Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,433 Full-Text Articles 4,175 Authors 1,168,555 Downloads 133 Institutions

All Articles in Management Information Systems

Faceted Search

3,433 full-text articles. Page 1 of 109.

Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond SMITH 2019 Singapore Management University

Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond Smith

Research Collection Lee Kong Chian School Of Business

Earlier, business was not quite as dynamic, employment was intended for the long-term, and the idea of pay linked to performance was quite a dependable model. But as we examine the tradition of performance management in light of today's digital business models, there are a number of new questions that emerge.


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li 2019 Kennesaw State University

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app ...


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan VanSickle, Tamirat Abegaz, Bryson Payne 2019 University of North Georgia

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification ...


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne 2019 University of North Georgia

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by ...


A World Of Cyber Attacks (A Survey), mubarak Banisakher, Marwan Omar 2019 Saintleo University

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can ...


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam 2019 Kennesaw State University

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these ...


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward 2019 The University of Auckland

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It ...


Internet Core Functions: Security Today And Future State, Jeffrey Jones 2019 Kennesaw State University

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley 2019 InterContinental Hotels Group PLC

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker 2019 Central CT State University

What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker

Communications of the IIMA

Media analyses of soccer statistics and game play has accelerated in recent years. This is evident in visual displays of ball and player tracking, average player locations and distances they run. These media depictions aim to be attractive, entertaining and informative for viewers. But are such statistics predictive of goal scoring and match outcome? To answer this question we review the sixty-four matches of the 2014 World Cup and examine nine common match statistics, and others, to evaluate their predictive value for goal production and match outcome.


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng 2019 Fraunhofer IPA

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an iterative approach ...


Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins 2019 University of Cape Town

Investigating Usage Of Social Media Platforms In South Africa, Adheesh Budree, Kaja Fietkiewicz, Elmar Lins

The African Journal of Information Systems

This study investigated the differences in usage of different social media platforms within the South African context, broken down by user characteristics, specifically gender and age, in addition to investigating the correlation between usage of differing social media platforms. This was carried out to determine which social media needs do the different population groups aim to fulfill when using different social media platforms. Based on the results, the study confirmed the existence of preferences between types of social media platforms and groups of social media platforms in South Africa, based on frequency of use by age group and gender. Social ...


On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo 2019 University of the Witwatersrand

On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo

The African Journal of Information Systems

This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source ...


Mobile Technology Usage For Street Traders’ Market Search In Dodoma—Urban Tanzania: An Exploratory Study, Joel Rumanyika, Matti Tedre, Apiola Mikko, Nasibu Rajabu Mramba 2019 College of Business Education (CBE),Dodoma-Tanzania

Mobile Technology Usage For Street Traders’ Market Search In Dodoma—Urban Tanzania: An Exploratory Study, Joel Rumanyika, Matti Tedre, Apiola Mikko, Nasibu Rajabu Mramba

The African Journal of Information Systems

Increased access to mobile technologies has significantly contributed to almost all types of work, including informal work. Mobile phones are one such technology that has been exponentially adopted and used by street traders. However, there is limited information about how street traders use mobile phones to search for new markets. This study investigated street traders’ mobile usage for new market search in Dodoma, Tanzania. Qualitative data were collected using in-depth interviews with 29 street traders, followed by a focus group discussion with eight street traders. Thematic analysis was used to analyze the data. The results show that using mobile phones ...


Systems Approach To Evaluating Mih-Cp (Mobile Integrated Healthcare – Community Paramedicine): A Case Study Of East Baton Rouge Parish (Ebrp) Emergency Medical Services (Ems) Community Paramedicine Program Initiative, Oluwakemi Aiyedun 2019 Louisiana State University and Agricultural and Mechanical College

Systems Approach To Evaluating Mih-Cp (Mobile Integrated Healthcare – Community Paramedicine): A Case Study Of East Baton Rouge Parish (Ebrp) Emergency Medical Services (Ems) Community Paramedicine Program Initiative, Oluwakemi Aiyedun

LSU Doctoral Dissertations

This study applied a holistic method of healthcare program assessment, known as systems approach, to evaluate the efficacy of the East Baton Rouge Parish (EBRP) EMS Community-integrated Health Program (CIHP). The author developed assessment metrics following the Quadruple Aim Framework: IHI (Institute for Healthcare Improvement) Triple Aim + Provider Experience.

Results showed that the CP program in this study delivers high ratings on patient experience and provided a 51% return on investment (ROI) through reduced emergency service utilization, ED visits and inpatient hospital admissions. However, findings did not demonstrate meaningful improvement in patients’ health-related quality of life (HRQoL) and self-efficacy (SE ...


A Structure–Conduct–Performance Perspective Of How Strategic Supply Chain Integration Affects Firm Performance, Peter M. Ralston, Jennifer Blackhurst, David E. Cantor, Michael C. Crum 2019 University of West Florida

A Structure–Conduct–Performance Perspective Of How Strategic Supply Chain Integration Affects Firm Performance, Peter M. Ralston, Jennifer Blackhurst, David E. Cantor, Michael C. Crum

Michael R. Crum

There are several factors that affect a firm's ability to successfully integrate internally and externally for organizational improvement. This study seeks to understand the relationship between a firm's strategy, its supply chain integration efforts, and firm performance. Leveraging the theoretical lens of structure–conduct–performance from the industrial organization economics literature, and utilizing both archival and survey data, we describe how firms may align their internal and external supply chain integration strategies with customers and suppliers. In doing so, these internal and external integration strategies affect the firm's ability to respond to customer demand, which then impacts ...


Applied Deep Learning In Intelligent Transportation Systems And Embedding Exploration, Xiaoyuan Liang 2019 New Jersey Institute of Technology

Applied Deep Learning In Intelligent Transportation Systems And Embedding Exploration, Xiaoyuan Liang

Dissertations

Deep learning techniques have achieved tremendous success in many real applications in recent years and show their great potential in many areas including transportation. Even though transportation becomes increasingly indispensable in people’s daily life, its related problems, such as traffic congestion and energy waste, have not been completely solved, yet some problems have become even more critical. This dissertation focuses on solving the following fundamental problems: (1) passenger demand prediction, (2) transportation mode detection, (3) traffic light control, in the transportation field using deep learning. The dissertation also extends the application of deep learning to an embedding system for ...


Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston 2019 Iowa State University

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston

Peter Ralston

Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.

Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.

Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that require ...


Chs: Small: Support For The Academy Of Management Organizational Communication And Information Systems 2019 Doctoral Consortium, Katherine Chudoba 2019 Utah State University

Chs: Small: Support For The Academy Of Management Organizational Communication And Information Systems 2019 Doctoral Consortium, Katherine Chudoba

Funded Research Records

No abstract provided.


Effective Use Of Information Systems For Emergency Management: A Representation Theory Perspective, Dario Bonaretti 2019 Louisiana State University

Effective Use Of Information Systems For Emergency Management: A Representation Theory Perspective, Dario Bonaretti

LSU Doctoral Dissertations

Effective Use Theory (EUT) has emerged as a promising native Information Systems (IS) theory to understand a central phenomenon of interest to the discipline: the effective use of information systems. While EUT is widely accepted in operational control and management control contexts, its validity in chaotic environments has yet to be demonstrated. To contribute to the research program in EUT, scholars called for contextualizing and assessing EUT in chaotic environment, such as emergencies or crises events. This research seeks to apply EUT to understand the effective use of emergency information systems (EMIS). Seeking a grand theory of effective use in ...


Digital Commons powered by bepress