Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (18)
- Physical Sciences and Mathematics (18)
- Business Administration, Management, and Operations (10)
- Databases and Information Systems (10)
- Education (10)
-
- Engineering (8)
- Technology and Innovation (8)
- Computer Engineering (6)
- Operations and Supply Chain Management (6)
- Social and Behavioral Sciences (6)
- Curriculum and Instruction (5)
- Information Security (5)
- Management Sciences and Quantitative Methods (5)
- Nonprofit Administration and Management (5)
- Higher Education (4)
- Accounting (3)
- Business and Corporate Communications (3)
- Computer and Systems Architecture (3)
- Engineering Education (3)
- Marketing (3)
- Medicine and Health Sciences (3)
- OS and Networks (3)
- Strategic Management Policy (3)
- Business Analytics (2)
- Curriculum and Social Inquiry (2)
- Digital Communications and Networking (2)
- E-Commerce (2)
- Educational Methods (2)
- Institution
-
- Selected Works (21)
- California State University, San Bernardino (6)
- Kennesaw State University (5)
- New Jersey Institute of Technology (5)
- Singapore Management University (4)
-
- University of Arkansas, Fayetteville (4)
- Air Force Institute of Technology (3)
- Bentley University (2)
- Butler University (2)
- Embry-Riddle Aeronautical University (2)
- Georgia State University (2)
- Louisiana Tech University (2)
- Old Dominion University (2)
- Utah State University (2)
- Brigham Young University (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Georgia Southern University (1)
- Nova Southeastern University (1)
- Sacred Heart University (1)
- SelectedWorks (1)
- The University of San Francisco (1)
- UL SEB (1)
- University of Central Florida (1)
- University of Massachusetts Boston (1)
- University of Richmond (1)
- University of Texas Rio Grande Valley (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Publication Year
- Publication
-
- Maurice Dawson (9)
- Dissertations (5)
- Graduate Theses and Dissertations (4)
- Theses and Dissertations (4)
- C. Jason Woodard (3)
-
- Journal of International Technology and Information Management (3)
- 2013 (2)
- Computer Information Systems Dissertations (2)
- Doctoral Dissertations (2)
- Faculty and Research Publications (2)
- Journal of International Information Management (2)
- Publications (2)
- Research Collection School Of Computing and Information Systems (2)
- Scholarship and Professional Work - Business (2)
- The African Journal of Information Systems (2)
- Wendi M. Kappers, PhD (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Arnoud DE MEYER (1)
- Associate Professor Peter Hyland (1)
- Associate Professor Rajeev Sharma (1)
- Business Analytics and Information Systems (1)
- CCE Theses and Dissertations (1)
- CGU Faculty Publications and Research (1)
- Communications of the IIMA (1)
- David A. Bray (1)
- Dirk Hovorka (1)
- Doctor of Business Administration Dissertations (1)
- Dr Holly Tootell (1)
- Economic and Business Review (1)
- Electronic Theses and Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 77
Full-Text Articles in Management Information Systems
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Creativity In Information Systems Research: A Systematic Literature Review, Mojca Simonovič, Aleš Popovič, Matej Černe
Economic and Business Review
For more than six decades, creativity has been the cornerstone of diverse scientific disciplines, including psychology, sociology, and organizational behavior (OB) studies. Its fundamental role in guiding business prospects, driving development, and fueling economic growth has made it an essential research theme in many fields. Yet, despite its importance, scholars within the information systems (IS) discipline have highlighted the significant lack of attention paid to this concept in their research. The transformative role creativity plays in contemporary business environments, along with the ever-present need to innovate, compete, and grow, sparked our curiosity. Is creativity still an understudied area in the …
Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi
Explaining Variation In Adoption Of Organizational Innovation: A Social Network Approach, Pooria Assadi
Journal of International Technology and Information Management
This article draws from the social network theory and examines how a social network approach can contribute to our understanding of the variation in the adoption of innovative, organization-wide information systems that can help businesses achieve sustainable competitive advantage. It highlights how the extant explanations for the adoption of information systems are limited in the way that they primarily assume organizations make innovation adoption decisions in isolation. It does so by building on growing research which recognizes that organizations are not isolated from one another; rather, they are interrelated through their inter-organizational networks which provide unique learning opportunities that are …
Using Information Systems To Help Chatham County With Dental Services, Taylor Gray
Using Information Systems To Help Chatham County With Dental Services, Taylor Gray
Honors College Theses
Due to the extreme lack of access to dental work in Chatham county, this consulting thesis was formed. I assisted the Chatham County Safety Net Planning Council by using information systems to help with dental assistance in the county both short and long term. This is a very important issue in the county and it has caused many issues among people without dental insurance. I helped by creating a website platform for the Chatham County Safety Net, and used data analysis to help make the event more streamlined.
Editorial Board Memberships: A Report On The Status Of The Leading Information Systems Journals, Erastus Karanja, Alisha D. Malloy
Editorial Board Memberships: A Report On The Status Of The Leading Information Systems Journals, Erastus Karanja, Alisha D. Malloy
Journal of International Technology and Information Management
Research journals play a significant role in the generation, dissemination, and sharing of knowledge in an academic discipline. To a great extent, the editorial board members of these research journals manage and control the generation, dissemination, and sharing of knowledge. They also act as policymakers, gatekeepers, and trendsetters. In their latter roles, editorial board members can influence several factors in a discipline; namely, the research topics, the research methods, the research scope, and whose articles are published. The primary goal of this study is to investigate and report on the status of the editorial boards memberships in a set of …
A Framework For Accessing Patient Big Data: Ant View Of A South African Health Facility, Sibulela Mgudlwa, Tiko Iyamu
A Framework For Accessing Patient Big Data: Ant View Of A South African Health Facility, Sibulela Mgudlwa, Tiko Iyamu
The African Journal of Information Systems
This study was undertaken to develop a framework that can be used to guide analysis when translating and transforming big data into a more purposeful resource for healthcare service delivery in South Africa. It is intended to assist in addressing some of the challenges encountered by healthcare facilities. Qualitative data were collected, with a focus on the types of interactions that happen between actors when accessing and using patients’ big data for healthcare services. Actor-network theory (ANT) was applied as a lens in the analysis of the data, to examine the relationships between actors when accessing and using big data …
A Proposed Theoretical Foundation For The Information Systems Discipline (Version 1. 1), Steven Alter
A Proposed Theoretical Foundation For The Information Systems Discipline (Version 1. 1), Steven Alter
Business Analytics and Information Systems
“Rethink the theoretical foundations of the IS discipline” is one of the grand challenges for IS research identified in a Delphi study in Business Information Systems Engineering (Becker et al., 2015). This draft addresses that challenge directly through an integrated approach to the operation and evolution of systems. Almost any attempt to articulate a theoretical foundation for IS (a TFIS) would need to cover that topic although other attempts might emphasize other topics and other viewpoints.
The proposed Theoretical Foundation for IS (TFIS) has three main goals:
1) Integration. Build outward from an integrated core. Do not accept the excuse …
Higher Education Advertising Expenditures’ Impact On The Key Performance Indicator Of New Enrollments Using Information Systems And Business Analytics, Alison Munsch Phd, Charles Cante Phd, Jason Diffenderfer Ma., M.S.
Higher Education Advertising Expenditures’ Impact On The Key Performance Indicator Of New Enrollments Using Information Systems And Business Analytics, Alison Munsch Phd, Charles Cante Phd, Jason Diffenderfer Ma., M.S.
Journal of International Technology and Information Management
The impact of advertising expenditures on student enrollments has not been explored extensively in the literature. The higher education sector demonstrated an increase in paid advertising but soft overall higher education enrollments recently. This research explored the relationship between advertising expenditures in higher education and new enrollments using information systems and business analytics. Results indicate a weak association between advertising expenditures in higher education and the key performance indicator of new student enrollments. A contribution of this study is to the media planning function and users of information systems and analytic techniques for actionable insights.
Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick
Clarifying Is Project Complexity Through Factor Analysis, Nazeer Joseph, Carl Marnewick
The African Journal of Information Systems
Research shows that the information systems domain is underrepresented in project complexity as it has only eight percent representation within the project complexity landscape. Emphasis is placed mostly on generic project management and engineering project management. This begs the question of how well IS project complexity is understood in literature? The goal of this research is to perform the groundwork for developing new theoretical foundations for information systems (IS) project complexity by enriching previous work. Complexity theory was applied to develop a comprehensive theoretical model for IS project complexity. The IS project complexity (ISPC) model was developed and revealed that …
Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook
Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook
Graduate Theses and Dissertations
The purpose of this study was to examine student perceptions of factors affecting the decision to select information systems as an undergraduate major. Additionally, information systems students were compared to other business students to see if significant differences existed between groups. The four factors studied included: (a) personal interest in the major, (b) student competence, (c) value and utility, and (d) external influences of other people and academic experiences.
A convenience sample was used at a public university in the Southeastern region of the United States. Two hundred junior/senior students were selected as participants. One hundred of the students were …
Pre-Management? How To Best Prepare: A Brief Overview For Potential Accounting, Finance, And Information Systems Students, Ammon Kou
Marriott Student Review
Many pre-management students are curious about the accounting, finance, and information systems majors offered at BYU. This article features an overview of each major and how best to prepare for those majors’ programs.
A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek
A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek
Communications of the IIMA
Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably effective IT systems remains a significant challenge. This paper presents a light weight IT effectiveness model for small businesses to assess their IT and formulate strategies for improvement. Employing an action research approach we investigate a mixed method analysis of 120 survey responses from small family businesses and user participation in 10 semi-structured interviews. We then conduct critical reflection to identify refinements which are validated using 72 survey responses from university students. The results present compelling evidence that employees’ normative patterns (norms) are a significant driver …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Wendi M. Kappers, PhD
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Wendi M. Kappers, PhD
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena
Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena
Graduate Theses and Dissertations
Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Leila A. Halawi
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu
The Value Of Integrated Information Systems For U.S. General Hospitals, Liuliu Fu
Information Technology & Decision Sciences Theses & Dissertations
Each year, huge investments into healthcare information systems (HIS) are being made all over the world. Despite the enormous cost for the hospitals, the overall benefits and costs of the healthcare information systems have not been deeply assessed. In recent years, much previous research has investigated the link between the implementation of Information Systems and the performance of organizations. Although the value of Healthcare Information System or Healthcare Information Technology (HIS/HIT) has been found in many studies, some questions remain unclear. Do HIS/HIT systems influence different hospitals the same way? How to understand and explain the mechanism that HIS/HIT improves …
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Dissertations
A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …
An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth
An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth
Doctor of Business Administration Dissertations
This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.
Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …
Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula
Green Freight Asia (C): The Road Ahead, Jason Woodard, Christopher Dula
C. Jason Woodard
Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation.
Green Freight Asia (C): The Road Ahead is the third and final part of the case series. It …
Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula
Green Freight Asia (A): Driving The Adoption Of Sustainable Supply Chain Practices, Jason Woodard, Christopher Dula
C. Jason Woodard
Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The first part, Green Freight Asia (A): Driving the Adoption of Sustainable Supply Chain Practices, chronicles the formation …
Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula
Green Freight Asia (B): Navigating Toward A Successful Partnership, Jason Woodard, Christopher Dula
C. Jason Woodard
Green Freight Asia is a three-part case series featured in the 2014 APEX Business-IT Global Case Challenge. The case is best used for group projects or workshop assignments concerning business-IT related topics. In this case, students take on the role of a small firm pitching to collaborate with GFA on an IT solution partnership to support GFA’s programme for the adoption of green freight practices in the Asia Pacific region. The case could also be adapted for classroom facilitation with adequate preparation. The second part, Green Freight Asia (B): Navigating Toward A Successful Partnership, explores how a collaborative partnership between …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer
How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer
Arnoud DE MEYER
The large majority of modern production companies have at their disposal a multitude of computer systems. The immediate challenge for these companies consists of integrating these computer systems and databases. How will one arrive at this integration? On the basis of a questionnaire administered in 1985, 1986 and 1987 among a group of large European manufacturers, one comes to the conclusion that this integration is one of the immediate priorities for this group of companies. They do not intend to implement turnkey systems. but instead will integrate the different databases and computer systems gradually. One can see emerging islands of …
Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord
Readings And Cases In The Management Of Information Security, Michael Whitman, Herbert Mattord
Herbert J. Mattord
These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …