Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Management Information Systems

Three Essays Exploring Diversification Strategies In Family Firms: Evidence From The S&P 1500 On Acquisitions And Exits., Chelsea Sherlock Jan 2021

Three Essays Exploring Diversification Strategies In Family Firms: Evidence From The S&P 1500 On Acquisitions And Exits., Chelsea Sherlock

Electronic Theses and Dissertations

Family firms are not only the most prevalent form of business organization in the world, accounting for roughly 75% of all organizations (La Porta, Lopez-de-Silanes, & Shleifer, 1999; Miller, Steier, & Le Breton-Miller, 2003), they also represent “heterogeneous and complex enterprises” that offer a “challenging array of issues to study” (Sharma, Chrisman, & Gersick, 2012, p. 5). Accordingly, this series of essays explores diversification strategies in family firms by investigating the family specific factors which may influence strategic decision-making. I begin with a review of the diversification literature over the last 20 years. Next, using data from S&P 1500 firms, …


Creating An Internet Of Things Platform For Storing Smart Sensor Data Using Amazon Web Services, Jin Hyeok Noh May 2019

Creating An Internet Of Things Platform For Storing Smart Sensor Data Using Amazon Web Services, Jin Hyeok Noh

Honors Theses

Water is one of the essential resources that we should be aware of conserving, but lawn sprinkler systems in Mississippi have inefficient resource management systems. During my fundamental research, I read an article about IoT (Internet of Things) and how important it will be in the future. Both of these topics inspired prototype research. In order to create the prototype, a Raspberry Pi, breadboard, keyboard, monitor, and cables were used. Using the Raspberry Pi, monitors, and keyboard, the software was developed in order to create a RESTFUL API gateway to connect to AWS (Amazon Web Service). In the AWS console, …


Gradyear: From Ideation Through Product Delivery, Laura A. Salvador May 2019

Gradyear: From Ideation Through Product Delivery, Laura A. Salvador

Honors Theses

This thesis will serve to document the first year of GradYear, from ideation through product delivery. GradYear is a Center for Manufacturing Excellence (CME) Senior Capstone Project; the GradYear team is comprised of five students with academic disciplines ranging across business, accountancy, and engineering. The goal of the team was to design and manufacture a high-quality, classic wooden picture frame for college or university graduates that highlights their graduating class year. Under the direction of Dr. Jack McClurg, Dr. Matthew O’Keefe and factory floor technician Mr. James McPhail, the team designed the GradYear Classic using principles of DFMA and implementing …


Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman Jan 2019

Factors Affecting Perceptions Of Cybersecurity Readiness Among Workgroup It Managers, Thomas A. Chapman

Electronic Theses and Dissertations

The last decade has seen a dramatic increase in the number, frequency, and scope of cyberattacks, both in the United States and abroad. This upward trend necessitates that a significant aspect of any organization’s information systems strategy involves having a strong cybersecurity profile. Inherent in such a posture is the need to have IT managers who are experts in their field and who are willing and able to employ best practices and educate their users. Furthermore, IT managers need to have awareness of the technology landscape in and around their organizations. After many years of cybersecurity research, large corporations have …


Work Engagement: Antecedents And Effects On Student Employee Academic Engagement, Chase V. Moore Jan 2017

Work Engagement: Antecedents And Effects On Student Employee Academic Engagement, Chase V. Moore

Honors Theses

Drawing on the Job Demands-Resources (JD-R) model, this study explores the effect of the resources student employees receive from management and from the nature of their work on their engagement at work and their engagement in academic pursuits. Student workers make up a significant pool of workers in our institutions of higher education and supporting academic achievement of student workers is consistent with our institutions' missions. Accordingly, the purpose of this study is to examine the antecedents (supervisory support, supervisory feedback, person-organization fit, and person-job fit) that affect levels of work engagement of students employed in educationally-situated work environments, and …


How Startups Succeed — A Look At How Architectural Innovation Provides A Competitive Advantage, Pontus V. Andersson Jan 2017

How Startups Succeed — A Look At How Architectural Innovation Provides A Competitive Advantage, Pontus V. Andersson

Honors Theses

The recent rise of high profile startups in the news and the prolific attention given to the entrepreneurial culture during an economic makes understanding how startups work a point of interest for many. The glamorization of shows like Silicon Valley and the growth of online personalities and their followers makes it even more exciting. But why do so many startups fail so drastically and a few reach unfathomable heights and why are household companies so interested in them? This paper addresses one of the underlying themes that drives business today, specifically, architectural innovation, or how companies organize. By following the …


I Got It On Silk Road: An Examination Of Knowledge And Attitudes Towards Tor And The Dark Web, Zachary Mitchell Jan 2016

I Got It On Silk Road: An Examination Of Knowledge And Attitudes Towards Tor And The Dark Web, Zachary Mitchell

Honors Theses

As communication technology has grown, so has the potential for crimes to be committed with the new technology. The United States government has attempted to stay current with the times by introducing legislation to increase federal power to detect and stop these crimes, but some feel that some of these new laws and acts reduce personal freedoms and liberties. Enter Tor and the Dark Web, a set of often misunderstood tools and web-based resources designed to make users' data and behavior on the Internet anonymous. This paper describes the aforementioned laws, how Tor and the Dark Web work, and examines …


An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper Jan 2014

An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper

Electronic Theses and Dissertations

This dissertation explores the perceived safety of free software and its relationship with the intention to use this technology in a business setting. The newly created construct of perceived safety is developed out of the theory of planned behavior. It is researched, scrutinized, and refined according to academic guidelines and two different environmental settings. The constructs that impact perceived safety and its relationship with intention to use consist of technology perceived risk, technology trusting beliefs, expected financial utility, and perceived adverse impact on professional reputation. Each construct consists of multiple operationalized elements. To explore this empirically, beneficial and risk measurements …


Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey Jan 2014

Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey

Electronic Theses and Dissertations

Information security professionals have a unique challenge in today's connected world. They are charged with protecting digital assets from individuals, groups, and even foreign governments with little or no restrictions limiting their behavior. To be successful, security experts must have the mindset and skills of those who seek to harm their organization, but most are not alloto retaliate, in kind. Instead, they must use these skills only to predict and to prevent future attacks; thus using their technical prowess for good and not for evil. In a survey of 330 information security professionals, the data reveals six mindsets of security …


Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay Jan 2014

Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay

Electronic Theses and Dissertations

Objectives: The objectives of the study were 1) to conceptualize Initial Online Consumer Trust (IOCT) and 2) to examine the effects of website utility, electronic word-of-mouth, consumer past experiences with similar websites, and third-party service providers' reputation on the development of IOCT. Methods: To explore the research objectives, the study deployed a 2X3 experimental design that involved six experimental groups. Subjects were recruited from the undergraduate student pool at the University of Mississippi, School of Business. The vignettes used in the study was hypothetical book selling websites, one with the presence of third-party service providers and the other without any …


The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim Jan 2012

The Impact Of The User-It Artifact Interaction On Technology Implementation And Value: Mobile Social Networking And Mobile Social Capital, Donghyun Kim

Electronic Theses and Dissertations

Despite investment and cutting-edge features, the majority of new mobile phone subscribers have adopted low-cost handsets instead of the latest mobile devices (Karjaluoto et al., 2005). According to the U.S. Census Bureau report, only 37% of cell phone users selected a smartphone in 2007. The Census Bureau forecasted the figure would increase by less than 10% in 2008. However, only 24% of cell phone users owned a smartphone in 2010, 27 % in 2011 and 30% in 2012. Therefore, the purpose of this study is to propose a conceptual model of the impact of mobile social capital on mobile networks …


Extraction Of Ontology And Semantic Web Information From Online Business Reports, Lakisha L. Simmons Jan 2011

Extraction Of Ontology And Semantic Web Information From Online Business Reports, Lakisha L. Simmons

Electronic Theses and Dissertations

CAINES, Content Analysis and INformation Extraction System, employs an information extraction (IE) methodology to extract unstructured text from the Web. It can create an ontology and a Semantic Web. This research is different from traditional IE systems in that CAINES examines the syntactic and semantic relationships within unstructured text of online business reports. Using CAINES provides more relevant results than manual searching or standard keyword searching. Over most extraction systems, CAINES extensively uses information extraction from natural language, Key Words in Context (KWIC), and semantic analysis. A total of 21 online business reports, averaging about 100 pages long, were used …