Skip to main content

WMBA 6030 Managing Business Information Systems: Welcome & Course Readings

Welcome & Course Readings

Please find your required library readings below. See the link on the left for library skills and writing center support.

If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

WMBA 6030 Required Course Readings Course Readings

After clicking on a citation below, enter your myWalden user name and password at the prompt.

Please Ask a Librarian if you have any questions about the links.

Andriole, S. J. (2012). Managing technology in a 2.0 world. IT Professional Magazine, 14(1), 50-57. doi:

Ashford, W. (April 2, 2013). Putting security in context. Computer Weekly, 17-20.

Augusto, J., & Roper, M. (2008). Editorial. Enterprise Information Systems, 2(2), 97-99. doi:10.1080/17517570801927395

Beath, C., Becerra-Fernandez, I., Ross, J., & Short, J. (2012). Finding value in the information explosion. MIT Sloan Management Review, 53(4), 18-20. 

Biesdorf, S., Court, D., & Willmott, P. (2013). Big data: What's your plan?. Mckinsey Quarterly, (2), 40-51.

Borglund, E., Anderson, K., & Samuelsson, G. (2009). How Requirements of Record Managers Change After Implementing new Electronic Records Management Systems. Proceedings Of The European Conference On Information Management & Evaluation, 59-66.

Brooks, R. (2010). The development of A code of ethics: An online classroom approach to making connections between ethical foundations and the challenges presented by information technology. American Journal of Business Education, 3(10), 1-13. 

Carver, J. (2013). Importance of business continuity planning: ineffective data storage practices leave business data at risk. Operations Management (1755-1501), 39(3), 39-40.

Chen -- Shin-Tien, C., & Bao-Guang, C. (2012). The Effects of Absorptive Capacity and Decision Speed on Organizational Innovation: A Study of Organizational Structure as an Antecedent Variable. Contemporary Management Research, 8(1), 27-50.

Chen, Y., Ramamurthy, K. K., & Wen, K. (2012). Organizations' Information Security Policy Compliance: Stick or Carrot Approach?. Journal Of Management Information Systems, 29(3), 157-188.

Cloud Security Alliance  (2013).  Big Data Working Group Tackles Privacy and Security.  Information Management Journal, 47(1), 18.

Currier, G. (2010). The Top 10 Tech Trends of 2011. Baseline, (107), 20-25.

De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63-72.

Drnevich, P. L., & Croson, D. C. (2013). Information technology and business-level strategy: Toward an integrated theoretical perspective. MIS Quarterly, 37(2), 483-509.

Dunning, M. (2013). Continuity plan helped Silverstein get back to business earlier. Business Insurance, 47(1), 0007.

Gimun, K., Bongsik, S., Kyung Kyu, K., & Ho Geun, L. (2011). IT Capabilities, Process-Oriented Dynamic Capabilities, and Firm Financial Performance. Journal Of The Association For Information Systems, 12(7), 487-517.

Goldberg, E. (2013). Preventing a data breach from becoming a disaster. Journal Of Business Continuity & Emergency Planning, 6(4), 295-303.

Grigore, A.-M. (2014). Book Publishing Business in Romania - An Analysis from the Perspective of Porter’s Five Force Model. Review of International Comparative Management / Revista de Management Comparat International, 15(1), 31–47. 

Grover, V., & Kettinger, W. J. (1997). Special Section: The Impacts of Business Process Change on Organizational Performance. Journal Of Management Information Systems14(1), 9-12.

Hashjeen, T., Shoghi, B., Shafizadeh, R., & Eisapourchalanbar, H. (2013). The relationship between organizational structure and employee creativity. Australian Journal of Basic & Applied Sciences, 7(2), 237–242.

Hernandez, R. R., Mayernik, M. S., Murphy-Mariscal, M. L., & Allen, M. F. (2012). Advanced Technologies and Data Management Practices in Environmental Science: Lessons from Academia. Bioscience, 62(12), 1067-1076. doi:10.1525/bio.2012.62.12.8

High, P. (2011). Proceed with caution: The new normal: Now what? CIO Insight, (115,  January), 30-33.

Hui, K., Hui, W., & Yue, W. T. (2012). Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. Journal Of Management Information Systems, 29(3), 117-156.

Jin, K. K., & Drozdenko, R. (2010). Relationships among Perceived Organizational Core Values, Corporate Social Responsibility, Ethics, and Organizational Performance Outcomes: An Empirical Study of Information Technology Professionals. Journal Of Business Ethics, 92(3), 341-359. doi:10.1007/s10551-009-0158-1

Kant, C. (2009). Putting Your Enterprise Data in the Cloud? Top Considerations. Siliconindia, 12(8), 22-23.

Kennerfalk, L., & Klefsjo, B. (1995). A change process for adapting organizations to a total quality management strategy. Total Quality Management, 6(2), 187-197. doi:10.1080/09544129550035521

Kettinger, W. J., Teng, J. C., & Guha, S. (1997). Business Process Change: A Study of Methodologies, Techniques, and Tools. MIS Quarterly, 21(1), 55-98.

Khani, N., Nor, K., & Bahrami, M. (2011). IS/IT capability and Strategic Information System Planning (SISP) Success. International Management Review, 7(2), 75-83.

Knežević, S., Stanković, A., & Tepavac, R. (2012). Accounting Information System as a Platform for Business and Financial Decision-Making in the Company. Management (1820-0222), (65), 63-69. doi:10.7595/management.fon.2012.0033

Kolakowski, N. (2011). Remote access presents complexity, security issues. Eweek, 28(6), 18-22.

Lakshmi, B., Venkata, P., Kumar, K., Shahnaz Banu, A. S., & Reddy, K. A. (2013). Data confidentiality and loss prevention using virtual private database. International Journal on Computer Science & Engineering, 5(3),143–149

Loop, C. (2013). Integrating an incident management system within a continuity of operations programme: Case study of the Bank of Canada. Journal Of Business Continuity & Emergency Planning, 6(3), 272-281.

Martucci, W. C., & Oldvader, J. K. (2010). Workplace privacy and data security. Employment Relations Today (Wiley), 37(2), 59-66. doi:10.1002/ert.20299

Mingers, J., & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics, 34(4), 833-854.

Nicoll, S. R., & Owens, R. W. (2013). Emergency Response & Business Continuity. Professional Safety, 58(9), 50-55.

Olson, D. L., & Staley, J. (2012). Case study of open-source enterprise resource planning implementation in a small business. Enterprise Information Systems, 6(1), 79-94. doi:10.1080/17517575.2011.566697

Papaioannou, T. (2011). Technological innovation, global justice and politics of development. Progress In Development Studies, 11(4), 321-338. doi:10.1177/146499341001100404

Parker, R. (2012). The top ten tech issues. CA Magazine, 20-26.

Pierson, D. A. (2011). Five IT trends to accelerate your business. Central Penn Business Journal, 27(48), 15-17.

Process orientation. (2005). A to Z of Management Concepts & Models, 290-292.

Rahmati, V., Darouian, S., & Ahmadinia, H. (2012). A review on the effect of culture, structure, technology, and behavior on organizations. Australian Journal of Basic & Applied Sciences. 6(3), 128–135.  

Richardson, R. (2013). Surveying today’s security risks. Information Security, 15(1), 21-28.

Ritz, J. M., & Bevins, P. (2012). Economics, Innovations, Technology, and Engineering Education: The Connections. Journal Of Technology Studies, 38(2), 90-104.

Rudareanu, M., Fainisi, F., Bratu, S., Ilie, M., & Mutulescu, A. ( (2011). The law and the informational society: Electronic signature and electronic contracts. Economics, Management & Financial Markets, 6(2), 401-409.

Shaffer, C. (2012). Managing Data in the Cloud Age. (cover story). Drug Discovery & Development, 15(8), 10-12.

Tallon, P. P., & Pinsonneault, A. (2011). . Competing perspectives on the link between strategic information technology alignment and organizational agility: Insights from a mediation model. MIS Quarterly, 35(2), 463-486.

Tavares, E. (2009). The Interaction Between Individuals and Information Systems: Organizations and Individuals on the Same Side. Latin American Business Review, 10(4), 309-332. doi:10.1080/10978520903336653

Thamhain, H. J. (2011). Critical Success Factors for Managing Technology-Intensive Teams in the Global Enterprise. Engineering Management Journal, 23(3), 30-36.

Turulja, L., & Bajgorić, N. (2012). Being prepared for disaster? Implementation of business continuity planning concept in B&H organisations. Conference Proceedings: International Conference Of The Faculty Of Economics Sarajevo (ICES), 448-459.

Vickery, S. K., Droge, C. C., Setia, P. P., & Sambamurthy, V. V. (2010). Supply chain information technologies and organisational initiatives: complementary versus independent effects on agility and firm performance. International Journal Of Production Research, 48(23), 7025-7042. doi:10.1080/00207540903348353

White, D., Oelke, N. D., & Friesen, S. (2012). Management of a Large Qualitative Data Set: Establishing Trustworthiness of the Data. International Journal Of Qualitative Methods, 11(3), 244-258.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at