Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2014

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 28 of 28

Full-Text Articles in Management Information Systems

Competitive Market Research And Product Design, Haixiu Wang Nov 2014

Competitive Market Research And Product Design, Haixiu Wang

Theses & Dissertations

To learn the uncertainty of customer preference on the attribute of new product, usually a firm needs to do market research. Developing a product on an attribute which is less preferred by customer may lead to a failure. In addition, a firm used to take efforts to design the product. In recent years, we observed a new business model in which the firm does not take effort to design new product, nor does she do market research by herself. She provides rewards to attract outside designers to design new product. Some designers may take effort and design products based on …


Intent-Based User Segmentation With Query Enhancement, Wei Xiong Aug 2014

Intent-Based User Segmentation With Query Enhancement, Wei Xiong

Dissertations

With the rapid advancement of the internet, accurate prediction of user's online intent underlying their search queries has received increasing attention from the online advertising community. As a rich source of information on web user's behavior, query logs have been leveraged by advertising companies to deliver personalized advertisements. However, a typical query usually contains very few terms, which only carry a small amount of information about a user's interest. The tendency of users to use short and ambiguous queries makes it difficult to fully describe and distinguish a user's intent. In addition, the query feature space is sparse, as only …


A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni Aug 2014

A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni

Masters Theses

A software based Management Information System (MIS) is designed and implemented in the Department of Industrial and Systems Engineering at University of Tennessee to handle different types of data requests that are currently processed through multiple steps. This thesis addresses the current resource intensive data management model in educational institutions and proposes a decentralized and customized solution. The proposed software based data management system provides information to authorized sources in the requested format with minimal or no time consumption. The quantification of the new systems’ impact is done by comparing it with current data management process using Graph Theoretic Approach …


The Effect Of Ceo It Expertise On The Information Environment: Evidence From Management Earnings Forecasts, Jacob Zachary Haislip Aug 2014

The Effect Of Ceo It Expertise On The Information Environment: Evidence From Management Earnings Forecasts, Jacob Zachary Haislip

Graduate Theses and Dissertations

Firms depend on information technology to provide high quality internal information, but prior research suggests that IT is underutilized (Venkatesh and Bala 2008). Therefore, using a sample of firms with equivalent levels of technology in their information systems, I investigate whether firms that employ CEOs with IT expertise make forecasts that are more accurate. I argue that CEOs with IT expertise are more likely to encourage the utilization of IT in making earnings forecasts, thus increasing the accuracy of the forecasts. This argument is supported by prior research that suggests that people are more likely to utilize technology if they …


Small Businesses Encounters With Information Technology, Liliana Lopez Jimenez Jul 2014

Small Businesses Encounters With Information Technology, Liliana Lopez Jimenez

Electronic Thesis and Dissertation Repository

This dissertation advances the concept of IT encountering, defined as the process whereby individuals pay attention, interpret and respond to cues suggesting changes to IT, in ways that appear sensible to them, and it studies IT encountering in the context of small businesses.

I review the literatures on organizational IT adoption and IT selection, and conclude that these literatures have relied on assumptions which leave unattended important aspects of the process leading to choice: the adoption literature presupposes the saliency and significance of a focal technology to a decision maker, and the IT selection literature generally assumes that suitable IT …


Buyer Beware : Consumer Response To Manipulations Of Online Product Reviews, Mengzhou Zhuang Jul 2014

Buyer Beware : Consumer Response To Manipulations Of Online Product Reviews, Mengzhou Zhuang

Theses & Dissertations

Online product reviews have become an important and influential source of information for consumers. Firms often manipulate online product reviews to influence consumer perceptions about the product, making it a research topic of urgent need for theory development and empirical investigation. In this thesis, we examine how consumers perceive and respond to the three commonly used manipulation tactics. Firstly, an exploratory pre-study via in-depth interviews with online shoppers indicates that consumers commonly have the knowledge for online review manipulations as well as for detecting them. In the first study, a survey was used to investigate the three popular manipulation tactics …


Common Method Variance: An Experimental Manipulation, Alison Wall Jul 2014

Common Method Variance: An Experimental Manipulation, Alison Wall

Doctoral Dissertations

Although common method variance has been a subject of research concern for over fifty years, its influence on study results is still not well understood. Common method variance concerns are frequently cited as an issue in the publication of self-report data; yet, there is no consensus as to when, or if, common method variance creates bias. This dissertation examines common method variance by approaching it from an experimental standpoint. If groups of respondents can be influenced to vary their answers to survey items based upon the presence or absence of procedural remedies, a better understanding of common method variance can …


Building Change Readiness Practices For Information Technology Support Staff, Dianna Joseph Perkins May 2014

Building Change Readiness Practices For Information Technology Support Staff, Dianna Joseph Perkins

Dissertations

With the turbulent economic conditions of the healthcare market, organizational leaders are faced with significant factors driving unprecedented change. Healthcare organizations are challenged with reimbursement reductions, high costs, modification of government regulations, and demanding healthcare consumers. Survival for healthcare organizations in this volatile climate requires successful implementation of rapid change. Healthcare leaders recognize a correlation between competitive advantage and the implementation of advanced information technology. Unfortunately, despite the efforts of healthcare leaders, many change initiatives fail. This study explores the effects communication, leadership, and culture strategies have on individual change readiness as perceived by IT support staff in a not-for-profit …


Risk Perception In Online Communities, Jason R. Couraud May 2014

Risk Perception In Online Communities, Jason R. Couraud

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Online communities have become a part of everyday life for many people. The members of the communities use them to keep in touch with family and friends, do business, look for jobs, play games, and more, both savory and unsavory. The ease of sharing personal information comes with the subsequent risk of having that information exposed publically or even stolen. The purpose of this study was to explore how much awareness of the risks affects a person’s decision to post personal information to an online community.

Chapter I introduces the concepts and issues that will be investigated by this paper. …


Technology Acceptance In A Mandatory Environment: A Test Of An Integrative Pre-Implementation Model., Mohanned Al-Arabiat Apr 2014

Technology Acceptance In A Mandatory Environment: A Test Of An Integrative Pre-Implementation Model., Mohanned Al-Arabiat

College of Computing and Digital Media Dissertations

Technology acceptance has been studied extensively within the IS discipline. The introduction of the technology acceptance model (TAM) has given researchers the opportunity to produce a vast body of knowledge; however, existing gaps within the technology acceptance literature warrant further investigation of these understudied areas. Namely, few if any have studied end users’ acceptance of newly implemented technologies within organizational contexts before end-users start using the technology. Additionally, leadership is one of the areas that has not yet been sufficiently integrated with the technology acceptance literature. The Leader-Member Exchange (LMX) theory with its roots in the social exchange theory offers …


Disruption Of Information Technology Projects: The Reactive Decoupling Of Project Management Methodologies, Kurt W. Schmitz Mar 2014

Disruption Of Information Technology Projects: The Reactive Decoupling Of Project Management Methodologies, Kurt W. Schmitz

Information Systems & Operations Management Dissertations

Information Technology projects have migrated toward two dominant Project Management (PM) methodologies. Plan-driven practices provide organizational control through highly structured plans, schedules, and specifications that facilitate oversight by hierarchical bureaucracies. In contrast, agile practices emphasize empowered teams using flexible methods aligned to organizational values reinforced by cultural controls and rituals. While project teams mix and combine practices from both traditions, a stylistic bias remains in the initial project management practices established at the onset of IT projects. A review of existing literature on IT project management serve as a filter on the stylistic biases of these dominant PM paradigms that …


Matching Inventory Replenishment Heuristics To Demand Patterns: A Cost/Benefit Approach, Randall A. Napier Mar 2014

Matching Inventory Replenishment Heuristics To Demand Patterns: A Cost/Benefit Approach, Randall A. Napier

Information Systems & Operations Management Dissertations

Behavioral research indicates that bounded rationality and resource constraints support the use of "fast and frugal heuristics" that intentionally exclude some available information from decision models. Inventory replenishment decisions must be made quickly and efficiently, and as such are a promising realm for the use of fast and frugal heuristics. This research includes a simulation study to identify significant relationships among heuristics and demand patterns, yielding inferences regarding the advantages of selecting replenishment models to match demand patterns. Findings from the simulation are validated against three years of actual usage data for 278 independent demand items from a single industrial …


Increasing Adolescent Interest In Computing Through The Use Of Social Cognitive Career Theory, Osama Eljabiri Jan 2014

Increasing Adolescent Interest In Computing Through The Use Of Social Cognitive Career Theory, Osama Eljabiri

Dissertations

While empirical research efforts are sufficient to provide evidence of the role of most constructs in the Social Cognitive Career Theory (SCCT), this dissertation shifts the research focus and finds serious shortcomings in defining the construct of computer technology learning experiences design.

The purpose of this dissertation is to investigate whether, and to what extent, the proposed SCCT-enhanced framework can increase self-efficacy and interest of pre-college and college students in computer-based technology through the newly proposed “Learning Experiences” construct; in particular, whether it can reduce the gender gaps.

As a result of a comprehensive literature review, the dissertation connects learning, …


Svmaud: Using Textual Information To Predict The Audience Level Of Written Works Using Support Vector Machines, Todd Will Jan 2014

Svmaud: Using Textual Information To Predict The Audience Level Of Written Works Using Support Vector Machines, Todd Will

Dissertations

Information retrieval systems should seek to match resources with the reading ability of the individual user; similarly, an author must choose vocabulary and sentence structures appropriate for his or her audience. Traditional readability formulas, including the popular Flesch-Kincaid Reading Age and the Dale-Chall Reading Ease Score, rely on numerical representations of text characteristics, including syllable counts and sentence lengths, to suggest audience level of resources. However, the author’s chosen vocabulary, sentence structure, and even the page formatting can alter the predicted audience level by several levels, especially in the case of digital library resources. For these reasons, the performance of …


The Adoption And Diffusion Of It Management Innovations: Adaptation, Reinvention, Alternative Designs, And Rhetorical Persuasion, Quang N. Bui Jan 2014

The Adoption And Diffusion Of It Management Innovations: Adaptation, Reinvention, Alternative Designs, And Rhetorical Persuasion, Quang N. Bui

2014

This research examines the adoption and diffusion process of Information Technology (IT) management innovations—ones that focus on the organizing logics and governance of IT activities. IT management innovations are inherently important to organizations as they can dramatically transform the way businesses are organized and operated. However, because those innovations are tacit and composed mostly of abstract ideas, their adoption and diffusion are often plagued by ambiguity and fads, at times best described as "a solution in search of a problem." Against this backdrop, using theories from communication, sociology, Information Systems, and organizational studies, this research focuses on three underexplored aspects …


An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper Jan 2014

An Evaluation Of Perceived Safety Of Free Software: The Brafs Model, Will Pepper

Electronic Theses and Dissertations

This dissertation explores the perceived safety of free software and its relationship with the intention to use this technology in a business setting. The newly created construct of perceived safety is developed out of the theory of planned behavior. It is researched, scrutinized, and refined according to academic guidelines and two different environmental settings. The constructs that impact perceived safety and its relationship with intention to use consist of technology perceived risk, technology trusting beliefs, expected financial utility, and perceived adverse impact on professional reputation. Each construct consists of multiple operationalized elements. To explore this empirically, beneficial and risk measurements …


Creating And Fostering Singerian Inquiring Organizations Through Psychological Empowerment In The Context Of Information Assurance, Kristen Lee Brewer King Jan 2014

Creating And Fostering Singerian Inquiring Organizations Through Psychological Empowerment In The Context Of Information Assurance, Kristen Lee Brewer King

Doctoral Dissertations

Singerian Inquiring Organizations (SIO) (Courtney, et al., 1998; Courtney, 2001) are knowledge-based enterprises based on Churchman's theory of Singerian inquiring systems (Courtney, 2001). For Singerian organizations to thrive, employees must feel unfettered to quest for knowledge, share what knowledge has been found, and express opinions about the findings of others. In short, employees must feel empowered to act in order to foster the well-being and development of the organization and its stakeholders. Both the psychology and organizational behavior literature have examined psychological empowerment as a way to challenge individuals and/or employees to take control of and interest in organizational situations; …


Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey Jan 2014

Mr Hyde Or Dr. Jekyll? Characteristics Of The Information Systems Security Mindset, David Pumphrey

Electronic Theses and Dissertations

Information security professionals have a unique challenge in today's connected world. They are charged with protecting digital assets from individuals, groups, and even foreign governments with little or no restrictions limiting their behavior. To be successful, security experts must have the mindset and skills of those who seek to harm their organization, but most are not alloto retaliate, in kind. Instead, they must use these skills only to predict and to prevent future attacks; thus using their technical prowess for good and not for evil. In a survey of 330 information security professionals, the data reveals six mindsets of security …


Developing A Method For Measuring "Working Out Loud", Dennis E. Pearce Jan 2014

Developing A Method For Measuring "Working Out Loud", Dennis E. Pearce

Theses and Dissertations--Finance and Quantitative Methods

Enterprise social network software platforms (ESNs) are increasingly being deployed in firms across almost every industry as a means of fostering employee collaboration. Although benefits in increased productivity, innovation, and employee engagement are highly touted, there is a high failure rate of these deployments. This often occurs because (1) there is a misapplied focus on technology adoption rather than adoption of the employee behaviors that are ultimately required to obtain those benefits, and (2) it is unclear what those behaviors are and how to measure them.

“Working Out Loud” is one possible framework for understanding and measuring the behaviors necessary …


How Do Consumers Use Social Shopping Websites? The Impact Of Social Endorsements, Pei Xu Jan 2014

How Do Consumers Use Social Shopping Websites? The Impact Of Social Endorsements, Pei Xu

Theses and Dissertations--Business Administration

Social endorsements are user-generated endorsements of products or services, such as “likes” and personal collections, in an online social platform. We examine the effect of prior social endorsements on subsequent users’ tendency to endorse or examine a product in a social shopping context, where a social platform connect consumers and enable a collaborative shopping experience. This research consists of two parts. In part I, we identify two ways prior social endorsements can affect subsequent user behavior: as a crowd endorsement, which is an aggregate number of endorsements a product receives for anyone who comes across the product, and as …


Management Information Systems: An Information Portal For A Major With Limitless Interpretations, Benjamin Richard Lahue Jan 2014

Management Information Systems: An Information Portal For A Major With Limitless Interpretations, Benjamin Richard Lahue

Honors Program Theses

Management Information Systems often referred to as MIS is the people-oriented use of computers in business. MIS is both a field of study and a career path. It combines the foundations of computing, analysis, and business in to one field of study. MIS is a major that is growing in popularity; however, it is still unknown to many undergraduates. This thesis includes both research and creative aspects. The information gathered by research was used to generate the requirements for an information portal relating to the MIS program at the University of Northern Iowa (UNI). A portal is a one stop …


New Artifacts For The Knowledge Discovery Via Data Analytics (Kdda) Process, Yan Li Jan 2014

New Artifacts For The Knowledge Discovery Via Data Analytics (Kdda) Process, Yan Li

Theses and Dissertations

Recently, the interest in the business application of analytics and data science has increased significantly. The popularity of data analytics and data science comes from the clear articulation of business problem solving as an end goal. To address limitations in existing literature, this dissertation provides four novel design artifacts for Knowledge Discovery via Data Analytics (KDDA). The first artifact is a Snail Shell KDDA process model that extends existing knowledge discovery process models, but addresses many existing limitations. At the top level, the KDDA Process model highlights the iterative nature of KDDA projects and adds two new phases, namely Problem …


Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri Jan 2014

Theorizing When User Reaction To It Implementation Is Neither Resistance Nor Acceptance, But Constructive Behavior: A Case Study Of Healthcare It Implementation, Kaveh Mohajeri

Theses and Dissertations

The prevailing discourse of “resistance vs. acceptance” in IT implementation research mostly personalizes the issue as “users” versus IT implementers (e.g., managers, CIOs, CMIOs, etc.). This kind of discourse has created an IT-implementer-centric attitude among IS scholars and practitioners. The IT-implementer-centric attitude, while embraces “acceptance” as a desirable reaction almost unconditionally, frequently holds for minimizing or more conservatively suppressing “resistance” to IT implementation. In other words, the mainstream IT implementation research, almost completely, treats “users” as passive recipients whose choices, as they face pre-developed/pre-designed/pre-rolled-out technology being implemented, can only be defined on a spectrum from “acceptance” to “resistance.” The current …


Role Of Digital Collections In The Cultural Heritage Institution: Pathways For Strengthening Social Identity, Kimberly A. Arleth Jan 2014

Role Of Digital Collections In The Cultural Heritage Institution: Pathways For Strengthening Social Identity, Kimberly A. Arleth

School of Business Student Theses and Dissertations

According to the theory of social identity, the more connected an individual feels to other group members, the more likely they are to feel a part of this group. The stronger the connection is, the more likely the individual is to become an active member. Cultural collections illustrate the shared history of a group. By increasing access to these collections via online access, organizations expose more users to these shared histories. Viewing such shared history, individuals will experience stronger connections to the history and members of the group resulting in an increase in social identity. When this connection solidified, users …


Owner-Manager Separation And The Structure Of It Governance In Small Business, Jeffrey S. Saffer Jan 2014

Owner-Manager Separation And The Structure Of It Governance In Small Business, Jeffrey S. Saffer

Walden Dissertations and Doctoral Studies

Small business owners and small business managers tend to favor different information technology (IT) governance structures. Such differences can lead to ineffective management and control of IT in small businesses. The purpose of this correlational study was to examine the extent and nature of the association between owner-manager separation in small businesses and the structure of IT governance in the businesses. Agency theory formed the theoretical framework of this study. Data were collected using a web-based survey and randomly sampled 3,697 small business owners and managers located in New Jersey and Pennsylvania. Chi-square statistics indicated no significant association between owner-manager …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay Jan 2014

Initial Online Consumer Trust (Ioct): The Influence Of Third-Party Service Provider Reputation, Website Utility, Electronic Word-Of-Mouth, And Previous Experience With Similar Websites, Surma Mukhopadhyay

Electronic Theses and Dissertations

Objectives: The objectives of the study were 1) to conceptualize Initial Online Consumer Trust (IOCT) and 2) to examine the effects of website utility, electronic word-of-mouth, consumer past experiences with similar websites, and third-party service providers' reputation on the development of IOCT. Methods: To explore the research objectives, the study deployed a 2X3 experimental design that involved six experimental groups. Subjects were recruited from the undergraduate student pool at the University of Mississippi, School of Business. The vignettes used in the study was hypothetical book selling websites, one with the presence of third-party service providers and the other without any …


The Fox Is Guarding The Henhouse: Can Interpersonal Conflict Damage An Organization's Information Security?, Ammar Nurbhai Jan 2014

The Fox Is Guarding The Henhouse: Can Interpersonal Conflict Damage An Organization's Information Security?, Ammar Nurbhai

Information Systems & Operations Management Theses

As computer networks grow ever more interconnected, securing an organization's information is becoming increasingly vital. At the forefront of this threat is that of the insider, an individual who is already behind the firewall. Extant literature related to the causes and motivation behind malicious insider behavior is lacking.This study examines whether workplace interpersonal conflict can motivate an individual to retaliate against an organization's digital information assets. The moderating effects of organizational justice and anger control are also explored to determine whether these constructs can mitigate the risk of retaliatory behavior. The link between Anger and subsequent aggression are also examined. …