Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year

Articles 1 - 30 of 117

Full-Text Articles in Management Information Systems

Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil May 2024

Using Hybrid Machine Learning Models For Stock Price Forecasting And Trading., Ahmed Khalil

Theses and Dissertations

Trading stocks of publicly traded companies in stock markets is a challenging topic since investors are researching what tools can be used to maximize their profits while minimizing risks, which encouraged all researchers to research and test different methods to reach such a goal. As a result, the use of both fundamental analysis and technical analysis started to evolve to support traders in buying and selling stocks. Recently, the focus increased on using Machine learning models to predict stock prices and algorithmic trading as currently there is a huge amount of data that can be processed and used to forecast …


Essays On The Influence Of Review And Reviewer Attributes On Online Review Helpfulness: Attribution Theory Perspective, Rakesh Guduru Aug 2023

Essays On The Influence Of Review And Reviewer Attributes On Online Review Helpfulness: Attribution Theory Perspective, Rakesh Guduru

Theses and Dissertations

With the emergence of digital technology and the increasing availability of information on the internet, customers rely heavily on online reviews to inform their purchasing decisions. However, not all online reviews are helpful, and the factors that contribute to their helpfulness are complex and multifaceted. This dissertation addresses this gap in the literature by examining the antecedents that determine online review helpfulness using attribution theory. The dissertation consists of three essays. The first essay examines the impact of authenticity (review attribute) on review helpfulness, showing that the expressive authenticity of a review enhances its helpfulness. The second essay investigates the …


Essays On Behavioral Decision Making In Crowdfunding Environments, Bright Frimpong May 2023

Essays On Behavioral Decision Making In Crowdfunding Environments, Bright Frimpong

Theses and Dissertations

Crowdfunding has revolutionized the world of financing. From entrepreneurs to financially excluded individuals seeking funding for essential projects, crowdfunding provides an expansive platform for project founders to raise needed capital for pending or ongoing projects. In addition to raising capital, founders also use crowdfunding to test market an idea, gain exposure for future funding, gain validation, and build trusting relationships with backers (Zhou et al., 2018). However, the success of crowdfunding is dependent on crowd participation- backer support and funding. The importance of crowd participation in crowdfunding is not limited to project funding, but also building public involvement and support …


Themes And Participants’ Role In Online Health Discussion: Evidence From Reddit, Massara Alazazi May 2023

Themes And Participants’ Role In Online Health Discussion: Evidence From Reddit, Massara Alazazi

Theses and Dissertations

Health-related topics are discussed widely on different social networking sites. These discussions and their related aspects can reveal significant insights and patterns that are worth studying and understanding. In this dissertation, we explore the patterns of mandatory and voluntary vaccine online discussions including the topics discussed, the words correlated with each of them, and the sentiment expressed. Moreover, we explore the role opinion leaders play in the health discussion and their impact on participation in a particular discussion. Opinion leaders are determined, and their impact on discussion participation is differentiated based on their different characteristics such as their connections and …


Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge Dec 2022

Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge

Theses and Dissertations

Inland recreational fisheries has grown philosophically and scientifically to consider economic and sociopolitical aspects (non-biological) in addition to the biological. However, integrating biological and non-biological aspects of inland fisheries has been challenging. Thus, an opportunity exists to develop approaches and tools which operationalize planning and decision-making processes which include biological and non-biological aspects of a fishery. This dissertation expands the idea that a core set of goals and objectives is shared among and within inland fisheries agencies; that many routine operations of inland fisheries managers can be regimented or standardized; and the novel concept that current information and operations can …


A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda Sep 2022

A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda

Theses and Dissertations

The Department of Defense (DoD) has encouraged the transition to digital engineering, yet there are limited guides for how to transition and there is limited data to show where an organization like a program office can reap the most benefit from the transition. To identify areas where potential benefits may be realized, this thesis compares two Requests for Information (RFIs), one document-based and one model-based, from generation to response. A survey was developed and administered to 7 members of a single program office to grade the RFI responses. The survey was based on the 43 benefit categories identified in the …


Essays On Individuals’ Information Assessment, Information Disclosure, Participation, And Response Behaviors In Online Health Communities, Joseph Ade Manga Jul 2022

Essays On Individuals’ Information Assessment, Information Disclosure, Participation, And Response Behaviors In Online Health Communities, Joseph Ade Manga

Theses and Dissertations

The emergence of online health communities (OHCs) has enabled the use of information technologies to address some social and health needs including but not limited to emotional, social, and health-related issues. This information age has encouraged user generated (UG) content, which facilitates both peer-to-peer and business-to-peer interconnections. This rich and active information epoch (i.e., OHCs) is distinct in that value is generated when peers or participants—who may be content generators and/or content consumers—interact together by exchanging information and receiving supports aimed at addressing their specific needs; and this is made possible through the online platforms or support groups acting as …


The Critical Role Of Ethical Leadership In Employees’ Information Security Behaviors: A Two-Study Approach, Botong Xue May 2022

The Critical Role Of Ethical Leadership In Employees’ Information Security Behaviors: A Two-Study Approach, Botong Xue

Theses and Dissertations

Employees’ information security policy (ISP) related behaviors have been paid attention by previous studies in the past decades. Among different factors that are influential on employees’ ISP behaviors, different leadership styles have been tested under the information security context; however, as one leadership style that is highly related to employees’ positive organization behaviors, the role of ethical leadership has been largely overlooked under the information security context. In addition, most research in the past decades overly focused on employees’ performance on ISP in-role behaviors, including ISP compliance and violation behaviors, where extra-role behaviors – security behaviors that are beneficial to …


The Role Of Personal Disposition And Preference Matching In Information Security Message Persuasiveness, Feng Xu May 2022

The Role Of Personal Disposition And Preference Matching In Information Security Message Persuasiveness, Feng Xu

Theses and Dissertations

How to design effective persuasive information security messages to motivate individuals’ engagement in recommended protective security behaviors has become a top priority in the information security field. Although fear appeals have been shown to be an effective means to influence individuals’ security-related protective behaviors, recent information security research has called for a deeper understanding of recipients’ information processing of messages to design effective fear appeals. Previous IS security research has explored two individuals’ information processing routes of security messages, the central route, and the peripheral route, and has investigated the impacts of central variables, perceived argument quality, and peripheral variables, …


The Dark Side Of Artificial Intelligence: Understanding The Role Of Perceived Algorithm Unfairness On Ride-Hailing Driver Discontinuance, Zhenya Tang May 2022

The Dark Side Of Artificial Intelligence: Understanding The Role Of Perceived Algorithm Unfairness On Ride-Hailing Driver Discontinuance, Zhenya Tang

Theses and Dissertations

Ride-hailing platforms (RHP) are sharing economy platforms that connect passengers who need to order a private ride or to share a vehicle with drivers who want to share a ride. However, after rapid growth, major RHPs (e.g., Uber, Lyft, and Didi) have begun to face severe driver shortages. Attracting and maintaining a large driver base is critical to the survival and success of any RHP no matter its size. While practitioners are urging to seek suggestions from academia to prevent driver loss, limited research attention has been paid to RHP drivers’ discontinuance. To fill this gap, this dissertation aims to …


Blockchain Value Creation Logics And Financial Returns, Daniel Narh Treku May 2022

Blockchain Value Creation Logics And Financial Returns, Daniel Narh Treku

Theses and Dissertations

With its complexities and portfolio-nature, the advent of blockchain technology presents several use cases to stakeholders for business value appropriation and financial gains. This 3-essay dissertation focuses on three exemplars and research approaches to understanding the value creation logics of blockchain technology for financial gains. The first essay is a conceptual piece that explores five main affordances of blockchain technology and how these can be actualized and assimilated for business value. Based on the analysis of literature findings, an Affordance-Experimentation-Actualization-Assimilation (AEAA) model is proposed. The model suggests five affordance-to-assimilation value chains and eight value interdependencies that firms can leverage to …


Design And Exploration Of New Models For Security And Privacy-Sensitive Collaboration Systems, Ramandeep Kaur Sandhu Jan 2022

Design And Exploration Of New Models For Security And Privacy-Sensitive Collaboration Systems, Ramandeep Kaur Sandhu

Theses and Dissertations

Collaboration has been an area of interest in many domains including education, research, healthcare supply chain, Internet of things, and music etc. It enhances problem solving through expertise sharing, ideas sharing, learning and resource sharing, and improved decision making.

To address the limitations in the existing literature, this dissertation presents a design science artifact and a conceptual model for collaborative environment. The first artifact is a blockchain based collaborative information exchange system that utilizes blockchain technology and semi-automated ontology mappings to enable secure and interoperable health information exchange among different health care institutions. The conceptual model proposed in this dissertation …


New Product Development System Fit For Innovative Performance, Tad V. Machrowicz Jan 2022

New Product Development System Fit For Innovative Performance, Tad V. Machrowicz

Theses and Dissertations

Innovation is an imperative for long-term health and shareholder returns in firms dependent on product development. Yet, most companies struggle with the tension between creative ideation and implementation. Effectively finding new sources of revenue and improving and profiting from existing products and services reflects a product development ambidexterity challenge. Surveys were collected from 212 development team members representing 31 teams from the transportation, aerospace, and chemical sectors to understand if a new product development (NPD) system’s ambidexterity supported team level innovation performance. When NPD systems are perceived by development team users as ambidextrous structures, their combined ideation and implementation strength …


Digjitalizimi I Bankave Në Kosovë, Rast Studimi Klientët E Dy Bankave Ndërkombëtare Në Republikën E Kosovës, Adonis Bllacaku Aug 2021

Digjitalizimi I Bankave Në Kosovë, Rast Studimi Klientët E Dy Bankave Ndërkombëtare Në Republikën E Kosovës, Adonis Bllacaku

Theses and Dissertations

Duke pasur parasysh faktin që ne jetojmë në shekullin e XXI-të, shekullin e progresit teknologjik dhe të inovacionit. Sot është fakt që zhvillimet teknologjike i kanë dhënë një dimension tjetër mënyrës se si jetojmë, si informohemi, si komunikojmë dhe si e perceptojmë realitetin. Për gjenerata të tëra sot është e vështirë të imagjinohet jeta e përditshme dhe puna profesionale pa një mori pajisjesh elektronike.

Në këtë kontekst, si çdo fushë tjetër, edhe sistemet financiare në mbarë botën kanë qenë subjekt i avancimeve teknologjike e që as sistemi bankar në Kosovë nuk bën përjashtim nga kjo tendencë , është parë e …


Inquiries In Intelligent Information Systems: New Trajectories And Paradigms, Samaa Elnagar Jan 2021

Inquiries In Intelligent Information Systems: New Trajectories And Paradigms, Samaa Elnagar

Theses and Dissertations

Rapid Digital transformation drives organizations to continually revitalize their business models so organizations can excel in such aggressive global competition. Intelligent Information Systems (IIS) have enabled organizations to achieve many strategic and market leverages. Despite the increasing intelligence competencies offered by IIS, they are still limited in many cognitive functions. Elevating the cognitive competencies offered by IIS would impact the organizational strategic positions.

With the advent of Deep Learning (DL), IoT, and Edge Computing, IISs has witnessed a leap in their intelligence competencies. DL has been applied to many business areas and many industries such as real estate and manufacturing. …


Zhvillimi I Sistemit Së Qeverisë Elektronike (E-Qeverisja), Bardh Fetahu Apr 2020

Zhvillimi I Sistemit Së Qeverisë Elektronike (E-Qeverisja), Bardh Fetahu

Theses and Dissertations

Në këtë punim do të trajtohet kuptimi, zhvillimi, analiza dhe vlersimi i qeverisë elektronike (E-Qeverisja). Me zhvillimin e teknologjisë jeta në përgjithësi është përmisuar dukshëm duke gjetur zbatim në shumë fusha, duke i ndihmuar organizatave të ndryshme në lehtësimin e punëve dhe në përshpejtimin e tyre. Teknologjia ka gjetur zbatim shumë të madh dhe shumë të rëndësishëm edhe në fushën e E-Qeverisë, duke e bërë shumë më të lehtë ndërveprimin mes qytetarëve dhe qeverisë së tyre, mes qeverisë dhe agjensioneve tjera qeverisëse, mes qeverisë dhe qytetarëve, mes qeverisë dhe të punsuarëve dhe poashtu mes qeverisë dhe bizneseve. Gjithashtu në këtë …


The Moderating Effect Of Media Naturalness On Motivating Language, James Cox May 2019

The Moderating Effect Of Media Naturalness On Motivating Language, James Cox

Theses and Dissertations

For decades, the research in communication in organizational behavior has focused on the reduction of uncertainty and consequently so has the research of leadership and computer mediated communication (CMC) (Salancik & Pfeffer, 1977; Sullivan, 1988). Because of this, many of the controversial issues and competing theories of CMC that have in good part centered around the topic of media choice in the context of task performance, which is a reflection of this narrow focus of CMC on uncertainty reduction. Therefore in order to study the more whole form of communication in motivation proposed by Sullivan (1988), a CMC theory is …


An Empirical Study About The Impact Of Internet In Smes, Albert Aliu Apr 2019

An Empirical Study About The Impact Of Internet In Smes, Albert Aliu

Theses and Dissertations

The aim of this research was to find out the current trends of usage of new technologies, with a special focus on the impact of the Internet based on chosen variables. The target group of the current research were small to medium size enterprises – SMEs, which are considered as the most-influential entities within a country. This is due to their influence on economy and employment opportunities they offer in every country. The results of this research show a better image about the current technological trends in Kosovo and no other research with identic approach was found out by the …


A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed Jan 2019

A Novel Framework For Social Internet Of Things: Leveraging The Friendships And The Services Exchanged Between Smart Devices, Javad Abed

Theses and Dissertations

As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings.

Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using …


Finpathlight: Framework For An Ontology-Based, Multiagent, Hybrid Recommender System Designed To Increase Consumer Financial Capability, Lawrence Bunnell Jan 2019

Finpathlight: Framework For An Ontology-Based, Multiagent, Hybrid Recommender System Designed To Increase Consumer Financial Capability, Lawrence Bunnell

Theses and Dissertations

This study is a design science research (DSR) project in which a description of the development and evaluation process for several novel technological artifacts will be communicated. Specifically, this study will establish: 1) an ontology of recommender systems issues, 2) an ontology of financial capability goals, and 3) a framework for a Personal Financial Recommender System (PFRS) application designed to improve user financial capability, called FinPathlight. The impetus for the RecSys Issues Ontology is to address a gap in the literature by providing researchers with a comprehensive knowledge classification of the issues and limitations inherent to recommender systems research. …


Ndikimi I Krimeve Kibernetike Dhe Privatësia Në Internet, Besarta Pllana Jun 2018

Ndikimi I Krimeve Kibernetike Dhe Privatësia Në Internet, Besarta Pllana

Theses and Dissertations

Dita ditës avancimi i teknologjisë dhe përdorimi i internetit ka kufizuar privatësinë tonë. Ndarja e shumë informatave në internet është bërë e pashmangshme dhe në masë te madhe heq barrierat mes asaj se çka duhet të jetë private dhe çka publike. Pikërisht për këtë arsye kjo tematikë do të jetë si një lloj thirrjeje dhe përkujtimi i gjendjes aktuale të privatësisë në internet, si dhe rreziqet që mund të vijnë për shkak të kësaj gjendjeje.Si rezultat i internetit të dhënat tona private nuk janë më private. Ironikisht përdoruesit vazhdojnë të japin të dhënat e tyre personale kudo që ju kërkohen …


Good Game, Greyory Blake Jan 2018

Good Game, Greyory Blake

Theses and Dissertations

This thesis and its corresponding art installation, Lessons from Ziggy, attempts to deconstruct the variables prevalent within several complex systems, analyze their transformations, and propose a methodology for reasserting the soap box within the display pedestal. In this text, there are several key and specific examples of the transformation of various signifiers (i.e. media-bred fear’s transformation into a political tactic of surveillance, contemporary freneticism’s transformation into complacency, and community’s transformation into nationalism as a state weapon). In this essay, all of these concepts are contextualized within the exponential growth of new technologies. That is to say, all of these semiotic …


Reducing Sepsis Mortality: A Cloud-Based Alert Approach, Janet A. Zink Jan 2018

Reducing Sepsis Mortality: A Cloud-Based Alert Approach, Janet A. Zink

Theses and Dissertations

The aim of this study is to examine the impact of a cloud-based CDS alerting system for SIRS, a precursor to sepsis, and sepsis itself, on adult patient and process outcomes at VCU Health System. The two main hypotheses are: 1) the implementation of cloud-based SIRS and sepsis alerts will lead to lower sepsis-related mortality and lower average length of stay, and 2) the implementation of cloud-based SIRS and sepsis alerts will lead to more frequent ordering of the Sepsis PowerPlan and more recording of sepsis diagnoses. To measure these outcomes, a pre-post study was conducted. A pre-implementation group diagnosed …


Social Engineering Knowledge Measured As A Security Countermeasure, Christopher Artejus Sanders Jan 2018

Social Engineering Knowledge Measured As A Security Countermeasure, Christopher Artejus Sanders

Theses and Dissertations

Social Engineering has become a significant threat to the security of business, government, and academic institutions. As vulnerabilities to social engineering attacks increase, organizations must incorporate risk mitigation strategies to their portfolios of Information Systems Security Countermeasures (ISSC). The goal is to implement mitigation strategies that balance the cost of implementation, the privacy of employees, and the resulting expected costs of social engineering attacks. In this paper we develop an analytical model that calculates the total cost of protection, including the trade-off between the cost of implementing protection strategies and the resulting expected cost of social engineering attacks. We use …


Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo Jan 2017

Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo

Theses and Dissertations

The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals are characterized by their lack of formal affiliation with terror organizations, making them difficult to intercept with traditional intelligence techniques. The radicalization of individuals on the internet poses a considerable threat to law enforcement and national security officials. This new medium of radicalization, however, also …


A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas Jan 2017

A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas

Theses and Dissertations

A review of the research related to Information Technology (IT) governance reveals that researchers have yet to use systems theory directly as a basis for understanding IT governance; however, analysis of these researchers’ various definitions of IT governance shows a concurrence between these definitions and the characteristics of a system. This case study research adopts a systems imagination to observe IS and IT governance in the Virginia Department of Transportation (VDOT), which has a budget of over $5 billion and over 7,500 employees and has recently conducted a strategic assessment of its IT organization - including IS and IT governance. …


Divergence In Stakeholder Perceptions Of Security Policies: A Repgrid Analysis For Norm-Rule Compliance, Ahlam Almusharraf Jan 2016

Divergence In Stakeholder Perceptions Of Security Policies: A Repgrid Analysis For Norm-Rule Compliance, Ahlam Almusharraf

Theses and Dissertations

Many organizations have a problem with synchronizing individual values regarding information security with expectations set by the relevant security policy. Such discordance leads to failure in compliance or simply subversion of existing or imposed controls. The problem of the mismatch in understanding the security policies amongst individuals in an organization has devastating effect on security of the organization. Different individuals hold different understanding and knowledge about IS security, which is reflected on IS security policies design and practice (Vaast, 2007). Albrecthsen and Hovdena (2009) argue that users and managers practice IS security differently because they have different rationalities. This difference …


The Application Of Lean Six Sigma To Improve A Business Process: A Study Of The Order Processing Process At An Automobile Manufacturing Facility, Sherrian Francina Ellis Jan 2016

The Application Of Lean Six Sigma To Improve A Business Process: A Study Of The Order Processing Process At An Automobile Manufacturing Facility, Sherrian Francina Ellis

Theses and Dissertations

The objective of this study is to explore the application of Lean Six Sigma to determine root causes of process inefficiency and make recommendations for improving the order processing process at an automobile manufacturing facility. State of the art process quality improvement initiatives Lean, Six Sigma, and Lean Six Sigma are used to explore literature and provide a strong theoretical background for this study. Since the study utilizes both quantitative and qualitative data, the study’s methodological approach is classified as mixed methodology. The study is empirical in nature, and single case study is strategy chosen to complete the study. The …


Intrinsic Motivation And Information Systems Security Policy Compliance In Organizations, Yurita Yakimin Abdul Talib Jan 2015

Intrinsic Motivation And Information Systems Security Policy Compliance In Organizations, Yurita Yakimin Abdul Talib

Theses and Dissertations

Incidents of computer abuse, proprietary information leaks and other security lapses have been on the increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational IS security policy. As employee compliance with IS security policy is the key to escalating IS security breaches, understanding employee motivation for following IS security policy is critical. In addition to several types of extrinsic motives noted in prior studies, including sanctions, rewards, and social pressures, this study adds that an important contributing intrinsic factor is empowerment. Per Thomas and Velthouse’s (1990) intrinsic motivation model, empowerment is the positive …


Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri Jan 2014

Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri

Theses and Dissertations

The prevailing discourse of “resistance vs. acceptance” in IT implementation research mostly personalizes the issue as “users” versus IT implementers (e.g., managers, CIOs, CMIOs, etc.). This kind of discourse has created an IT-implementer-centric attitude among IS scholars and practitioners. The IT-implementer-centric attitude, while embraces “acceptance” as a desirable reaction almost unconditionally, frequently holds for minimizing or more conservatively suppressing “resistance” to IT implementation. In other words, the mainstream IT implementation research, almost completely, treats “users” as passive recipients whose choices, as they face pre-developed/pre-designed/pre-rolled-out technology being implemented, can only be defined on a spectrum from “acceptance” to “resistance.” The current …