Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Accounting (8)
- Education (2)
- Engineering (2)
- Higher Education (2)
- Physical Sciences and Mathematics (2)
-
- Applied Statistics (1)
- Business Administration, Management, and Operations (1)
- Business and Corporate Communications (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Computer Sciences (1)
- Curriculum and Instruction (1)
- Educational Methods (1)
- Forest Sciences (1)
- Life Sciences (1)
- Marketing (1)
- Operations and Supply Chain Management (1)
- Organizational Behavior and Theory (1)
- Other Forestry and Forest Sciences (1)
- Risk Analysis (1)
- Software Engineering (1)
- Statistics and Probability (1)
- Technology and Innovation (1)
- Institution
- Keyword
-
- Auditing (4)
- NeuroIS (4)
- Software development (3)
- Competitive advantage (2)
- Dual-task interference (2)
-
- Habituation (2)
- Human capital (2)
- Information security behavior (2)
- #afcec (1)
- Adaptive learning model (1)
- Adoption (1)
- Adverse selection (1)
- Alignment within the IT unit (1)
- Amazon Mechanical Turk (1)
- Artificial intelligence (1)
- Asset management (1)
- Association rules (1)
- Asymmetric error (1)
- Audit judgment (1)
- Audit selection rules (1)
- Auditing literature (1)
- Auditing strategies (1)
- Authentication (1)
- Automated testing (1)
- Behavioral information systems security (1)
- Big data (1)
- Business communication (1)
- Business education (1)
- CRM (1)
- Case study (1)
Articles 1 - 30 of 32
Full-Text Articles in Management Information Systems
Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo
Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo
Faculty Publications
Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.
Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.
Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …
Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt
Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt
Faculty Publications
Organizations with large facility and infrastructure portfolios have used asset management databases for over ten years to collect and standardize asset condition data. Decision makers use these data to predict asset degradation and expected service life, enabling prioritized maintenance, repair, and renovation actions that reduce asset life-cycle costs and achieve organizational objectives. However, these asset condition forecasts are calculated using standardized, self-correcting distribution models that rely on poorly-fit, continuous functions. This research presents four stepwise asset condition forecast models that utilize historical asset inspection data to improve prediction accuracy: (1) Slope, (2) Weighted Slope, (3) Condition-Intelligent Weighted Slope, and (4) …
Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner
Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner
Faculty Publications
This article provides insights into the current state of developmental testing (DT) and requirements management in Department of Defense information systems employing Agile development. The authors describe the study methodology and provide an overview of Agile development and testing. Insights are described for requirements, detailed planning, test execution, and reporting. This work articulates best practices related to DT and requirements management strategies for programs employing modernized Software Development Life Cycle practices.
Promoting Cross-Functional Team Interactions Within General Business Classes, Christopher J. Mckenna
Promoting Cross-Functional Team Interactions Within General Business Classes, Christopher J. Mckenna
Faculty Publications
This session discusses an attempt to integrate both unitary team and cross-functional team deliverables among general business students designing a complex client solution within an “IT for managers” class.
Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe
Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe
Faculty Publications
Aim/Purpose The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace.
Background The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo.
Methodology This paper presents a …
Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita
Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita
Faculty Publications
Perceptions of the security and efficacy of technological innovations significantly affect behavioral intentions and the eventual diffusion of such innovations in organizations and the broader society. This paper uses Twitter as a data source and a big data analysis tool to investigate the public’s perceptions of current authentication methods in financial institutions. This data source has not been used previously in the literature to examine perceptions of authentication methods. We focus on the financial sector because of its high vulnerability, the extensive use of information technology in both products and value chain (i.e., its high business information intensity), and the …
Supply Chain Coordination With Two-Part Tariffs Under Information Asymmetry, Chongqi Wu, Kunpeng Lu, Tianqin Shi
Supply Chain Coordination With Two-Part Tariffs Under Information Asymmetry, Chongqi Wu, Kunpeng Lu, Tianqin Shi
Faculty Publications
Supply chain coordination literature indicates that two-part tariff contracts cannot coordinate a supply chain with a supplier and a retailer under information asymmetry, but can coordinate the channel under full information, while leaving the retailer zero profit. Motivated by the practice of Costco Business Centres, we incorporate customer heterogeneity, near-saturated retail market and asymmetric information into a stylised model. The retailer has the knowledge of customer heterogeneity while the supplier does not. The supplier, on the other hand, designs a menu of two-part tariffs for the retailer to choose from. We have found that two-part tariffs can coordinate the supply …
From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle
From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle
Faculty Publications
Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle
Faculty Publications
System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance of a primary task (the task that was interrupted), no research has examined the effect of DTI on the interrupting task. This is an important gap because in many …
How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins
How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins
Faculty Publications
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users' responses to security messages—discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS—cognitive neuroscience applied to information system (IS)—to shed new light …
Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal
Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal
Faculty Publications
Innovation requires inventors to have both "new knowledge" and the ability to combine and configure knowledge (i.e. "combinatory knowledge") and such knowledge may flow through networks. We argue that both combinatory knowledge and new knowledge are accessed through collaboration networks, but that inventors' abilities to access such knowledge depends on its location in the network. Combinatory knowledge transfers from direct contacts, but not easily from indirect contacts. In contrast, new knowledge transfers from both direct and indirect contacts, but is far more likely to be new and useful when it comes from indirect contacts. Exploring knowledge flows in 69,476 patents …
Early To Adopt And Early To Discontinue: The Impact Of Self-Perceived And Actual It-Knowledge On Technology Use Behaviors Of End Users, Rohit Aggarwal, David Kryscynski, Vishal Midha, Harpeet Singh
Early To Adopt And Early To Discontinue: The Impact Of Self-Perceived And Actual It-Knowledge On Technology Use Behaviors Of End Users, Rohit Aggarwal, David Kryscynski, Vishal Midha, Harpeet Singh
Faculty Publications
For organizations to achieve the benefits of new IT systems their users must adopt and then actually use these new systems. Recent models help to articulate the potentially different explanations for why some users will adopt and then continue using new technologies, but these models have not explicitly incorporated IT-knowledge. This is particularly important in contexts where the user base may be non-IT professionals—i.e. the users may vary substantially in their basic IT-knowledge. We draw upon psychology to argue that in situations where there is wide variance in actual IT-knowledge there will often exist U relationship between actual and self-perceived …
Evaluating Venture Technical Competence In Vc Investment Decisions, Rohit Aggarwal, David Kryscynski, Harpeet Singh
Evaluating Venture Technical Competence In Vc Investment Decisions, Rohit Aggarwal, David Kryscynski, Harpeet Singh
Faculty Publications
While much research emphasizes the importance of venture technical-competence for venture success and, therefore, the importance of venture technical-competence in VC investment decisions, we know little about why some VCs may be better than others at assessing the technical-competence of ventures. We gathered unique and proprietary data from 33 VCs and 308 ventures that sought series A funding from those VCs. We show that VC assessment of ventures predicts VC investment, and venture technical-competence predicts subsequent venture failure. This means that VCs that over-assess ventures are more likely to invest in firms that are more likely to fail. We then …
Making Strategic Human Capital Relevant: A Time-Sensitive Opportunity, David Kryscynski, Dave Ulrich
Making Strategic Human Capital Relevant: A Time-Sensitive Opportunity, David Kryscynski, Dave Ulrich
Faculty Publications
The domain of strategic human capital is emerging at the intersection of strategy and strategic human resource management. Because it is still in the development phase, its core underlying assumptions have not yet solidified. This presents a unique and time-sensitive opportunity to explore and challenge these core assumptions and, specifically, to evaluate whether these assumptions mesh with the lived experiences of practicing managers. We argue that now is the time for the field to ground itself in practical phenomena so that its insights moving forward can be both academically rigorous and practically relevant. In this paper we illustrate the problems …
The Impact Of Software Testing Governance Choices, Xihui Zhang, Colin Onita, Jasbir Dhaliwal
The Impact Of Software Testing Governance Choices, Xihui Zhang, Colin Onita, Jasbir Dhaliwal
Faculty Publications
Software testing is becoming a critical component of software development, especially because of the proliferation of complex, interconnected, and real-time business applications. As a result, information technology (IT) managers are struggling with pragmatic governance mechanisms for integrating testing with development.Governance issues pertaining to how software testing is organized at strategic, tactical, and operational levels,however, have not received adequate attention in the literature. This study explores the impact of three specificgovernance mechanisms, including the existence of a distinct corporate testing unit, developers and testersreporting to different executives, and the existence of one-to-one matching between developers and testers,on the organizational integration of …
Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle
Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle
Faculty Publications
Users' perceptions of risks have important implications for information security, as the actions of individual users can compromise entire systems. Therefore, there is a critical need to understand how users perceive and respond to information security risks. Previous research on perceptions of information security risk has chiefly relied on self-reported measures. Although these studies are valuable, risk perceptions are often associated with feelings—such as fear or doubt—that are difficult to measure accurately using survey instruments. Additionally, it is unclear how these self-reported measures map to actual security behavior. This paper contributes by demonstrating that risk-taking behavior is effectively predicted using …
Rethinking Sustained Competitive Advantage From Human Capital, Benjamin Campbell, Russell Coff, David Kryscynski
Rethinking Sustained Competitive Advantage From Human Capital, Benjamin Campbell, Russell Coff, David Kryscynski
Faculty Publications
The strategy literature often emphasizes firm-specific human capital as a source of competitive advantage based on the assumption that it constrains employee mobility. This paper first identifies three boundary conditions that limit the applicability of this logic. It then offers a more comprehensive framework of human capital-based advantage that explores both demand- and supply-side mobility constraints. The critical insight is that these mobility constraints have more explanatory power than the firm-specificity of human capital.
Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang
Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang
Faculty Publications
Just as business-IT alignment has received significant focus as a strategic concern in the IS literature, it is also important to consider internal alignment between the diverse subunits within the IT organization. This study investigates alignment between developers and testers in software development to understand alignment within the IT unit. Prior evidence of tension between these sub-groups (and others as well) suggests that all is not necessarily well within the IT organization. Misalignment within the IT unit can certainly make it difficult for the IT unit to add strategic value to the organization. This study is an important initial step …
Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal
Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal
Faculty Publications
Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and …
Drilling For Micro-Foundations Of Human Capital Based Competitive Advantages, Russell Coff, David Kryscynski
Drilling For Micro-Foundations Of Human Capital Based Competitive Advantages, Russell Coff, David Kryscynski
Faculty Publications
From the origins of the Resource Based View, scholars have emphasized the importance of human capital as a source of sustained competitive advantage and recently there has been great interest in gaining a better understanding of the micro-foundations of strategic capabilities. Along these lines, there is little doubt that heterogeneous human capital is often a critical underlying mechanism for capabilities. Here, we explore how individual level phenomena underpin isolating mechanisms that sustain human capital-based advantages but also create management dilemmas that must be resolved in order to create value. The solutions to these challenges cannot be found purely in generic …
A Framework For Aligning Testing And Development, Colin Onita, Jasbir Dhaliwal
A Framework For Aligning Testing And Development, Colin Onita, Jasbir Dhaliwal
Faculty Publications
Strategic alignment between an organization’s business strategy/capabilities and those of its information technology (IT) unit has been researched extensively and has found significant application in industry in the last decade. Given the critical interdependencies between development and testing groups within a corporate IT unit, this paper presents a similar alignment model for ensuring that these two functions work together effectively in meeting corporate IT goals pertaining to building new systems. This development-testing alignment (DTA) model is described and an overarching research framework for investigating its value and application is presented.
Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy
Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy
Faculty Publications
Data mining offers a potentially powerful method for analyzing the large data sets that are typically found in forensic computing (FC) investigations to discover useful and previously unknown patterns within the data. The contribution of this paper is an innovative and rigorous data mining methodology that enables effective search of large volumes of complex data to discover offender profiles. These profiles are based on association rules, which are computationally sound, flexible, easily interpreted, and provide a ready set of data for refinement via predictive models. Methodology incorporates link analysis and creation of predictive models based on association rule input.
Innovate Or Evaporate . . . Business Concept Innovation In The Furniture Industry In The Age Of Information, Steven H. Bullard
Innovate Or Evaporate . . . Business Concept Innovation In The Furniture Industry In The Age Of Information, Steven H. Bullard
Faculty Publications
Introduction The U.S. furniture industry has changed dramatically in recent years. Furniture manufacturers, for example, have recently faced competition from foreign producers that has been particularly intense – resulting in factory closings and job losses in many areas of the country, including the Mid-South. In Mississippi, for example, the number of employees in furniture and fixtures industries dropped by 2,100 (6.8%) in the year 2000 (Center for Policy Research and Planning 2001). Similar job losses have been occurring in Tennessee, Virginia, North Carolina and other important furniture-producing states. Nationwide, employment in furniture and fixtures manufacturing dropped by 40,000 (7.2%) from …
An Adaptive Learning Model Which Accommodates Asymmetric Error Costs And Choice-Based Samples, James V. Hansen, James B. Mcdonald, Rayman D. Meservy
An Adaptive Learning Model Which Accommodates Asymmetric Error Costs And Choice-Based Samples, James V. Hansen, James B. Mcdonald, Rayman D. Meservy
Faculty Publications
This paper introduces an adaptive-learning model, EGB2, which optimizes over a parameter space to fit data to a family of models based on maximum-likelihood criteria. We also show how EGB2 can be modified to handle asymmetric costs of Type I and Type II errors, thereby minimizing misclassification costs. It has been shown that standard methods of computing maximum-likelihood estimators of qualitative-response models are generally inconsistent when applied to sample data with different proportions than found in the universe from which the sample is drawn. We investigate how a choice estimator, based on weighting each observation's contribution to the log-likelihood function, …
Case-Based Reasoning: Application Techniques For Decision Support, James V. Hansen, Rayman D. Meservy, Larry E. Wood
Case-Based Reasoning: Application Techniques For Decision Support, James V. Hansen, Rayman D. Meservy, Larry E. Wood
Faculty Publications
Decision-support systems can be improved by enabling them to use past decisions to assist in making present ones. Reasoning from relevant past cases is appealing because it corresponds to some of the processes an expert uses to solve problems quickly and accurately. All this depends on an effective method of organizing cases for retrieval. This paper investigates the use of inductive networks as a means for case organization and outlines an approach to determining the desired number of cases-or assessing the reliability of a given number. Our method is demonstrated by application to decision making on corporate tax audits.
Learn Audit Selection Rules From Data: A Genetic Algorithms Approach, David P. Greene, Rayman D. Meservy, Stephen F. Smith
Learn Audit Selection Rules From Data: A Genetic Algorithms Approach, David P. Greene, Rayman D. Meservy, Stephen F. Smith
Faculty Publications
The construction of expert systems typically require the availability of expertise that can be modeled. However, there are many important problems where no expertise exists, yet there is a wealth of data indicating results in different situations. Machine learning algorithms attempt to discover rules which capture the regularities that exists in such data.
Case-Based Reasoning And Risk Assessment In Audit Judgment, Eric L. Denna, James V. Hansen, Rayman D. Meservy, Larry E. Wood
Case-Based Reasoning And Risk Assessment In Audit Judgment, Eric L. Denna, James V. Hansen, Rayman D. Meservy, Larry E. Wood
Faculty Publications
The purpose of this paper is to describe the results of an effort to utilize Case Based Reasoning (CBR) to model a specific audit judgment task. To date most efforts to develop computational models of audit judgment have used strictly rule-based representation methods. Some researchers have recently adopted more robust structures to model the auditor domain knowledge. Although these recent efforts to extend the representation methods appear to be more accurate descriptions of auditor reasoning and memory, they still lack a comprehensive. theory to guide the development of the model. A commonly encountered phenomenon in audit judgment is for an …
Investigating Expertise In Auditing, Paul E. Johnson, Andrew D. Bailey Jr, Rayman D. Meservy
Investigating Expertise In Auditing, Paul E. Johnson, Andrew D. Bailey Jr, Rayman D. Meservy
Faculty Publications
Research on human expertise in auditing contexts is an important area of study. Our objective in this paper is to present an approach to conducting research on human expertise. We begin with some issues of terminology and then propose a strategy for inquiry into the phenomena of expertise. Finally, we attempt to illustrate this strategy with three examples of recently completed work. The examples include: two from the auditing literature that involve the analysis of internal control and a medical diagnosis case which illustrates the "garden path" problem that is of concern in any decision making context, including auditing.
Auditing, Artificial Intelligence And Expert Systems, Andrew D. Bailey, Rayman D. Meservy, Gordon L. Duke, Paul E. Johnson, William Thompson
Auditing, Artificial Intelligence And Expert Systems, Andrew D. Bailey, Rayman D. Meservy, Gordon L. Duke, Paul E. Johnson, William Thompson
Faculty Publications
This paper will provide the reader with an introduction to the field of financial auditing and the applicability of Decision Support Systems (DSS), Artificial Intelligence (AI), and Expert Systems (ES) to that field of endeavor. The paper will also discuss a continuing research project concerning the application of DSS/AI/ES techniques to the evaluation of internal accounting controls. The reader will find that the evaluation of internal accounting controls is a critical step in every financial audit and that it is an area in which the auditor exhibits substantial expertise. It is thus an area of work particularly suited to the …
Internal Control Evaluation: A Computational Model Of The Review Process, Rayman D. Meservy, Andrew D. Bailey Jr, Paul E. Johnson
Internal Control Evaluation: A Computational Model Of The Review Process, Rayman D. Meservy, Andrew D. Bailey Jr, Paul E. Johnson
Faculty Publications
This study investigated the strategies by which experienced auditors evaluate systems of internal accounting controls. The research method included: (1) observations, using concurrent protocols, of a small sample of practicing auditors performing the internal control evaluation task; (2) extensive interviews with one of the practicing auditors; (3) formalization of auditor processes as a computational model; and (4) validation of the model. The simulation model was Im· plemented as an expert system and tuned to one auditor. The model output consists of a trace of the model processing including: (1) rec• ommendatlons for specific controls to be compliance tested; and (2) …