Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (16)
- Social and Behavioral Sciences (15)
- Technology and Innovation (13)
- E-Commerce (12)
- Management Sciences and Quantitative Methods (11)
-
- Physical Sciences and Mathematics (11)
- Computer Engineering (10)
- Computer Sciences (9)
- Business Administration, Management, and Operations (7)
- Library and Information Science (7)
- Organizational Behavior and Theory (7)
- Operations Research, Systems Engineering and Industrial Engineering (6)
- Risk Analysis (6)
- Databases and Information Systems (5)
- Defense and Security Studies (5)
- International Relations (5)
- Military and Veterans Studies (5)
- Other Computer Sciences (5)
- Other Political Science (5)
- Peace and Conflict Studies (5)
- Policy Design, Analysis, and Evaluation (5)
- Political Science (5)
- Political Theory (5)
- Public Affairs (5)
- Public Affairs, Public Policy and Public Administration (5)
- Public Policy (5)
- Entrepreneurial and Small Business Operations (4)
- Business and Corporate Communications (3)
- Institution
- Keyword
-
- Information Security (4)
- Books (3)
- Cyber Operations (3)
- Cyber defense (3)
- Innovation (3)
-
- JEMI_2013_Vol_9_Issue_2 (3)
- Nukes (3)
- Open Source Software and Virtualization (3)
- Android (2)
- Application Area - Information Security Policy Compliance (2)
- Austerity (2)
- Compliance (2)
- Cyber (2)
- Cyber Security (2)
- Cyber operations (2)
- Cyber security (2)
- Cybersecurity (2)
- Deterrence (2)
- Evaluation of Information Systems (2)
- Information Systems (2)
- Information security policy (2)
- Information systems (2)
- Journal Articles (2)
- Knowledge management (2)
- Linux (2)
- Mobile Data Services (2)
- Nuclear (2)
- Process Management - Business Process Management, Collaboration Processes and Technologies (2)
- Security Studies (2)
- Sequestration (2)
- Publication
-
- Amit Deokar (5)
- Dr. Mutaz M. Al-Debei (5)
- Herbert J. Mattord (5)
- Jan Kallberg (5)
- Maurice Dawson (5)
-
- Qing Hu (5)
- Journal of Entrepreneurship, Management and Innovation JEMI (4)
- Jennifer L. Priestley (3)
- Adriane B. Randolph (2)
- Chris Kimble (2)
- Henk LM Kox (2)
- Magno Queiroz (2)
- Robert P. Minch (2)
- Andrew Laurence Norton (1)
- Associate Professor Linda Dawson (1)
- Craig Napier (1)
- Dariusz Jemielniak (1)
- Dirk Postma (1)
- Dr Deogratias Harorimana (1)
- Dr Samuel Fosso Wamba (1)
- Dr. Steffen Roth (1)
- Fabian Loeser (1)
- Francesca Cabiddu (1)
- Francis Gacenga Dr. (1)
- G. Kent Webb (1)
- Heather M Brotherton (1)
- Hwee-Joo Kam (1)
- Ian P McLoughlin Professor (1)
- Jacob Johnsen, MSc (1)
- Jason Connor Ferguson (1)
- File Type
Articles 1 - 30 of 77
Full-Text Articles in Management Information Systems
Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz
Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz
Shahriar Akter
mHealth (healthcare using mobile wireless technologies) has the potential to improve healthcare and the quality of life for elderly and chronic patients. Many studies from all over the world have addressed this issue in view of the aging population in many countries. However, there has been a lack of any consolidated evidence-based study to classify mHealth from the dual perspectives of healthcare and technology. This paper reports the results of an evidence-based study of mHealth solutions for chronic care amongst the elderly population and proposes a taxonomy of a broad range of mHealth solutions from the perspective of technological complexity. …
The Nature Of Project Success, Michael J. Cuellar
The Nature Of Project Success, Michael J. Cuellar
Michael J. Cuellar
This paper investigates the ontological status of project success. The literature shows that success has historically been considered to be an objective property of a project, one that can be assessed and the status of the project as a success or failure determined. However, this approach is shown to have serious deficiencies in dealing with certain project results. As an alternative, this paper suggests that following the subjective view of project success; success should be considered as a politically determined social construction. The paper advocates using Archer’s Morphogenetic Social Theory (Archer 1995; Cuellar 2010b) to explanatory mechanism. Under that theory, …
Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha
Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha
Joseph Shrestha
Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa
Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa
João Barata
We present an approach to develop IS Quality Culture, in the context of ISO 9001. The research design begins with semi-structured interviews with eight auditors, followed by action research. We confirmed that auditors recognize the importance of five distinct IS Quality dimensions: information/data, software, administrative, service, and infrastructure. However, the audit practice reveals the risk of considering IS as mere support, disregarding the cultural aspects of IS Quality. Our contribution addresses this gap by providing an audit checklist and an approach accessible to IS non-experts. An IS Quality Culture is vital in regulatory environments, and may raise the audit effectiveness …
Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar
Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar
Jennifer L. Priestley
No abstract provided.
The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar
The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar
Jennifer L. Priestley
Organizations join multi-organizational networks in part to mitigate environmental uncertainties and to access knowledge. However, the transfer of knowledge cannot be assumed simply as a function of network membership. Researchers in the area of knowledge management have identified several factors that have been found to affect the transfer of knowledge within, between, and among organizations. This chapter investigates specifically how organizational ambiguity impacts the transfer of knowledge within multi-organizational networks. The authors explore the effects of casual ambiguity, defined as the ambiguity relateaad to imputs and factors, in a multi-organizational context, and discuss the existence of a previously undefined ambiguity, …
Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley
Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley
Jennifer L. Priestley
No abstract provided.
Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma
Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma
Qing Hu
In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …
The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu
The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu
Qing Hu
Transformational leadership has been identified as one of the most critical factors in ERP success. However, few studies have explored how transformational leadership impacts ERP success, especially in the assimilation phase. Drawing from organizational learning and leadership theories, we submit that transformational leadership is positively related to exploitative and exploratory learning, mediated by three types of organizational learning culture. We developed a theoretical model and collected data from top and middle managers of 101 organizations in China that have used ERP systems for at least one year. Our results suggest that (1) transformational leadership is positively related with psychological safety, …
The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie
The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie
Qing Hu
Firms in China, and in Asia-Pacific countries to a certain degree, cannot escape from two institutional characteristics of modern organizations: the uniquely Eastern practice of guanxi and the uniquely Western artifact of information technology. While both constructs have been extensively studied in organizational contexts, few have examined how these two constructs interact with each other and how such interaction impact organizational processes, norms, and other institutional properties. From the lens of structuration theory, we attempt to understand this interesting and important phenomenon. We submit that guanxi is neither a cultural artifact of the Chinese society, nor a product of weak …
Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla
Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla
Qing Hu
Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent …
Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling
Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling
Qing Hu
Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using …
Green It And Green Is: Definition Of Constructs And Overview Of Current Practices, Fabian Loeser
Green It And Green Is: Definition Of Constructs And Overview Of Current Practices, Fabian Loeser
Fabian Loeser
Presentation held @ AMCIS 2013, Chicago Track: Green IS and Sustainability Minitrack: Organizations and Green IS 1:30 – 3:00 pm, Room 4D
Student Adoption & Development Of Digital Learning Media: Action Research And Recommended Practices, Sharon Tabor, Robert Minch
Student Adoption & Development Of Digital Learning Media: Action Research And Recommended Practices, Sharon Tabor, Robert Minch
Robert P. Minch
Digital technologies offer many opportunities for creating engaging course content. In this study we captured student perceptions and adoption choices related to creating and using digital media as learning tools. Podcasts, video and other media were integrated in a variety of contexts and tasks in two undergraduate information technology (IT) courses in a college of business. During the fall semesters of 2009 and 2010, faculty members teaching a junior-level IT and networking concepts course and a senior-level information security course, produced video-captured lectures, recorded fine-grained conceptual tutorials and podcasts, developed software simulations, and provided media for ad-hoc learning assistance. Students …
Do They Tweet Differently? A Cross-Cultural Group Study Of Twitter Use On Mobile Communication Devices, Kyungsub S. Choi, Il Im, Jason Danely
Do They Tweet Differently? A Cross-Cultural Group Study Of Twitter Use On Mobile Communication Devices, Kyungsub S. Choi, Il Im, Jason Danely
Jason Danely
Culture is one of the classic and most widely studied topics in the field of technology. People of different cultural backgrounds interpret, consume, and disseminate technology differently. One conspicuous aspect of culture is communication. The expression, conversational patterns, and contextual nuances of different languages make communication a distinct cultural experience. Culture influences how communication functions between different people in different social contexts. It is also an underlying feature of encoded messages; a knowledge of the sender’s culture helps to discern his or her intention. Communication technology is also susceptible to the influence of culture. The mobile and social aspects of …
Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof
Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof
Henk LM Kox
An economic perspective on Internet security is useful not only for identifying weak spots, but also for finding solutions to security problems. It focuses on the behaviour and economic incentives of both infrastructure providers and end users. Individual parties may have insufficient incentives to invest in cybersecurity. The free play of markets markets may not deliver a socially optimal level of security on the Internet for at least three reasons: information asymmetry, externalities and market power. Information asymmetry might occur in various situations. For example, end users are not able to verify whether an Internet Service Provider (ISP) correctly informs …
A Performance Measurement Framework For It Service Management, Francis Gacenga Dr.
A Performance Measurement Framework For It Service Management, Francis Gacenga Dr.
Francis Gacenga Dr.
The use of Information Technology (IT) has become more pervasive and, progressively, there has been a shift from a technology focus to a service focus in managing IT. The performance measurement of IT service management (ITSM) is a major challenge faced by organisations adopting best practice frameworks. The extensive adoption of ITSM frameworks by organisations may point to the acceptance by IT service managers that best practice frameworks such as Information Technology Infrastructure Library (ITIL®) and standards such as ISO/IEC 20000 can deliver real operational efficiencies, ultimately translating into business benefits. Some organisations implementing ITSM initiatives have reported realisation of …
Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier
Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier
Craig Napier
The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …
Classroom Design And Teachers’ Performance In Selected Secondary Schools In Ogun State, Nigeria, Olukunle Saheed Oludeyi
Classroom Design And Teachers’ Performance In Selected Secondary Schools In Ogun State, Nigeria, Olukunle Saheed Oludeyi
Olukunle Saheed, OLUDEYI
Studies on classroom design, most especially in Nigerian secondary schools, are seriously lacking. With particular focus on selected teachers in Ogun State, this ex-post facto research examined classroom design and its influence on teachers’ performance in teaching job. A total of 128 participants were randomly selected from 16 secondary schools in Ijebu Ode and 128 questionnaires titled ‘Scale on Classroom Design and Teachers Performance’ (SCDTP) with reliability co-efficient of 0.82 obtained through cronbach alpha method was developed and administered on the target participants. 96 instruments, constituting 75% of the total administered, were however returned and analysed. Simple percentage and Chi-square …
Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe
Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe
Adriane B. Randolph
No abstract provided.
Building Organizational Knowledge Quality: Investigating The Role Of Social Media And Social Capital, Pratyush Bharati, Abhijit Chaudhury, Wei Zhang
Building Organizational Knowledge Quality: Investigating The Role Of Social Media And Social Capital, Pratyush Bharati, Abhijit Chaudhury, Wei Zhang
Pratyush Bharati
To the extent that knowledge is the most strategically important resource for sustainable competitive advantage, organizations must consciously and systematically manage their knowledge asset. In this paper, we explore how social media and social capital at organizational level help organizations benefit from their knowledge management initiatives through improving organizational knowledge quality. A research model was developed and survey data were used to test the model. The preliminary results show that social media helps to provide the technical environment conducive to knowledge exchange and social capital enables the actual knowledge sharing between businesses. Both facilitate an organizational emphasis on knowledge management, …
Blending Information Systems Security And Forensics Curricula, Jason Ferguson
Blending Information Systems Security And Forensics Curricula, Jason Ferguson
Jason Connor Ferguson
This paper describes the process of developing an Information Security and Forensics curriculum for a master’s degree. The vision for this degree program is to offer a curriculum that differentiates Friends University in the marketplace from established security degrees by including courses in computer forensics. These are courses rarely seen in a security degree but supported by the regional marketplace that the university serves.
Cybersecurity In The Perspective Of Internet Traffic Growth, Henk Lm Kox
Cybersecurity In The Perspective Of Internet Traffic Growth, Henk Lm Kox
Henk LM Kox
Private and public concern about digital security, cybercrime and data privacy is growing the last few years. If Internet-related markets are flexible enough to cope with security concerns, given time, one would expect that - per unit of Internet traffic - the number and costs of cybersecurity incidents fall over time. This paper is a first attempt to assess empirically whether overall Internet traffic growth has grown faster than the number of cybersecurity incidents. The conclusion is that, overall, the Internet has over time has become a safer place when measured by the number of security incidents per unit of …
Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald
Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald
Dr. Mutaz M. Al-Debei
Purpose – This study aims to analytically develop a reference model for engineering (i.e. analysis, design, development, evaluation, delivery, maintenance, modification, and management) powerful value networks capable of creating innovative mobile data services. Design/methodology/approach – The paradigm followed is that of Design-Science Research (DSR) which incorporates two main iterative processes: build and evaluate. For building the model (i.e. the design science artifact in this research), we followed three iterations: (1) Literature Review Analysis; (2) Semi-Structured Interviews analyzed through content analysis; and (3) examination of real-life case studies. But for evaluating the model, we utilized the NTT DoCoMo’s i-mode case. Findings …
Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar
Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar
Amit Deokar
Collaboration activities are particularly difficult in e-learning environments, where the intention is to provide students with valuable learning experiences through working in teams and sharing a common goal. These activities are often conducted in an ad hoc manner with lack of proper assessment and control over learning outcomes. In this article, we propose the idea of enhancing the effectiveness of collaborative e-learning practices through structured collaborative e-learning processes and integrated assessment mechanisms. The structuring of collaboration processes is suggested through the application of successful collaboration process patterns, while the integrated assessment is suggested through assessing not just the end learning …
Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters
Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters
Amit Deokar
Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasoned Action (TRA) and ethics theories; deontology and teleology, to examine users’ behavioral intention to comply with ISPs. This is a research in progress, and an instrument is under development to conduct a survey study to gather data from employees in the banking sector in …
Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs
Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs
Amit Deokar
The Midwest chapter of the Association for Information Systems (MWAIS) was authorized as an official chapter of AIS during Fall of 2005. MWAIS is hosting its 7th research conference. Overall the Chapter has been successful in providing a forum to share ideas in traditional ways. As we broaden our leadership team and move to empower new leaders, this meeting is an excellent venue to share novel program ideas and discuss future directions.
A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar
A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar
Amit Deokar
In order to support effective and efficient business process management, it is imperative that the process management lifecycle be integrated with risk management knowledge. In this regard, this article presents a knowledge-based approach to integrating risk management with business process management. The adopted approach is based on conversational case-based reasoning (CCBR) with the objective to provide support in developing an appropriate risk management strategy for an ongoing workflow instance. This approach builds on the notion of integrating risks within business process models. A prototype is currently under development, which will assess the feasibility of this approach. We then intend to …
Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar
Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar
Amit Deokar
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behavioral intention to comply with ISPs. The impact of information security awareness on behavioral intentions to comply is also considered in the research model. This is a research in progress, and an instrument is being developed to conduct a survey study to gather data from employees …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …