Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Information systems

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 77

Full-Text Articles in Management Information Systems

Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe Mar 2024

Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe

Economic and Business Review

For more than six decades, creativity has been the cornerstone of diverse scientific disciplines, including psychology, sociology, and organizational behavior (OB) studies. Its fundamental role in guiding business prospects, driving development, and fueling economic growth has made it an essential research theme in many fields. Yet, despite its importance, scholars within the information systems (IS) discipline have highlighted the significant lack of attention paid to this concept in their research. The transformative role creativity plays in contemporary business environments, along with the ever-present need to innovate, compete, and grow, sparked our curiosity. Is creativity still an understudied area in the …


Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi Jan 2024

Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi

Journal of International Technology and Information Management

This article draws from the social network theory and examines how a social network approach can contribute to our understanding of the variation in the adoption of innovative, organization-wide information systems that can help businesses achieve sustainable competitive advantage. It highlights how the extant explanations for the adoption of information systems are limited in the way that they primarily assume organizations make innovation adoption decisions in isolation. It does so by building on growing research which recognizes that organizations are not isolated from one another; rather, they are interrelated through their inter-organizational networks which provide unique learning opportunities that are …


Using Information Systems To Help Chatham County With Dental Services, Taylor Gray Apr 2022

Using Information Systems To Help Chatham County With Dental Services, Taylor Gray

Honors College Theses

Due to the extreme lack of access to dental work in Chatham county, this consulting thesis was formed. I assisted the Chatham County Safety Net Planning Council by using information systems to help with dental assistance in the county both short and long term. This is a very important issue in the county and it has caused many issues among people without dental insurance. I helped by creating a website platform for the Chatham County Safety Net, and used data analysis to help make the event more streamlined.


Editorial Board Memberships: A Report On The Status Of The Leading Information Systems Journals, Erastus Karanja, Alisha D. Malloy Jan 2022

Editorial Board Memberships: A Report On The Status Of The Leading Information Systems Journals, Erastus Karanja, Alisha D. Malloy

Journal of International Technology and Information Management

Research journals play a significant role in the generation, dissemination, and sharing of knowledge in an academic discipline. To a great extent, the editorial board members of these research journals manage and control the generation, dissemination, and sharing of knowledge. They also act as policymakers, gatekeepers, and trendsetters. In their latter roles, editorial board members can influence several factors in a discipline; namely, the research topics, the research methods, the research scope, and whose articles are published. The primary goal of this study is to investigate and report on the status of the editorial boards memberships in a set of …


A Framework For Accessing Patient Big Data: Ant View Of A South African Health Facility, Sibulela Mgudlwa, Tiko Iyamu Jul 2021

A Framework For Accessing Patient Big Data: Ant View Of A South African Health Facility, Sibulela Mgudlwa, Tiko Iyamu

The African Journal of Information Systems

This study was undertaken to develop a framework that can be used to guide analysis when translating and transforming big data into a more purposeful resource for healthcare service delivery in South Africa. It is intended to assist in addressing some of the challenges encountered by healthcare facilities. Qualitative data were collected, with a focus on the types of interactions that happen between actors when accessing and using patients’ big data for healthcare services. Actor-network theory (ANT) was applied as a lens in the analysis of the data, to examine the relationships between actors when accessing and using big data …


A Proposed Theoretical Foundation For The Information Systems Discipline (Version 1. 1), Steven Alter Apr 2021

A Proposed Theoretical Foundation For The Information Systems Discipline (Version 1. 1), Steven Alter

Business Analytics and Information Systems

“Rethink the theoretical foundations of the IS discipline” is one of the grand challenges for IS research identified in a Delphi study in Business Information Systems Engineering (Becker et al., 2015). This draft addresses that challenge directly through an integrated approach to the operation and evolution of systems. Almost any attempt to articulate a theoretical foundation for IS (a TFIS) would need to cover that topic although other attempts might emphasize other topics and other viewpoints.

The proposed Theoretical Foundation for IS (TFIS) has three main goals:

1) Integration. Build outward from an integrated core. Do not accept the excuse …


Higher Education Advertising Expenditures’ Impact On The Key Performance Indicator Of New Enrollments Using Information Systems And Business Analytics, Alison Munsch Phd, Charles Cante Phd, Jason Diffenderfer Ma., M.S. Jan 2021

Higher Education Advertising Expenditures’ Impact On The Key Performance Indicator Of New Enrollments Using Information Systems And Business Analytics, Alison Munsch Phd, Charles Cante Phd, Jason Diffenderfer Ma., M.S.

Journal of International Technology and Information Management

The impact of advertising expenditures on student enrollments has not been explored extensively in the literature. The higher education sector demonstrated an increase in paid advertising but soft overall higher education enrollments recently. This research explored the relationship between advertising expenditures in higher education and new enrollments using information systems and business analytics. Results indicate a weak association between advertising expenditures in higher education and the key performance indicator of new student enrollments. A contribution of this study is to the media planning function and users of information systems and analytic techniques for actionable insights.


Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick Jul 2020

Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick

The African Journal of Information Systems

Research shows that the information systems domain is underrepresented in project complexity as it has only eight percent representation within the project complexity landscape. Emphasis is placed mostly on generic project management and engineering project management. This begs the question of how well IS project complexity is understood in literature? The goal of this research is to perform the groundwork for developing new theoretical foundations for information systems (IS) project complexity by enriching previous work. Complexity theory was applied to develop a comprehensive theoretical model for IS project complexity. The IS project complexity (ISPC) model was developed and revealed that …


Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook Aug 2019

Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook

Graduate Theses and Dissertations

The purpose of this study was to examine student perceptions of factors affecting the decision to select information systems as an undergraduate major. Additionally, information systems students were compared to other business students to see if significant differences existed between groups. The four factors studied included: (a) personal interest in the major, (b) student competence, (c) value and utility, and (d) external influences of other people and academic experiences.

A convenience sample was used at a public university in the Southeastern region of the United States. Two hundred junior/senior students were selected as participants. One hundred of the students were …


Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou Dec 2017

Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou

Marriott Student Review

Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.


A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek Feb 2017

A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek

Communications of the IIMA

Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably effective IT systems remains a significant challenge. This paper presents a light weight IT effectiveness model for small businesses to assess their IT and formulate strategies for improvement. Employing an action research approach we investigate a mixed method analysis of 120 survey responses from small family businesses and user participation in 10 semi-structured interviews. We then conduct critical reflection to identify refinements which are validated using 72 survey responses from university students. The results present compelling evidence that employees’ normative patterns (norms) are a significant driver …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2017

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi M. Kappers, PhD

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena Dec 2016

Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena

Graduate Theses and Dissertations

Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Oct 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Leila A. Halawi

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Publications

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Publications

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu Jul 2015

The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu

Information Technology & Decision Sciences Theses & Dissertations

Each year, huge investments into healthcare information systems (HIS) are being made all over the world. Despite the enormous cost for the hospitals, the overall benefits and costs of the healthcare information systems have not been deeply assessed. In recent years, much previous research has investigated the link between the implementation of Information Systems and the performance of organizations. Although the value of Healthcare Information System or Healthcare Information Technology (HIS/HIT) has been found in many studies, some questions remain unclear. Do HIS/HIT systems influence different hospitals the same way? How to understand and explain the mechanism that HIS/HIT improves …


Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa May 2015

Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa

Dissertations

A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …


An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth Apr 2015

An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth

Doctor of Business Administration Dissertations

This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.

Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …


Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation.


Green Freight Asia (C): The Road Ahead is the third and final part of the case series. It …


Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The first part, Green Freight Asia (A): Driving the Adoption of Sustainable Supply Chain Practices, chronicles the formation …


Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula Jan 2015

Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula

C. Jason Woodard

Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The second part, Green Freight Asia (B): Navigating Toward A Successful Partnership, explores how a collaborative partnership between …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer Aug 2014

How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer

Arnoud DE MEYER

The large majority of modern production companies have at their disposal a multitude of computer systems. The immediate challenge for these companies consists of integrating these computer systems and databases. How will one arrive at this integration? On the basis of a questionnaire administered in 1985, 1986 and 1987 among a group of large European manufacturers, one comes to the conclusion that this integration is one of the immediate priorities for this group of companies. They do not intend to implement turnkey systems. but instead will integrate the different databases and computer systems gradually. One can see emerging islands of …


Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord May 2014

Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord

Herbert J. Mattord

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …