Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (14)
- Management Information Systems (10)
- Information Security (8)
- Social and Behavioral Sciences (6)
- Software Engineering (4)
-
- Science and Technology Studies (3)
- Communication (2)
- Education (2)
- Library and Information Science (2)
- Systems Architecture (2)
- Adult and Continuing Education and Teaching (1)
- Archival Science (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Business Administration, Management, and Operations (1)
- Cataloging and Metadata (1)
- Computer Engineering (1)
- Data Storage Systems (1)
- Engineering (1)
- Health Information Technology (1)
- Higher Education (1)
- Higher Education and Teaching (1)
- International and Area Studies (1)
- Management Sciences and Quantitative Methods (1)
- Medicine and Health Sciences (1)
- Near and Middle Eastern Studies (1)
- OS and Networks (1)
- Institution
-
- New Jersey Institute of Technology (5)
- Singapore Management University (5)
- SelectedWorks (4)
- Nova Southeastern University (3)
- Claremont Colleges (2)
-
- Edith Cowan University (2)
- Institute of Business Administration (2)
- Old Dominion University (2)
- University for Business and Technology in Kosovo (2)
- University of Arkansas, Fayetteville (2)
- University of Nebraska at Omaha (2)
- Walden University (2)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- United Arab Emirates University (1)
- University of Windsor (1)
- Publication Year
- Publication
-
- Dissertations (5)
- Research Collection School Of Computing and Information Systems (5)
- CCE Theses and Dissertations (3)
- Umakant Mishra (3)
- Graduate Theses and Dissertations (2)
-
- Information Systems and Quantitative Analysis Faculty Publications (2)
- International Conference on Information and Communication Technologies (2)
- UBT International Conference (2)
- Walden Dissertations and Doctoral Studies (2)
- CGU Faculty Publications and Research (1)
- Computer Science Faculty Publications (1)
- Computer Science Publications (1)
- Health Services Research Dissertations (1)
- Journal of International Technology and Information Management (1)
- Open Educational Resources (1)
- Padmanabhan Krishnan (1)
- Research outputs 2012 (1)
- The Journal of Electronic Theses and Dissertations (1)
- The STEAM Journal (1)
- Theses: Doctorates and Masters (1)
- Publication Type
Articles 1 - 30 of 37
Full-Text Articles in Databases and Information Systems
Learning And Understanding User Interface Semantics From Heterogeneous Networks With Multimodal And Positional Attributes, Meng Kiat Gary Ang, Ee-Peng Lim
Learning And Understanding User Interface Semantics From Heterogeneous Networks With Multimodal And Positional Attributes, Meng Kiat Gary Ang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
User interfaces (UI) of desktop, web, and mobile applications involve a hierarchy of objects (e.g., applications, screens, view class, and other types of design objects) with multimodal (e.g., textual and visual) and positional (e.g., spatial location, sequence order, and hierarchy level) attributes. We can therefore represent a set of application UIs as a heterogeneous network with multimodal and positional attributes. Such a network not only represents how users understand the visual layout of UIs but also influences how users would interact with applications through these UIs. To model the UI semantics well for different UI annotation, search, and evaluation tasks, …
Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu
Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu
Research Collection School Of Computing and Information Systems
With the wide usage of data visualizations, a huge number of Scalable Vector Graphic (SVG)-based visualizations have been created and shared online. Accordingly, there has been an increasing interest in exploring how to retrieve perceptually similar visualizations from a large corpus, since it can benefit various downstream applications such as visualization recommendation. Existing methods mainly focus on the visual appearance of visualizations by regarding them as bitmap images. However, the structural information intrinsically existing in SVG-based visualizations is ignored. Such structural information can delineate the spatial and hierarchical relationship among visual elements, and characterize visualizations thoroughly from a new perspective. …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Streaminghub: Interactive Stream Analysis Workflows, Yasith Jayawardana, Vikas G. Ashok, Sampath Jayarathna
Streaminghub: Interactive Stream Analysis Workflows, Yasith Jayawardana, Vikas G. Ashok, Sampath Jayarathna
Computer Science Faculty Publications
Reusable data/code and reproducible analyses are foundational to quality research. This aspect, however, is often overlooked when designing interactive stream analysis workflows for time-series data (e.g., eye-tracking data). A mechanism to transmit informative metadata alongside data may allow such workflows to intelligently consume data, propagate metadata to downstream tasks, and thereby auto-generate reusable, reproducible analytic outputs with zero supervision. Moreover, a visual programming interface to design, develop, and execute such workflows may allow rapid prototyping for interdisciplinary research. Capitalizing on these ideas, we propose StreamingHub, a framework to build metadata propagating, interactive stream analysis workflows using visual programming. We conduct …
Building And Using Digital Libraries For Etds, Edward A. Fox
Building And Using Digital Libraries For Etds, Edward A. Fox
The Journal of Electronic Theses and Dissertations
Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …
Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet
Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet
Research Collection School Of Computing and Information Systems
Moving objects equipped with location-positioning devices continuously generate a large amount of spatio-temporal trajectory data. An interesting finding over a trajectory stream is a group of objects that are travelling together for a certain period of time. Existing studies on mining co-moving objects do not consider an important correlation between co-moving objects, which is the reoccurrence of the movement pattern. In this study, we define a problem of finding recurrent pattern of co-moving objects from streaming trajectories and propose an efficient solution that enables us to discover recent co-moving object patterns repeated within a given time period. Experimental results on …
Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah
Data Breach Consequences And Responses: A Multi-Method Investigation Of Stakeholders, Hamid Reza Nikkhah
Graduate Theses and Dissertations
The role of information in today’s economy is essential as organizations that can effectively store and leverage information about their stakeholders can gain an advantage in their markets. The extensive digitization of business information can make organizations vulnerable to data breaches. A data breach is the unauthorized access to sensitive, protected, or confidential data resulting in the compromise of information security. Data breaches affect not only the breached organization but also various related stakeholders. After a data breach, stakeholders of the breached organizations show negative behaviors, which causes the breached organizations to face financial and non-financial costs. As such, the …
The Concept Of Representation Capability Of Databases And Its Application In Is Development, Lishuan Qin, Junkang Feng
The Concept Of Representation Capability Of Databases And Its Application In Is Development, Lishuan Qin, Junkang Feng
Journal of International Technology and Information Management
The representation capability of an information system in general and a database in particular seems an important and yet elusive concept, which is concerned with, in our view, how a database ever becomes capable of representing real-world objects accurately or otherwise. To explore how to approach and then define this concept, we explore what is meant and required by the statement that a database connection (i.e., a connection between database constructs such as entities in an Entity-relationship (ER) diagram and relations in a relational schema that are made available by a database) refers to, represents and accurately represents a …
Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen
Zero Textbook Cost Syllabus For Cis 2200h (Introduction To Information Systems And Technologies), Curtis Izen
Open Educational Resources
This course introduces students to information systems in business. Due to the rapid developments in Information Technology (IT) and the dramatic changes brought by these new technologies in the way companies operate, compete and do business, familiarity with information systems has become indispensable for the leaders of today and tomorrow's organizations.
An Interview With The Scorpion: Walter O’Brien, Walter O'Brien
An Interview With The Scorpion: Walter O’Brien, Walter O'Brien
The STEAM Journal
An interview with Walter O'Brien (hacker handle: "Scorpion"), known as a businessman, information technologist, executive producer, and media personality who is the founder and CEO of Scorpion Computer Services, Inc. O'Brien is also the inspiration for and executive producer of the CBS television series, Scorpion.
Improving Business Networking Through The Effective Utilisation Of Information Systems, Ylber Limani
Improving Business Networking Through The Effective Utilisation Of Information Systems, Ylber Limani
UBT International Conference
This Research addresses topics concerned with the enterprise models and information systems. The research is divided into two parts, in the first part is conducted the examination of business information systems in general, while in the second part the main factors of business networking are investigated.
The existing operational business practices and Information Technology infrastructure are not sufficiently used of efficiently sustain the effective business networking. A methodical analysis of the operational systems is performed in order to cover the main elements of the Information Systems and their utilisation for business needs. The implementation of a most important information business …
The Implementation Of Information Systems In Network Administration: The Improvement Of Intranet Utilization In Higher Education Institutions, Besnik Skenderi, Murat Retkoceri, Rina Sadriu
The Implementation Of Information Systems In Network Administration: The Improvement Of Intranet Utilization In Higher Education Institutions, Besnik Skenderi, Murat Retkoceri, Rina Sadriu
UBT International Conference
Management Information systems or MIS broadly refers to a Computer system of Information that provides manager the tool to organize, Asses and manage efficiently departments within an organization.
Information System Management serves to assist in the more effective and efficient management of information. These systems make possible the production and preservation.
Nowadays the business, institutions and organization use MIS to certain functions or the entire organization. Some of the most important applicants are in dimensions or functions such as human resources, finance, marketing, manufacturing, asset management etc.
The primary definition shows that the primary task of management information system (MIS. …
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
CCE Theses and Dissertations
The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …
Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi
Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi
CCE Theses and Dissertations
Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig
CCE Theses and Dissertations
Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.
Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …
On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim
On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
In this paper, we analyze factors that determine the check-in decisions of users on venues using a location-based social network dataset. Based on a Foursquare dataset constructed from Singapore-based users, we devise a stringent criteria to identify the actual home locations of a subset of users. Using these users' check-ins, we aim to ascertain the neighborhood effect on the venues visited, compared with the activity level of users. We further formulate the check-in count prediction and check-in prediction tasks. A comprehensive set of features have been defined and they encompass information from users, venues, their neighbors, and friendship networks. We …
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Continuous Monitoring Of Enterprise Risks: A Delphi Feasibility Study, Robert Baksa
Dissertations
A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly …
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey
Walden Dissertations and Doctoral Studies
Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Health Services Research Dissertations
States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow
Graduate Theses and Dissertations
Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.
MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
Wikis: Transactive Memory Systems In Digital Form, Paul Jackson
Wikis: Transactive Memory Systems In Digital Form, Paul Jackson
Research outputs 2012
Wikis embed information about authors, tags, hyperlinks and other metadata into the information they create. Wiki functions use this metadata to provide pointers which allow users to track down, or be informed of, the information they need. In this paper we provide a firm theoretical conceptualization for this type of activity by showing how this metadata provides a digital foundation for a Transactive Memory System (TMS). TMS is a construct from group psychology which defines directory-based knowledge sharing processes to explain the phenomenon of "group mind". We analyzed the functions and data of two leading Wiki products to understand where …
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby
International Conference on Information and Communication Technologies
Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …
Ore: A Framework To Measure Organizational Risk During Information Systems Evolution, Aditya Agrawal, Gavin Finnie, Padmanabhan Krishnan
Ore: A Framework To Measure Organizational Risk During Information Systems Evolution, Aditya Agrawal, Gavin Finnie, Padmanabhan Krishnan
Padmanabhan Krishnan
Information systems (IS) change initiatives often represent the single largest investment (and therefore risk) for large corporations, yet there exist few management frameworks in the literature to help decision makers measure organizational risk in a balanced manner during this organization-wide change process. The ORE framework has been developed as a design science artifact based on the Leavitt diamond paradigm as a multi-criteria, relative risk, condition consequence, management decision framework enabling decision makers to calculate and compare risk evolution at fixed points of the change cycle and make structured and balanced risk mitigation decisions. In this chapter the principles, architecture and …
The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar
The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar
Theses: Doctorates and Masters
This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …
Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault
Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault
Research Collection School Of Computing and Information Systems
Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm's own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete …
The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan
The Impact Of Cultural Differences In Temporal Perception On Global Software Development Teams, Richard William Egan
Dissertations
This dissertation investigated the impact of cultural differences in temporal perception on globally dispersed software development teams. Literature and anecdotal evidence suggest that these temporal differences affect individual communication quality, which in turn will affect individual satisfaction and trust within global teams. Additionally, the temporal dispersion of the team was expected to affect an individual's sense of temporal disruption which, in turn, was expected to affect individual satisfaction and trust. Differences in temporal perception were expected to moderate this impact on perceived temporal disruption. A Fortune 100 Company that carried out software testing in Ireland, the United States, China and …
Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu
Supporting Individual Time Management Through The Capture And Display Of Temporal Structures, Dezhi Wu
Dissertations
This thesis work examines the time management strategies of individuals in an academic institution and gathers information on the complex temporal structures they experience and manage. Its focus is on understanding the relationship between the quality of individual time management and an individual's understanding and use of temporal structures. This work consists of an exploratory field study to gather data on how people use temporal structures with electronic tools. It is followed by a survey that is given to a larger group of respondents in the same subject population examined with the field study. The survey examines the hypotheses developed …