Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year

Articles 31 - 60 of 130

Full-Text Articles in Management Information Systems

Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri Jan 2014

Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri

Theses and Dissertations

The prevailing discourse of “resistance vs. acceptance” in IT implementation research mostly personalizes the issue as “users” versus IT implementers (e.g., managers, CIOs, CMIOs, etc.). This kind of discourse has created an IT-implementer-centric attitude among IS scholars and practitioners. The IT-implementer-centric attitude, while embraces “acceptance” as a desirable reaction almost unconditionally, frequently holds for minimizing or more conservatively suppressing “resistance” to IT implementation. In other words, the mainstream IT implementation research, almost completely, treats “users” as passive recipients whose choices, as they face pre-developed/pre-designed/pre-rolled-out technology being implemented, can only be defined on a spectrum from “acceptance” to “resistance.” The current …


New Artifacts For The Knowledge Discovery Via Data Analytics (Kdda) Process, Yan Li Jan 2014

New Artifacts For The Knowledge Discovery Via Data Analytics (Kdda) Process, Yan Li

Theses and Dissertations

Recently, the interest in the business application of analytics and data science has increased significantly. The popularity of data analytics and data science comes from the clear articulation of business problem solving as an end goal. To address limitations in existing literature, this dissertation provides four novel design artifacts for Knowledge Discovery via Data Analytics (KDDA). The first artifact is a Snail Shell KDDA process model that extends existing knowledge discovery process models, but addresses many existing limitations. At the top level, the KDDA Process model highlights the iterative nature of KDDA projects and adds two new phases, namely Problem …


Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker Mar 2013

Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker

Theses and Dissertations

Due to the up-rise of social media, social networking sites have increased in popularity and use over the last few years. During this time, research related to social networks has also escalated. This study presents social network research trends found in ISR, JMIS, and MISQ for a six year period, 2005-2010. The social network-related articles from these premier MIS journals were examined in terms of topical theme and research strategy employed. Furthermore, the most productive authors and affiliations were identified and presented individually, by state, and by region. An additional outcome of this research is the presentation of a preliminary …


Aligning Security And Usability Objectives For Computer Based Information Systems, Santa Ram Susarapu May 2012

Aligning Security And Usability Objectives For Computer Based Information Systems, Santa Ram Susarapu

Theses and Dissertations

With extensive use of information systems in day-to-day business operations, many organizations are facing challenges to develop robust computer-based information systems that are secure and widely used by the user community. In order to develop information systems that are secure and useful, understanding what stakeholders consider important and value about the security and usability is critical. Security refers to confidentiality, integrity and availability and usability refers to efficiency, effectiveness and user satisfaction. Using Value Focused Thinking approach, this research first proposes the usability objectives based on the values of system developers and users. Using the security objectives proposed by Dhillon …


Institutionalization Of Information Security: Case Of The Indonesian Banking Sector, Muhamad Faisal Fariduddin Attar Nasution May 2012

Institutionalization Of Information Security: Case Of The Indonesian Banking Sector, Muhamad Faisal Fariduddin Attar Nasution

Theses and Dissertations

This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information security governance and practices become institutionalized through social integration of routines and system integration of relevant technologies. The objective is to develop an understanding of how information security governance and practices in the Indonesian banking sector become institutionalized. Such objective is built on an argument that information security governance and practices become institutionalized through …


The Strategic Association Between Enterprise Content Management And Decision Support, Jaffar Alalwan Apr 2012

The Strategic Association Between Enterprise Content Management And Decision Support, Jaffar Alalwan

Theses and Dissertations

To deal with the increasing information overload and with the structured and unstructured data complexity, many organizations have implemented enterprise content management (ECM) systems. Published research on ECM so far is very limited and reports on ECM implementations have been scarce until recently (Tyrväinen et al. 2006). However, the little available ECM literature shows that many organizations using ECM focus on operational benefits while strategic decision-making benefits are rarely considered. Moreover, the strategic capabilities such as decision making capabilities of ECM are not fully investigated in the current literature. In addition, the literature lacks a strategic management framework (SMF) that …


Designing A Comprehensive Framework For E-Government Implementation Success With A Special View Of The Case Of Saudi Arabia, Mohammed Alsaigh Mar 2012

Designing A Comprehensive Framework For E-Government Implementation Success With A Special View Of The Case Of Saudi Arabia, Mohammed Alsaigh

Theses and Dissertations

As a result of the increasing development in the field of Information Systems (IS) in the last decades, new concepts have appeared to serve specific requirements and needs (Smith 2010; Almarabeh and AbuAli 2010). E-government is one of these concepts, which appeared in 1993 (Silva 2006) to become one of the main tools for governments around the world to enhance the services provided by governments and their agencies (Atallah 2001). Investigating the literature shows that there are common issues in all e-government implementation projects which can be summarized as follows: 1) e-government implementation projects in their nature are vast, and …


The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris Jun 2010

The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris

Theses and Dissertations

Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects …


Achieving Solution Success: An Investigation Of User Participation Approaches, Angela Mattia Apr 2009

Achieving Solution Success: An Investigation Of User Participation Approaches, Angela Mattia

Theses and Dissertations

User participation and its relationship to system success have been discussed in the information systems (IS) literature from many theoretical and practical perspectives. In reality, most of this discussion is grounded in empirical research that has yielded mixed results on the importance of user participation and its relationship to system success. The goal of this dissertation is to extend the line of inquiry into user participation during information system development by providing information systems researchers and IS practitioners with both a valid theoretical and practical investigation of a successful IS solution. This investigation organizes the study within a descriptive model …


Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger Apr 2009

Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger

Theses and Dissertations

This research builds on the literature about power and performance, offering new theory that extends the literature by accounting for the transformational effects of information technology. The role of information technology in the relationship between organizational power and performance is unclear in the literature. Management literature offers theories describing the relationship between power and performance. IS literature investigates the relationship between information technology (IT) and power and between information systems technology and performance, but is silent on the impact of IT on the relationship between power and performance. The nature of this relationship – direct, moderating, or indirect – is …


A Model Of Organizational Competencies For Business Intelligence Success, Lewis Chasalow Apr 2009

A Model Of Organizational Competencies For Business Intelligence Success, Lewis Chasalow

Theses and Dissertations

Business intelligence (BI) systems comprise one of the largest and fastest growing areas of IT expenditure in companies today. Companies’ experiences with deriving benefits from these systems are still mixed. One of the differences between BI and other types of information systems is that how BI systems are used, not just whether they are used, can have a major impact on the benefits derived. Therefore the characteristics of BI users and the organizations within which they work can have a disproportionate impact on the benefits derived from investments in BI. Organizational competence is one way to evaluate the characteristics of …


Towards A Reflective-Agile Learning Model And Method In The Case Of Small-Shop Software Development: Evidence From An Action Research Study, Jeffry Babb Apr 2009

Towards A Reflective-Agile Learning Model And Method In The Case Of Small-Shop Software Development: Evidence From An Action Research Study, Jeffry Babb

Theses and Dissertations

The ascension and use of agile and lightweight software development methods have challenged extant software design and development paradigms; this is especially notable in the case of small-team and small-shop software development. In this dissertation, a Reflective-Agile Learning Method and Methodology (RALMM) for small-shop software development, is proposed to enhance communication and learning in the use of agile methods. The purpose of the inquiry in this dissertation pertains to: the nature of the professional practice of small team software development; the implications of the epistemology of Reflective Practice has for the professional practice of small-team software development; and whether the …


Data Quality-A Key To Successfully Implementing Ecss, Craig A. Lane Mar 2009

Data Quality-A Key To Successfully Implementing Ecss, Craig A. Lane

Theses and Dissertations

In response to the Expeditionary Logistics for the 21st Century (eLog21) campaign initiatives published in 2003, the United States Air Force (USAF) pursued the acquisition of technology to help transform its logistics processes. With process mapping complete and a proposed roll-out schedule, forward progress towards full implementation of the Expeditionary Combat Support System (ECSS) continues. As a key enabler to achieving eLog21 initiatives, implementing ECSS will help transform current USAF logistics business processes. Integrating more than 450 legacy systems, and with a projected end-state in excess of 750,000 primary, secondary, and tertiary users, ECSS is the largest enterprise resource planning …


Achieving Alignment: An Analysis Of Enterprise Architecture Best Practices Within The United States Air Force, Michael A. Fetters Mar 2009

Achieving Alignment: An Analysis Of Enterprise Architecture Best Practices Within The United States Air Force, Michael A. Fetters

Theses and Dissertations

This research uncovers areas of best practices that support achieving alignment between an organization’s Information Technology (IT) and its business processes. One principal finding of this effort revealed that the means used to achieve alignment exists within the effective application of Enterprise Architecture (EA), a common practice found throughout the Federal Government, Department of Defense, and the Air Force. EA is the tool used to achieve alignment; likewise, the reason for developing IT architecture is to achieve alignment of IT investments and mission objectives. This research groups the best practices into vision, identification, framework, and governance. Interestingly, these practices relate …


An Assessment Of The Air Force Weather Agency's Readiness For Knowledge Management Initiatives, Daniel Tucker Mar 2009

An Assessment Of The Air Force Weather Agency's Readiness For Knowledge Management Initiatives, Daniel Tucker

Theses and Dissertations

The successful implementation of knowledge management (KM) initiatives requires a level of commitment and preparedness by the organization that is commensurate with the expected results. An organization must be willing to allocate the necessary resources to ensure their readiness to undertake new KM projects. The purpose of this study is to review AFWA’s organizational culture and measure its propensity for accepting KM initiatives. The study uses empirically validated constructs to evaluate and assess the organization’s people, culture, climate, processes and attitudes as they relate to KM. This research was conducted using semi-structured interviews to elicit respondents’ views about KM practices. …


An Analysis Of Defense Information And Information Technology Articles: A Sixteen Year Perspective, Daniel K. Smith Mar 2009

An Analysis Of Defense Information And Information Technology Articles: A Sixteen Year Perspective, Daniel K. Smith

Theses and Dissertations

Over the past two decades, information and information technology (IT) have evolved significantly and have become increasingly important to our national security. Many different journals have described this evolution. The purpose of this study is to examine the evolution of information and IT through the articles of two defense journals over a sixteen-year period. It provides a review of the article subject matter, the changes in the subject matter, the contributing authors and their institutions, and predictions for the next five years.


Defining Value Based Information Security Governance Objectives, Sushma Mishra Dec 2008

Defining Value Based Information Security Governance Objectives, Sushma Mishra

Theses and Dissertations

This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …


Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long Dec 2008

Why Do People Use Or Not Use An Information Technology: An Interpretive Investigation On The Adoption And Use Of An Electronic Medical Records System, Li Long

Theses and Dissertations

In the literature of information technology acceptance, much empirical evidence exists that is inconsistent with Technology Acceptance (TA) Models. The purpose of this study is to find out why the extant TA models fail to predict in reality as they purport to in theory. This research argues that the extant literature has not been able to explain how individuals actually form their perceptions about using an information technology. Since past research attempting to do this has been unsuccessful or empirically refuted, this research uses an interpretive case study to investigate the experiences of professionals’ adoption and use of an information …


An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma Sep 2008

An Integrated Knowledge Discovery And Data Mining Process Model, Sumana Sharma

Theses and Dissertations

Enterprise decision making is continuously transforming in the wake of ever increasing amounts of data. Organizations are collecting massive amounts of data in their quest for knowledge nuggets in form of novel, interesting, understandable patterns that underlie these data. The search for knowledge is a multi-step process comprising of various phases including development of domain (business) understanding, data understanding, data preparation, modeling, evaluation and ultimately, the deployment of the discovered knowledge. These phases are represented in form of Knowledge Discovery and Data Mining (KDDM) Process Models that are meant to provide explicit support towards execution of the complex and iterative …


Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay May 2008

Shaping Strategic Information Systems Security Initiatives In Organizations, Gurvirender Tejay

Theses and Dissertations

Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between …


An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr. Mar 2008

An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr.

Theses and Dissertations

Knowledge has been viewed as a critical component for organizations. Consequently, organizations implement Knowledge Management Systems (KMSs) to seek competitive advantages, but they may encounter mixed results. This research draws on previous information system and knowledge management system success-related literature and selects eight factors that are believed to be critical for the successful implementation of a KMS. These factors were derived through a literature search of current KMS success-related literature. The purpose of this study is to identify factors that could have a clear influence on the development and implementation of KMSs. The study presents the empirical examination of a …


A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley Mar 2008

A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley

Theses and Dissertations

Task/Technology Fit (TTF) posits that as the intersection of the task domain and the capabilities of an information system (IS) increases in magnitude, the performance gains experienced by user through use of the IS will be positively impacted. While rooted in the traditional IS literature, this research proposes that TTF be extended to incorporate additional factors unique to the context of Knowledge Management (KM). Based upon the findings of this research, it is reasonable to conclude that when employing the TTF model to determine KMS fitness, additional factors other than the task requirements and KMS capabilities should be considered. This …


An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas Mar 2008

An Ontology Centric Architecture For Mediating Interactions In Semantic Web-Based E-Commerce Environments, Manoj Thomas

Theses and Dissertations

Information freely generated, widely distributed and openly interpreted is a rich source of creative energy in the digital age that we live in. As we move further into this irrevocable relationship with self-growing and actively proliferating information spaces, we are also finding ourselves overwhelmed, disheartened and powerless in the presence of so much information. We are at a point where, without domain familiarity or expert guidance, sifting through the copious volumes of information to find relevance quickly turns into a mundane task often requiring enormous patience. The realization of accomplishment soon turns into a matter of extensive cognitive load, serendipity …


Governance Structure Transforemation During Erp Implementations, Elise V. Strachan Mar 2008

Governance Structure Transforemation During Erp Implementations, Elise V. Strachan

Theses and Dissertations

The United States Air Force (USAF) has a number of initiatives underway to better support tomorrow’s Warfighter. As part of the Expeditionary Logistics for the 21st Century (eLog21) campaign, one of the most critical initiatives is the Expeditionary Combat Support System (ECSS). ECSS is the world’s largest enterprise resource planning (ERP) implementation and will completely transform USAF logistics operations. The benefits of an ERP include centrally-managed and integrated information sharing, while the many challenges include training future state operations and employing change management. An effective governance structure is essential in order for the USAF to realize the full benefits of …


Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner Mar 2008

Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner

Theses and Dissertations

The purpose of this research was to develop an information requirements analysis method that would provide the Director of Cyberspace Forces with the information required to support effective command and control of cyberspace. This research investigates the role of information in command and control, information in the traditional war fighting domains, cyberspace as a war fighting domain, and various methods of determining information requirements of organizations. This research produced an information requirements analysis method that is suitable for identifying the command and control information requirements of the Director of Cyberspace Forces.


Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina Mar 2008

Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina

Theses and Dissertations

With increased reliance on communications to conduct military operations, information centric network management becomes vital. A Defense department study of information management for net-centric operations lists the need for tools for information triage (based on relevance, priority, and quality) to counter information overload, semi-automated mechanisms for assessment of quality and relevance of information, and advances to enhance cognition and information understanding in the context of missions [30]. Maximizing information utility to match mission objectives is a complex problem that requires a comprehensive solution in information classification, in scheduling, in resource allocation, and in QoS support. Of these research areas, the …


Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke Jan 2008

Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke

Theses and Dissertations

This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …


Developing A Multi-Objective Decision Model For Maximizing Is Security Within An Organization, Jeffrey Lee May Jan 2008

Developing A Multi-Objective Decision Model For Maximizing Is Security Within An Organization, Jeffrey Lee May

Theses and Dissertations

Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources. In an effort to adopt a broader perspective that accounts for issues that transcend technical means alone, Dhillon and Torkzadeh (2006) present an array of 9 fundamental and 16 means objectives that are essential for maximizing IS security in an organization. These objectives were derived using a value-focused thinking approach and are organized into a conceptual framework. This conceptual framework provides a rigorous theoretical base for considering IS security in a manner that accounts for …


A Comparative Assessment Of The Knowledge Management Leadership Approaches Within The Department Of Defense, Tommy V.S. Marshall Ii Mar 2007

A Comparative Assessment Of The Knowledge Management Leadership Approaches Within The Department Of Defense, Tommy V.S. Marshall Ii

Theses and Dissertations

Knowledge has superseded traditional corporate assets and has become the strategic resource for competitive advantage. To reap the benefits of knowledge, organizations must harvest and leverage the collective knowledge of the entire workforce. This is achieved through effective knowledge management. KM involves processes to create, to store, and transfer knowledge to accomplish business objectives and to achieve a competitive advantage. The Department of Defense has also recognized the importance of KM and has since mandated the acquiring, refining, and sharing of knowledge. The Departments of the Army, Air Force, and Navy have each undertaken individual KM efforts. This research, guided …


Assessing Perceptions Of Knowledge Management Maturity/Capabilitites: A Case Study Of Saf/Fm, Aaron M. Blair Mar 2007

Assessing Perceptions Of Knowledge Management Maturity/Capabilitites: A Case Study Of Saf/Fm, Aaron M. Blair

Theses and Dissertations

Knowledge is an essential organizational resource that is required at all echelons to accomplish processes, to make decisions, and to improve efficiency and effectiveness. In order to take advantage of the benefits of knowledge, organizations must harvest and leverage the collective knowledge of the entire workforce through effective knowledge management (KM). The Air Force Center of Excellence for Knowledge Management recognized SAF/FM as having an exemplar KM program within the Air Force. This research used the Knowledge Management Capability Assessment (KMCA) framework to assess the overall KM maturity and capabilities of the seemingly mature SAF/FM KM program. The results indicate …