Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty Publications

Discipline
Institution
Keyword
Publication Year

Articles 1 - 30 of 32

Full-Text Articles in Management Information Systems

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo Sep 2023

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo

Faculty Publications

Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.

Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.

Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …


Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt Aug 2022

Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt

Faculty Publications

Organizations with large facility and infrastructure portfolios have used asset management databases for over ten years to collect and standardize asset condition data. Decision makers use these data to predict asset degradation and expected service life, enabling prioritized maintenance, repair, and renovation actions that reduce asset life-cycle costs and achieve organizational objectives. However, these asset condition forecasts are calculated using standardized, self-correcting distribution models that rely on poorly-fit, continuous functions. This research presents four stepwise asset condition forecast models that utilize historical asset inspection data to improve prediction accuracy: (1) Slope, (2) Weighted Slope, (3) Condition-Intelligent Weighted Slope, and (4) …


Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner Jan 2019

Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner

Faculty Publications

This article provides insights into the current state of developmental testing (DT) and requirements management in Department of Defense information systems employing Agile development. The authors describe the study methodology and provide an overview of Agile development and testing. Insights are described for requirements, detailed planning, test execution, and reporting. This work articulates best practices related to DT and requirements management strategies for programs employing modernized Software Development Life Cycle practices.


Promoting Cross-Functional Team Interactions Within General Business Classes, Christopher J. Mckenna Mar 2018

Promoting Cross-Functional Team Interactions Within General Business Classes, Christopher J. Mckenna

Faculty Publications

This session discusses an attempt to integrate both unitary team and cross-functional team deliverables among general business students designing a complex client solution within an “IT for managers” class.


Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe Jan 2018

Introductory Information Systems Course Redesign: Better Preparing Business Students, Gina Harden, Robert M. Crocker, Kelly Noe

Faculty Publications

Aim/Purpose The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace.

Background The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo.

Methodology This paper presents a …


Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita Jan 2017

Big Data And The Perceived Expectations Gap In Digital Authentication Processes, Thomas Calderon, Colin Onita

Faculty Publications

Perceptions of the security and efficacy of technological innovations significantly affect behavioral intentions and the eventual diffusion of such innovations in organizations and the broader society. This paper uses Twitter as a data source and a big data analysis tool to investigate the public’s perceptions of current authentication methods in financial institutions. This data source has not been used previously in the literature to examine perceptions of authentication methods. We focus on the financial sector because of its high vulnerability, the extensive use of information technology in both products and value chain (i.e., its high business information intensity), and the …


Supply Chain Coordination With Two-Part Tariffs Under Information Asymmetry, Chongqi Wu, Kunpeng Lu, Tianqin Shi Jan 2017

Supply Chain Coordination With Two-Part Tariffs Under Information Asymmetry, Chongqi Wu, Kunpeng Lu, Tianqin Shi

Faculty Publications

Supply chain coordination literature indicates that two-part tariff contracts cannot coordinate a supply chain with a supplier and a retailer under information asymmetry, but can coordinate the channel under full information, while leaving the retailer zero profit. Motivated by the practice of Costco Business Centres, we incorporate customer heterogeneity, near-saturated retail market and asymmetric information into a stylised model. The retailer has the knowledge of customer heterogeneity while the supplier does not. The supplier, on the other hand, designs a menu of two-part tariffs for the retailer to choose from. We have found that two-part tariffs can coordinate the supply …


From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle Dec 2016

From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle

Faculty Publications

Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …


More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle Aug 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle

Faculty Publications

System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance of a primary task (the task that was interrupted), no research has examined the effect of DTI on the interrupting task. This is an important gap because in many …


How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins Feb 2016

How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins

Faculty Publications

Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users' responses to security messages—discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS—cognitive neuroscience applied to information system (IS)—to shed new light …


Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal Jan 2016

Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal

Faculty Publications

Innovation requires inventors to have both "new knowledge" and the ability to combine and configure knowledge (i.e. "combinatory knowledge") and such knowledge may flow through networks. We argue that both combinatory knowledge and new knowledge are accessed through collaboration networks, but that inventors' abilities to access such knowledge depends on its location in the network. Combinatory knowledge transfers from direct contacts, but not easily from indirect contacts. In contrast, new knowledge transfers from both direct and indirect contacts, but is far more likely to be new and useful when it comes from indirect contacts. Exploring knowledge flows in 69,476 patents …


Early To Adopt And Early To Discontinue: The Impact Of Self-Perceived And Actual It-Knowledge On Technology Use Behaviors Of End Users, Rohit Aggarwal, David Kryscynski, Vishal Midha, Harpeet Singh Jan 2015

Early To Adopt And Early To Discontinue: The Impact Of Self-Perceived And Actual It-Knowledge On Technology Use Behaviors Of End Users, Rohit Aggarwal, David Kryscynski, Vishal Midha, Harpeet Singh

Faculty Publications

For organizations to achieve the benefits of new IT systems their users must adopt and then actually use these new systems. Recent models help to articulate the potentially different explanations for why some users will adopt and then continue using new technologies, but these models have not explicitly incorporated IT-knowledge. This is particularly important in contexts where the user base may be non-IT professionals—i.e. the users may vary substantially in their basic IT-knowledge. We draw upon psychology to argue that in situations where there is wide variance in actual IT-knowledge there will often exist U relationship between actual and self-perceived …


Evaluating Venture Technical Competence In Vc Investment Decisions, Rohit Aggarwal, David Kryscynski, Harpeet Singh Jan 2015

Evaluating Venture Technical Competence In Vc Investment Decisions, Rohit Aggarwal, David Kryscynski, Harpeet Singh

Faculty Publications

While much research emphasizes the importance of venture technical-competence for venture success and, therefore, the importance of venture technical-competence in VC investment decisions, we know little about why some VCs may be better than others at assessing the technical-competence of ventures. We gathered unique and proprietary data from 33 VCs and 308 ventures that sought series A funding from those VCs. We show that VC assessment of ventures predicts VC investment, and venture technical-competence predicts subsequent venture failure. This means that VCs that over-assess ventures are more likely to invest in firms that are more likely to fail. We then …


Making Strategic Human Capital Relevant: A Time-Sensitive Opportunity, David Kryscynski, Dave Ulrich Jan 2015

Making Strategic Human Capital Relevant: A Time-Sensitive Opportunity, David Kryscynski, Dave Ulrich

Faculty Publications

The domain of strategic human capital is emerging at the intersection of strategy and strategic human resource management. Because it is still in the development phase, its core underlying assumptions have not yet solidified. This presents a unique and time-sensitive opportunity to explore and challenge these core assumptions and, specifically, to evaluate whether these assumptions mesh with the lived experiences of practicing managers. We argue that now is the time for the field to ground itself in practical phenomena so that its insights moving forward can be both academically rigorous and practically relevant. In this paper we illustrate the problems …


The Impact Of Software Testing Governance Choices, Xihui Zhang, Colin Onita, Jasbir Dhaliwal Jan 2014

The Impact Of Software Testing Governance Choices, Xihui Zhang, Colin Onita, Jasbir Dhaliwal

Faculty Publications

Software testing is becoming a critical component of software development, especially because of the proliferation of complex, interconnected, and real-time business applications. As a result, information technology (IT) managers are struggling with pragmatic governance mechanisms for integrating testing with development.Governance issues pertaining to how software testing is organized at strategic, tactical, and operational levels,however, have not received adequate attention in the literature. This study explores the impact of three specificgovernance mechanisms, including the existence of a distinct corporate testing unit, developers and testersreporting to different executives, and the existence of one-to-one matching between developers and testers,on the organizational integration of …


Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle Jan 2014

Using Measures Of Risk Perception To Predict Information Security Behavior: Insights From Electroencephalography (Eeg), Anthony Vance, Bonnie Anderson, C. Brock Kirwan, David Eargle

Faculty Publications

Users' perceptions of risks have important implications for information security, as the actions of individual users can compromise entire systems. Therefore, there is a critical need to understand how users perceive and respond to information security risks. Previous research on perceptions of information security risk has chiefly relied on self-reported measures. Although these studies are valuable, risk perceptions are often associated with feelings—such as fear or doubt—that are difficult to measure accurately using survey instruments. Additionally, it is unclear how these self-reported measures map to actual security behavior. This paper contributes by demonstrating that risk-taking behavior is effectively predicted using …


Rethinking Sustained Competitive Advantage From Human Capital, Benjamin Campbell, Russell Coff, David Kryscynski Jan 2012

Rethinking Sustained Competitive Advantage From Human Capital, Benjamin Campbell, Russell Coff, David Kryscynski

Faculty Publications

The strategy literature often emphasizes firm-specific human capital as a source of competitive advantage based on the assumption that it constrains employee mobility. This paper first identifies three boundary conditions that limit the applicability of this logic. It then offers a more comprehensive framework of human capital-based advantage that explores both demand- and supply-side mobility constraints. The critical insight is that these mobility constraints have more explanatory power than the firm-specificity of human capital.


Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang Dec 2011

Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang

Faculty Publications

Just as business-IT alignment has received significant focus as a strategic concern in the IS literature, it is also important to consider internal alignment between the diverse subunits within the IT organization. This study investigates alignment between developers and testers in software development to understand alignment within the IT unit. Prior evidence of tension between these sub-groups (and others as well) suggests that all is not necessarily well within the IT organization. Misalignment within the IT unit can certainly make it difficult for the IT unit to add strategic value to the organization. This study is an important initial step …


Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal Jan 2011

Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal

Faculty Publications

Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and …


Drilling For Micro-Foundations Of Human Capital Based Competitive Advantages, Russell Coff, David Kryscynski Jan 2011

Drilling For Micro-Foundations Of Human Capital Based Competitive Advantages, Russell Coff, David Kryscynski

Faculty Publications

From the origins of the Resource Based View, scholars have emphasized the importance of human capital as a source of sustained competitive advantage and recently there has been great interest in gaining a better understanding of the micro-foundations of strategic capabilities. Along these lines, there is little doubt that heterogeneous human capital is often a critical underlying mechanism for capabilities. Here, we explore how individual level phenomena underpin isolating mechanisms that sustain human capital-based advantages but also create management dilemmas that must be resolved in order to create value. The solutions to these challenges cannot be found purely in generic …


A Framework For Aligning Testing And Development, Colin Onita, Jasbir Dhaliwal Jan 2007

A Framework For Aligning Testing And Development, Colin Onita, Jasbir Dhaliwal

Faculty Publications

Strategic alignment between an organization’s business strategy/capabilities and those of its information technology (IT) unit has been researched extensively and has found significant application in industry in the last decade. Given the critical interdependencies between development and testing groups within a corporate IT unit, this paper presents a similar alignment model for ensuring that these two functions work together effectively in meeting corporate IT goals pertaining to building new systems. This development-testing alignment (DTA) model is described and an overarching research framework for investigating its value and application is presented.


Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy Jan 2003

Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy

Faculty Publications

Data mining offers a potentially powerful method for analyzing the large data sets that are typically found in forensic computing (FC) investigations to discover useful and previously unknown patterns within the data. The contribution of this paper is an innovative and rigorous data mining methodology that enables effective search of large volumes of complex data to discover offender profiles. These profiles are based on association rules, which are computationally sound, flexible, easily interpreted, and provide a ready set of data for refinement via predictive models. Methodology incorporates link analysis and creation of predictive models based on association rule input.


Innovate Or Evaporate . . . Business Concept Innovation In The Furniture Industry In The Age Of Information, Steven H. Bullard Jan 2002

Innovate Or Evaporate . . . Business Concept Innovation In The Furniture Industry In The Age Of Information, Steven H. Bullard

Faculty Publications

Introduction The U.S. furniture industry has changed dramatically in recent years. Furniture manufacturers, for example, have recently faced competition from foreign producers that has been particularly intense – resulting in factory closings and job losses in many areas of the country, including the Mid-South. In Mississippi, for example, the number of employees in furniture and fixtures industries dropped by 2,100 (6.8%) in the year 2000 (Center for Policy Research and Planning 2001). Similar job losses have been occurring in Tennessee, Virginia, North Carolina and other important furniture-producing states. Nationwide, employment in furniture and fixtures manufacturing dropped by 40,000 (7.2%) from …


An Adaptive Learning Model Which Accommodates Asymmetric Error Costs And Choice-Based Samples, James V. Hansen, James B. Mcdonald, Rayman D. Meservy Oct 1995

An Adaptive Learning Model Which Accommodates Asymmetric Error Costs And Choice-Based Samples, James V. Hansen, James B. Mcdonald, Rayman D. Meservy

Faculty Publications

This paper introduces an adaptive-learning model, EGB2, which optimizes over a parameter space to fit data to a family of models based on maximum-likelihood criteria. We also show how EGB2 can be modified to handle asymmetric costs of Type I and Type II errors, thereby minimizing misclassification costs. It has been shown that standard methods of computing maximum-likelihood estimators of qualitative-response models are generally inconsistent when applied to sample data with different proportions than found in the universe from which the sample is drawn. We investigate how a choice estimator, based on weighting each observation's contribution to the log-likelihood function, …


Case-Based Reasoning: Application Techniques For Decision Support, James V. Hansen, Rayman D. Meservy, Larry E. Wood Jan 1995

Case-Based Reasoning: Application Techniques For Decision Support, James V. Hansen, Rayman D. Meservy, Larry E. Wood

Faculty Publications

Decision-support systems can be improved by enabling them to use past decisions to assist in making present ones. Reasoning from relevant past cases is appealing because it corresponds to some of the processes an expert uses to solve problems quickly and accurately. All this depends on an effective method of organizing cases for retrieval. This paper investigates the use of inductive networks as a means for case organization and outlines an approach to determining the desired number of cases-or assessing the reliability of a given number. Our method is demonstrated by application to decision making on corporate tax audits.


Learn Audit Selection Rules From Data: A Genetic Algorithms Approach, David P. Greene, Rayman D. Meservy, Stephen F. Smith Jan 1992

Learn Audit Selection Rules From Data: A Genetic Algorithms Approach, David P. Greene, Rayman D. Meservy, Stephen F. Smith

Faculty Publications

The construction of expert systems typically require the availability of expertise that can be modeled. However, there are many important problems where no expertise exists, yet there is a wealth of data indicating results in different situations. Machine learning algorithms attempt to discover rules which capture the regularities that exists in such data.


Case-Based Reasoning And Risk Assessment In Audit Judgment, Eric L. Denna, James V. Hansen, Rayman D. Meservy, Larry E. Wood Sep 1991

Case-Based Reasoning And Risk Assessment In Audit Judgment, Eric L. Denna, James V. Hansen, Rayman D. Meservy, Larry E. Wood

Faculty Publications

The purpose of this paper is to describe the results of an effort to utilize Case Based Reasoning (CBR) to model a specific audit judgment task. To date most efforts to develop computational models of audit judgment have used strictly rule-based representation methods. Some researchers have recently adopted more robust structures to model the auditor domain knowledge. Although these recent efforts to extend the representation methods appear to be more accurate descriptions of auditor reasoning and memory, they still lack a comprehensive. theory to guide the development of the model. A commonly encountered phenomenon in audit judgment is for an …


Investigating Expertise In Auditing, Paul E. Johnson, Andrew D. Bailey Jr, Rayman D. Meservy Oct 1986

Investigating Expertise In Auditing, Paul E. Johnson, Andrew D. Bailey Jr, Rayman D. Meservy

Faculty Publications

Research on human expertise in auditing contexts is an important area of study. Our objective in this paper is to present an approach to conducting research on human expertise. We begin with some issues of terminology and then propose a strategy for inquiry into the phenomena of expertise. Finally, we attempt to illustrate this strategy with three examples of recently completed work. The examples include: two from the auditing literature that involve the analysis of internal control and a medical diagnosis case which illustrates the "garden path" problem that is of concern in any decision making context, including auditing.


Auditing, Artificial Intelligence And Expert Systems, Andrew D. Bailey, Rayman D. Meservy, Gordon L. Duke, Paul E. Johnson, William Thompson Jan 1986

Auditing, Artificial Intelligence And Expert Systems, Andrew D. Bailey, Rayman D. Meservy, Gordon L. Duke, Paul E. Johnson, William Thompson

Faculty Publications

This paper will provide the reader with an introduction to the field of financial auditing and the applicability of Decision Support Systems (DSS), Artificial Intelligence (AI), and Expert Systems (ES) to that field of endeavor. The paper will also discuss a continuing research project concerning the application of DSS/AI/ES techniques to the evaluation of internal accounting controls. The reader will find that the evaluation of internal accounting controls is a critical step in every financial audit and that it is an area in which the auditor exhibits substantial expertise. It is thus an area of work particularly suited to the …


Internal Control Evaluation: A Computational Model Of The Review Process, Rayman D. Meservy, Andrew D. Bailey Jr, Paul E. Johnson Jan 1986

Internal Control Evaluation: A Computational Model Of The Review Process, Rayman D. Meservy, Andrew D. Bailey Jr, Paul E. Johnson

Faculty Publications

This study investigated the strategies by which experienced auditors evaluate systems of internal accounting controls. The research method included: (1) observations, using concurrent protocols, of a small sample of practicing auditors performing the internal control evaluation task; (2) extensive interviews with one of the practicing auditors; (3) formalization of auditor processes as a computational model; and (4) validation of the model. The simulation model was Im· plemented as an expert system and tuned to one auditor. The model output consists of a trace of the model processing including: (1) rec• ommendatlons for specific controls to be compliance tested; and (2) …