networks Still Matter, Tim O'Neill Oct 2018

Why Networks Still Matter, Tim O'Neill

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Beyond The Classroom - What Students Need To Know, Will Alexander Oct 2018

Beyond The Classroom - What Students Need To Know, Will Alexander

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Isscm Alumni Newsletter, October 12, 2018, Raj Soin College Of Business, Wright State University Oct 2018

Isscm Alumni Newsletter, October 12, 2018, Raj Soin College Of Business, Wright State University

ISSCM Newsletters

A nine page alumni newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui Oct 2018

Utilization Of Information Technology As Instructional Support In Higher Education – A Case Study, Linda C. Gordon, Erin Gratz, David Kung, Leeshawn Moore, Shelley G. Urbizagastegui

Communications of the IIMA

Despite significant increases in the growth of online education, a review of research reveals few studies of faculty perceptions of the use of technology in classrooms in higher education. Research can explore and illuminate how to bridge the gap between faculty perceptions and institutional goals and objectives for online programs. The study at hand presents the views of full-time and adjunct faculty across the colleges, both on- and off-campus, and the online community, at the University of La Verne, a private Tier II doctoral degree-granting institution located in Southern California.


Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim Oct 2018

Factors Affecting Online Streaming Subscriptions, C. Christopher Lee, Pankaj Nagpal, Sinead G. Ruane, Hyoun Sook Lim

Communications of the IIMA

As digital media continues to expand, competition between cable television and online streaming services increases. Acquiring customers today takes more than just advertising; it requires tailoring business objectives to the needs and wants of consumers. Numerous studies have examined the connection between the adoption of cable and online media, and key variables such as cost, ease of use, and social trends. In this study, we explore a number of factors which consumers consider when choosing cable television and online streaming options. Sample data was collected through a survey questionnaire at a large public university. Multivariate regression models were developed to …


Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida Oct 2018

Analysis Of Stock Price Movement Following Financial News Article Release, Robert P. Schumaker, Nick Maida

Communications of the IIMA

What effect does a financial news article have on stock price? To answer this question we investigate stock price movements within the minutes following financial news releases, broken down by media outlet, time of release and article sentiment. Our data shown a Sharpe ratio (a measure for calculating risk-adjusted return) of 1.18 versus a random dataset of ‑0.06, indicating significant price movement immediately following article release. Second, we found that articles released through WSJ, Reuters – UK Focus, NYT and FT all experienced significant positive returns, whereas articles in Barrons, MarketWatch, Forbes and Bloomberg experienced significant negative returns. Third, we …


What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard Oct 2018

What's Yours Is Mine: Trust In Collaborative Consumption, Kiku Jones, Lori N. K. Leonard

Communications of the IIMA

Consumers are expanding the types of goods they are exchanging in consumer-to-consumer e-commerce. There appears to be a subset called collaborative consumption. Collaborative consumption is a dynamic concept given that an individual must develop mechanisms to trust others with transporting, sharing, and consuming goods/services. This study develops a trust model for collaborative consumption with three expected influences -- natural propensity to trust (NPT), others’ trust of buyer/seller (OTBS), and objective trust (perceived website quality (PWSQ) and third party recognition (TPR)) -- on an individual’s trust in collaborative consumption. Regression analysis is utilized to assess the proposed model. The study finds …


Critical Success Factors For Adopting Telemedicine Applications, Arjen Maris, Anas Yousfi, Stefan V. Ramshorst, Pascal Ravesteyn Oct 2018

Critical Success Factors For Adopting Telemedicine Applications, Arjen Maris, Anas Yousfi, Stefan V. Ramshorst, Pascal Ravesteyn

Communications of the IIMA

The use of IT within healthcare is increasing, but at a slow rate. In complex projects like the implementation of a telemedicine application within the context of physiotherapy processes where both practitioners and patients use the application, it is still unclear what factors should be taken into consideration for a successful adoption. Therefore, the research question for this study is: ‘what are the critical success factors for adopting a telemedicine application for primary physiotherapists and their patients within the Netherlands?’ A literature study is performed followed by a thematic analysis to determine the factors that are relevant for adoption of …


User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower Sep 2018

User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower

Dinesh Mirchandani

Given the large time and fitiancial commitment that an ERP project requires and the potential benefits it can offer if successfidly implemented, it is important to understand the factors that facilitate and inhibit the success ofEP,P implementation. By means of a case study of a global energy company, we first examine the factors that facilitate and inhibit the success of their ERP implementation. We draw on the theory of business process change when analyzing the implementation process. Next, we examine the perceptions non-management professional users of the ERP system (who were not members of the ERP implementation team) have of …


Minutes & Seconds: The Scientists, Patrick Aievoli Sep 2018

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books Collection

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an interesting …


Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona Sep 2018

Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona

The African Journal of Information Systems

Educators’ digital fluency has been noted as one of the most important skill required for effective curriculum delivery in connected classrooms. Research and anecdotal evidence show that even though many Western Cape classrooms have internet connectivity, many of the educators are unable to take advantage of the connectivity for teaching and learning. Hence, this paper focuses on the educators’ digital fluency as a necessary competence for effective curriculum delivery in connected classrooms. The study was done qualitatively. Randomly selected educators from public schools participated in the one-on-one and focus group interviews. Results show that most educators perceive their digital fluency …


Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof. Sep 2018

Understanding The Kenya Open Data Initiative Trajectory Based On Callon’S Moments Of Translation, Paul Wando Mungai Dr, Jean-Paul Van Belle Prof.

The African Journal of Information Systems

This study seeks to understand the existing interactions between actors of the Kenya Open Data Initiative (KODI), and how the actors’ interests are aligning to achieve openness and transparency of government operations. This study is based on the Callon’s moments of translation framework, which helps in describing the interaction between initiators of a network and other involved actors with the aim of aligning their diverse interests in order to achieve a common goal. KODI comprised of a diverse group of stakeholders from government, private sector, inter-governmental organisation, and civil society. KODI has faced various challenges since its inception in 2011, …


Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe Sep 2018

Developing And Validating Measurement Items For A Multi-Dimensional Social Network Site Usage Construct, Nugi Nkwe

The African Journal of Information Systems

SNS platforms are providing simultaneously for hedonic and utilitarian type uses. However, extant research continues to model the SNS usage construct as a simplistic unidimensional construct that fails to adequately reflect the multi-dimensional nature of SNS usage in workplace contexts. This paper contributes by presenting results of a multi-phase process used to develop and validate measures of the deep structure SNS usage construct from both hedonic and utilitarian perspectives. Psychometric tests were conducted using 124 usable responses, and the results show that deep structure usage is best modelled as a reflective second order construct with three first order dimensions reflecting …


Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee Sep 2018

Collaboration Circles: Empowering Job Seekers To Find Work Using Ad-Hoc Collaboration Networks, Lindani Castro Khanyile, Marijke Coetzee

The African Journal of Information Systems

Recent trends combine smart phones with social networking platforms to bring new opportunities that can enable people to collaborate anywhere and at any time. For example, organisations can be given the opportunity to recruit part-time job seekers such as software developers using social media tools. Previously, collaboration was static in nature, but today loosely enabled collaboration needs to support flexible schedules, ad hoc processes and members that may not be known in advance. Furthermore, current crowdsourcing platforms that enable software developers to contribute their skills to projects do not meet the social needs of participants as they collaborate. This paper …


Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner Sep 2018

Awareness And Preparedness Of It Managers To Digital Disruption: A South African Exploratory Case Study, Mark Prevost, Kevin Allan Johnston Prof, Maureen C. Tanner

The African Journal of Information Systems

Digital disruption is breaking down long established business models. In most organisations, IT managers are charged with management of technology-enabled change. It is therefore important that IT managers understand the opportunities and challenges posed by digital disruption to aid the organisation's response. The purpose of this study was to explore what South African IT managers perceive, and what their responses (or planned responses) to digital disruption within the context of a financial services organisation are. The study is interpretive, exploratory and qualitative, drawing from situational awareness theory to ground the participants’ perception of digital disruption. The study draws on Disruptive …


An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu Sep 2018

An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu

The African Journal of Information Systems

Organizations thrive on efficient information management systems as they support activities. Hence, these systems need to be protected from attacks that threaten their existence and use. Although non-technical information security ideas have been espoused by researchers, they have excluded the role of organizational communication. As such, this study explains information security from an organizational communication perspective. Drawing upon a framework of discourse and organizational change, we analyze an empirical case of how information security in an organization is implicated by communicative actions, deep structures, and communication traits. The analysis reveals that (1) prevention of security breaches is achieved by structures …


Reflective Practice Series: Selected Instructional Models Using Synchronous Video Conferencing Software, Martin W. Sivula Sep 2018

Reflective Practice Series: Selected Instructional Models Using Synchronous Video Conferencing Software, Martin W. Sivula

MBA Faculty Conference Papers & Journal Articles

With the vast array of resources available to instructors, one would think that instruction and teaching would yield success for all learners. Now, well into the 21st century has much changed in the classroom? Certainly, movable desks and chairs, advanced audio and visual equipment, and a plethora of all types of technologies which might be able to enhance training and education. Over the last several decades research on individualized instruction, cognitive science, educational psychology, and multimedia instruction (to name a few) have permeated the literature on instruction. With all the research and the vast array of studies on improving …


A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman Sep 2018

A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud …


Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei Aug 2018

Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei

Library Philosophy and Practice (e-journal)

Information and Communication Technology (ICT) has become a force that has changed many aspects of the way we live and every aspect of human endeavor such as education, medicine, business, law and engineering. Education is a socially oriented activity and quality education has traditionally been associated with teachers having high degrees of personal and face-to-face contact with students. But with the world moving rapidly into digital media and information, the role of ICT in education is becoming more and more important. However, indicators on technology uptake and use in education in the secondary schools in Ghana are missing and most …