Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Information systems

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 78

Full-Text Articles in Management Information Systems

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Capability Deployment In Crisis: Response To Asian Tsunami Disaster, Gary Pan Oct 2013

Capability Deployment In Crisis: Response To Asian Tsunami Disaster, Gary Pan

Research Collection School Of Accountancy

On 26 December 2004, an earthquake occurred under the Indian Ocean, 250 km northwest of the Indonesian island of Sumatra. According to the U.S. geological survey, the magnitude of the earthquake measured 9.0 on the Richter scale and the immense energy released from the earthquake triggered a series of tsunamis traveling at more than 600 km/h. The tsunami devastated the coastline of 13 countries, leaving more than 280,000 people dead and millions homeless. Soon after the disaster, the United Nations and the international community responded quickly with crisis relief operations for the nations affected. Unfortunately, these relief efforts soon ran …


The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino Jan 2013

The Use Of Complexity Theory And Strange Attractors To Understand And Explain Information System Development, Arthur P. Tomasino

2013

In spite of the best efforts of researchers and practitioners, Information Systems (IS) developers are having problems "getting it right". IS developments are challenged by the emergence of unanticipated IS characteristics undermining managers ability to predict and manage IS change. Because IS are complex, development formulas, best practices or development guides simply will not work. The difficulties in these system developments stem from the complexity of IS arising from the inter-relationship, interaction, and interconnectivity of the elements in the system and its environment. This research uses complexity concepts to help solve the problem with IS development and explain why so …


User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong Jan 2013

User Resistance And Trust In A Clinical Rfid Employee Location Tracking Information System, Wilson Wong

2013

User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first study to research the relative contributions of vendor trust and IT artifact trust components to user resistance and, as a result, makes a unique contribution to the information systems literature. An understanding of the degree to which technology adoption behavioral beliefs, and particularly system trust, affect user resistance towards information …


Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Dec 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Dr Holly Tootell

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus Dec 2012

Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus

Associate Professor Rajeev Sharma

Organisational culture is an important influence in shaping the organisational impacts of Information Systems. However, the conceptualisation and operationalisation of culture in empirical studies does not reflect the richness of the theoretical literature. In particular, our review finds that the dynamic, emergent and reciprocal nature of the IS-culture relationship has not been adequately examined in the empirical literature. This is partly due to the methodologies employed in existing research. Suggestions for enriching empirical research into the IS- culture relationship are discussed.


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Nov 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Associate Professor Peter Hyland

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen Jun 2012

Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen

Electronic Thesis and Dissertation Repository

Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.

Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.

The key findings of this research are fourfold. First, the core category developed in this …


Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell May 2012

Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.

The findings of this …


The Struggle For 'Appropriateness'-New Sources Of (Techno-) Stress, Stefan Schellhammer, Russell Haines, Stefan Klein Jan 2012

The Struggle For 'Appropriateness'-New Sources Of (Techno-) Stress, Stefan Schellhammer, Russell Haines, Stefan Klein

Information Technology & Decision Sciences Faculty Publications

Information and communication technologies are employed in every aspect of contemporary life. Facilitated by ICT, many innovations in the organization of work have taken hold. The effects of these developments on the quality of life are disputed. By referring to the phenomenon of ‘technostress,’ scholars’ caution against potentially harmful effects of ICT on workers’ health. This relatively new line of research roots the sources of stress for the individual in features of ICT. The present paper is motivated by the observation that ICT is also rooted in social relations. The way it is used is heavily influenced by social norms …


Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez Dec 2011

Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez

Maurice Dawson

Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive technology today. The survival of an architectural student depends on being able to communicate multiple drawings, graphics, images, diagrams and more in the most productive method. Each phase in design requires a clear and concise conversation between the designer and the observer. Schematic Designs generate some of the most creative ideas during a projects progression. With this understood, this section of …


Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed Dec 2011

Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed

Maurice Dawson

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …


The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell Dec 2011

The Role Of Leadership In Facilitating The Performance Of Dispersed Teamwork, Jaime Beth Newell

Graduate Theses and Dissertations

A mature body of research on leadership has investigated the impact of a variety of leadership behaviors and styles on team performance. This corpus of work is built on an assumption that team leaders can motivate, direct, and monitor teams by way of sustained, personal contact with team members. However, this assumption is being challenged by recent advances in information and communication technologies (ICTs). Use of ICTs has altered traditional team-based structures, enabling organizations to employ teams composed of members who are dispersed across geographic boundaries, while severing the direct, personal ties leaders have to team members. Recent reviews of …


Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley Dec 2011

Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley

Undergraduate Honors Capstone Projects

Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …


Health Information Systems Affordances: How The Materiality Of Information Technology Enables And Constrains The Work Practices Of Clinicians, Chad Anderson Aug 2011

Health Information Systems Affordances: How The Materiality Of Information Technology Enables And Constrains The Work Practices Of Clinicians, Chad Anderson

Computer Information Systems Dissertations

The IT artifact is at the core of the information systems (IS) discipline and yet most IS research does not directly theorize the IT artifact or its nomological network (Benbasat and Zmud 2003; Orlikowski and Iacono 2001). This research seeks to answer a repeated call for more direct engagement with the IT artifact and its nomological net with affordance theory adopted as the basis for this theoretical work. An exploratory case study was conducted to answer the research question, how do the material properties of health information systems enable and constrain the work practices of clinicians? The study was …


End-User Computing Applications, Mary C. Hill, W. Alan Barnes Jul 2011

End-User Computing Applications, Mary C. Hill, W. Alan Barnes

Faculty and Research Publications

Businesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in these applications has been increased by the requirements of the Sarbanes-Oxley Act of 2002, which call for management to document end-to-end financial operations and internal control structures. This article review …


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


Applying Systems Thinking To Knowledge Management Systems: The Case Of Pratt-Whitney Rocketdyne, Mark Chun, Kiho Sohn, Priscilla Arling, Nelson Granados Jan 2009

Applying Systems Thinking To Knowledge Management Systems: The Case Of Pratt-Whitney Rocketdyne, Mark Chun, Kiho Sohn, Priscilla Arling, Nelson Granados

Scholarship and Professional Work - Business

This paper describes Pratt-Whitney Rocketdyne's (PWR) use of a systems thinking methodology to define and improve knowledge management (KM) within the firm. Using systems thinking, the company identified and changed key behaviors within the KM environment and effectively established a generative learning environment. This manuscript is one of the first papers that analyzes and reports a real-world application of the systems thinking methodology to improve KM practices. We first review systems thinking concepts and adapt them to the KM context. We then present the case study of the application of systems thinking to KM at PWR. Finally, we use an …


The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar Jan 2009

The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar

Theses: Doctorates and Masters

This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault Sep 2008

Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault

Research Collection School Of Computing and Information Systems

Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm's own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete …


Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi Aug 2008

Digital Integration: Understanding The Concept And Its Environmental Predictors, Ricardo M. Checchi

Computer Information Systems Dissertations

This study investigates the impact of environmental factors on the decision to electronically integrate operations with international customers and/or suppliers. The following research question motivates the study: How does the environmental context affect the level of electronic integration of an organization with its international partners? This study elaborates on the concept of electronic integration. Studies on integration in general and electronic integration in particular adopt a loose definition of integration: they all agree in that integration is the opposite of markets, but they define this opposite in different terms: relationship contracting, long-term contracting, coordination, etc. Finally, the study also responds …


The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan May 2008

The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan

Dissertations

This dissertation investigated the impact of cultural differences in temporal perception on globally dispersed software development teams. Literature and anecdotal evidence suggest that these temporal differences affect individual communication quality, which in turn will affect individual satisfaction and trust within global teams. Additionally, the temporal dispersion of the team was expected to affect an individual's sense of temporal disruption which, in turn, was expected to affect individual satisfaction and trust. Differences in temporal perception were expected to moderate this impact on perceived temporal disruption. A Fortune 100 Company that carried out software testing in Ireland, the United States, China and …


Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R. Larsen Jan 2008

Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R. Larsen

Dirk Hovorka

Explanation of observed phenomena is a major objective of both those who conduct and those who apply research in Information Systems (IS). Whereas explanation based on the statistical relationship between independent and dependent variables is a common outcome of explanatory IS research, philosophers of science disagree about whether statistical relationships are the sole basis for the explanation of phenomena. The purpose of this paper is to introduce an expanded concept of explanation into the realm of IS research. We present a framework based on the four principle explanation types defined in modern philosophy: covering-law explanation, statistical-relevance explanation, contrast-class explanation, and …


Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke Jan 2008

Power Relationships In Information Systems Security Policy Formulation And Implementation, Michael Stephen Lapke

Theses and Dissertations

This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby …


Assessing The Performance Impacts Of Information Systems From The Resource-Based Perspective: An Empirical Test Of The Indirect Effect Of The Is, Michael J. Zhang Jan 2007

Assessing The Performance Impacts Of Information Systems From The Resource-Based Perspective: An Empirical Test Of The Indirect Effect Of The Is, Michael J. Zhang

WCBT Faculty Publications

Research into the strategic impacts of information systems (IS) from the resource-based view of competitive advantage has increasingly embraced the indirect effect of IS on firm performance; that is, IS interact with other complementary organizational resources in influencing firm performance. Using both survey and archival data, this study set out to test the indirect effect of IS and determine the complementary organizational resources contributing to IS impacts on firm performance. The results provide additional evidence in support of the indirect performance effect of IS. Specifically, the study found that the performance impacts of IS arose from their interactions with firm-specific …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …