Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type

Articles 181 - 208 of 208

Full-Text Articles in Management Information Systems

Work Engagement: Antecedents And Effects On Student Employee Academic Engagement, Chase V. Moore Jan 2017

Work Engagement: Antecedents And Effects On Student Employee Academic Engagement, Chase V. Moore

Honors Theses

Drawing on the Job Demands-Resources (JD-R) model, this study explores the effect of the resources student employees receive from management and from the nature of their work on their engagement at work and their engagement in academic pursuits. Student workers make up a significant pool of workers in our institutions of higher education and supporting academic achievement of student workers is consistent with our institutions' missions. Accordingly, the purpose of this study is to examine the antecedents (supervisory support, supervisory feedback, person-organization fit, and person-job fit) that affect levels of work engagement of students employed in educationally-situated work environments, and …


Usability Modeling Of Academic Search User Interface, Tsangyao Chen, Melissa Gross Jan 2017

Usability Modeling Of Academic Search User Interface, Tsangyao Chen, Melissa Gross

Business and Information Technology Faculty Research & Creative Works

Usability is a core concept in HCI and is a common quality attribute for the design and evaluation of interactive systems. However, usability is a fluid construct and requires context-specific frameworks to be clearly defined and operationalized. Academic search user interfaces (SUIs) include the search portals of academic and research libraries, digital data repositories, academic data aggregators, and commercial publishers. In addition to information lookup, academic SUIs serve scientific information seeking in learning, exploration, and problem-solving. Researchers in library and information science (LIS) have intensively studied information seeking behavior. In recent years, exploratory search has gained attention from LIS researchers …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Isscm Scholarship And Awards 2017, Raj Soin College Of Business, Wright State University Jan 2017

Isscm Scholarship And Awards 2017, Raj Soin College Of Business, Wright State University

ISSCM Awards & Scholarships

Scholarships and Awards presented to students in the ISSCM Department.


Arctic Research Collaborations Among Agencies: A Case Study Analysis Of Factors Leading To Success Within The Interagency Arctic Research Policy Committee, Meredith Clare Lavalley Jan 2017

Arctic Research Collaborations Among Agencies: A Case Study Analysis Of Factors Leading To Success Within The Interagency Arctic Research Policy Committee, Meredith Clare Lavalley

Bard Center for Environmental Policy

The Arctic is changing rapidly as average temperatures rise. As an Arctic nation, the United States is directly affected by these changes. It is imperative that these changes be understood to make effective policy decisions. Since the research needs of the Arctic are large; 14 Federal agencies have Arctic research programs. As a result, the government regularly works to coordinate Federal Arctic research in order to reduce duplication of effort and costs, and to enhance the research’s system perspective. The government’s Interagency Arctic Research Policy Committee accomplishes this coordination through its Five-year Arctic Research Plans and Collaboration Teams, which are …


Designing A Prototype For Analytical Model Selection And Execution To Support Self-Service Bi, Greg Schymik, David Schuff, Karen Corral, Robert St. Louis Jan 2017

Designing A Prototype For Analytical Model Selection And Execution To Support Self-Service Bi, Greg Schymik, David Schuff, Karen Corral, Robert St. Louis

IT and Supply Chain Management Faculty Publications and Presentations

This paper presents a prototype of a modeling tool specifically designed for business analysts with little modeling experience. The proposed tool has an interactive user interface for a dimensional data store that contains a library of analytical models that business analysts can evaluate and use to create models they can run on their own data sets. Using a design science approach, we review the relevant literature in self-efficacy and feedforward to provide a kernel theory that informs the design criteria met by our proof of concept prototype. Specifically, we demonstrate the prototype’s user interface with a prediction problem faced by …


Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo Jan 2017

Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo

Theses and Dissertations

The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals are characterized by their lack of formal affiliation with terror organizations, making them difficult to intercept with traditional intelligence techniques. The radicalization of individuals on the internet poses a considerable threat to law enforcement and national security officials. This new medium of radicalization, however, also …


A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas Jan 2017

A Systems View Of Is Governance And It Governance: A Case Study Of The Virginia Department Of Transportation, Bernard Farkas

Theses and Dissertations

A review of the research related to Information Technology (IT) governance reveals that researchers have yet to use systems theory directly as a basis for understanding IT governance; however, analysis of these researchers’ various definitions of IT governance shows a concurrence between these definitions and the characteristics of a system. This case study research adopts a systems imagination to observe IS and IT governance in the Virginia Department of Transportation (VDOT), which has a budget of over $5 billion and over 7,500 employees and has recently conducted a strategic assessment of its IT organization - including IS and IT governance. …


How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson Jan 2017

How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson

Management Faculty Publications

Despite a generally-acknowledged importance of information technology (IT) in enabling global strategy and a broad understanding of the manner in which IT enhances coordination and reduces cost, few studies have focused precisely on how multinational corporations (MNCs) use IT to facilitate globalization. To address this gap in the literature, we conduct a case study across four large MNCs, and use primary data to develop theoretical propositions on the characteristics of products, processes and customers that impact the ways in which MNCs use IT to manage their global operations.


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson Jan 2017

Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson

Journal of International Technology and Information Management

Purpose: The purpose of this paper is to review the acceptance and future use of blockchain technology. Given the rapid technological changes, this paper focuses on a managerial overview and framework of how the blockchain, including its implementations such as Bitcoin have advanced and how blockchain can be utilized in large-scale, enterprise environments. The paper begins with a technological overview that covers the history of the technology, as well as describing the computational, cryptographic theory that serves as the basis for its notable security features. This paper also covers several key application areas such as finance, accounting, and marketplaces where …


Examining And Exposing The Darknet, Ton H. Don Jan 2017

Examining And Exposing The Darknet, Ton H. Don

Electronic Theses and Dissertations

This thesis consists of two studies; the first study is “Diving into the Darknet” and the second is “Exposing the Darknet on Mobile Devices”. The Darknet is a network of hidden sites and services which are built based on anonymity. In “Diving into the Darknet”, we applied different data science methods to establish the relationships between the data in the data set. This data set has information related to seller, drug types, and transactions. Additionally, we used Tableau to visualize the data set. For the second study, we took a digital forensics perspective of the Darknet. Orfox and Orbot, a …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker Jan 2017

Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 1, 2017


Exploring ‘People’ As The Key Element In Enterprise Architecture Implementation: A Critical Realist Perspective, Edi Triono Nuryatno Jan 2017

Exploring ‘People’ As The Key Element In Enterprise Architecture Implementation: A Critical Realist Perspective, Edi Triono Nuryatno

Theses: Doctorates and Masters

TOGAF (2009) describes the purpose of Enterprise Architecture (EA) is to optimise enterprisewide systems - the often-fragmented legacy of data processes (both manual and automated) - into an integrated environment that is responsive to change and supports the delivery of the business strategy (The Open Group Architecture Framework [TOGAF], 2009). However, for a number of reasons organisations still have difficulties establishing an effective EA (Raadt & Vliet, 2008; Gartner, 2009; and Janssen & Klievink, 2012, among others) and various reports suggest up to two thirds of implementations do not fulfil expectations (Roeleven, 2010). Being organisation wide with a strong governance …


How Startups Succeed — A Look At How Architectural Innovation Provides A Competitive Advantage, Pontus V. Andersson Jan 2017

How Startups Succeed — A Look At How Architectural Innovation Provides A Competitive Advantage, Pontus V. Andersson

Honors Theses

The recent rise of high profile startups in the news and the prolific attention given to the entrepreneurial culture during an economic makes understanding how startups work a point of interest for many. The glamorization of shows like Silicon Valley and the growth of online personalities and their followers makes it even more exciting. But why do so many startups fail so drastically and a few reach unfathomable heights and why are household companies so interested in them? This paper addresses one of the underlying themes that drives business today, specifically, architectural innovation, or how companies organize. By following the …


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu Jan 2017

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …


Stigmas That Exist Regarding Technology, Lyndsey Nicole Bowers Jan 2017

Stigmas That Exist Regarding Technology, Lyndsey Nicole Bowers

Senior Honors Theses

In looking at technology and how technology affects an individual, research indicates that a number of stereotypes exist about the people that most frequently use technology. A large portion of these stigmas involve the personality or gender of those that work with or use technology. The research that indicates that these stereotypes exist within the field of Information Technology (IT) but does not expand to look at the general population and their use of technology. More specifically, the research has not focused on the individuals who are simply interested in information technology and who are talented in working with technology. …


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 Jan 2017

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …


It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan Jan 2017

It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan

Journal of International Technology and Information Management

TThe purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the nature of tools employed, measurement processes, and the implementation methodology, using case studies. Analysis of the available academic and non-academic literature sources showed measurement issues being the most dominant and ironically the most neglected domain in ITG implementations. We view ITG measurement tools and it subsequent deployment through the two theoretical ITG models namely the Integrated IT Governance model, and the Structures, Processes, …


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran Jan 2017

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari Jan 2017

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …


Professional And Personal Social Networking And Enhancement Of Social Capital In Young Adults, Maria Malu H. Roldan, Janejira Sutanonpaiboon, Richard Burkhard Jan 2017

Professional And Personal Social Networking And Enhancement Of Social Capital In Young Adults, Maria Malu H. Roldan, Janejira Sutanonpaiboon, Richard Burkhard

Journal of International Technology and Information Management

PROFESSIONAL AND PERSONAL SOCIAL NETWORKING AND ENHANCEMENT OF SOCIAL CAPITAL IN YOUNG ADULTS

ABSTRACT

This study compares the use of personal and professional social networking sites by young adults for social capital enhancing activities. The research is based on a survey of college-age adults (n=292) who were asked about their use of two social networking sites of contrasting architectures: the more interactive, social/personal\-oriented site Facebook, and the relatively less interactive, professional/business-oriented site LinkedIn. Data were analyzed to determine the relationships among demographic and technology experience factors, and respondents’ use of these sites for social capital enhancing activities. Findings suggest that …


Artificial Intelligence In Engineering Risk Analytics, Desheng Wu, David L. Olson, Alexandre Dolgui Jan 2017

Artificial Intelligence In Engineering Risk Analytics, Desheng Wu, David L. Olson, Alexandre Dolgui

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Risks exist in every aspect of our lives, and can mean different things to different people. While negative in general they always cause a great deal of potential damage and inconvenience for stakeholders. Recent engineering risks include the Fukushima nuclear plant disaster from the 2011 tsunami, a year that also saw earthquakes in New Zealand, tornados in the US, and floods in both Australia and Thailand. Earthquakes, tornados (not to mention hurricanes) and floods are repetitive natural phenomenon. But the October 2011 floods in Thailand were the worst in 50 years, impacting supply chains including those of Honda, Toyota, Lenovo, …


Analytics, Innovation, And Organizational Adaptation, Gerard George, Yimin Lin Jan 2017

Analytics, Innovation, And Organizational Adaptation, Gerard George, Yimin Lin

Research Collection Lee Kong Chian School Of Business

With the advent of big data, organizations are integrating powerful computing tools into their organizational processes to drive efficiencies and improve service delivery. Yet, at the heart of this conversation lies the role of analytics and big data in innovation within and across organizations. In this article, we provide a stylistic model of the role of analytics in innovation and call for further research on the underlying processes, contingencies, and outcomes.


The Sustainability Imperative In Information Systems Research, Stefan Siedel, Pratyush Bharati Dec 2016

The Sustainability Imperative In Information Systems Research, Stefan Siedel, Pratyush Bharati

Pratyush Bharati

This paper reports on a panel discussion at the Pre-ICIS 2015 Workshop on Green Information Systems on the current state and future perspectives of SIGGreen—the special interest group of the Association of Information Systems on green information systems—as well as of green information systems (IS) research in general. Over the past years, IS scholars have made important contributions advancing our knowledge about how information systems can contribute to solving problems associated with the degradation of the natural environment. However, it would appear that green IS is viewed by many as just another research topic in IS field, and not a …


Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh Dec 2016

Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh

Madison Ngafeeson

No abstract provided.