Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3552 Full-Text Articles 3912 Authors 730365 Downloads 112 Institutions

All Articles in Management Information Systems

Faceted Search

3552 full-text articles. Page 113 of 113.

The Enemy Is Still At The Gates, Threats To Information Security Revisited, M. Whitman, Herbert Mattord 2009 Kennesaw State University

The Enemy Is Still At The Gates, Threats To Information Security Revisited, M. Whitman, Herbert Mattord

Herbert J. Mattord

No abstract provided.


An Evaluation Of The Ability Of Rfid Tags To Withstand Distribution Of Fresh Produce In The Rpc Pooling System, Jay Singh, Paul Singh, Kyle Desautels, Koushik Saha, Eric Olsen 2009 California Polytechnic State University - San Luis Obispo

An Evaluation Of The Ability Of Rfid Tags To Withstand Distribution Of Fresh Produce In The Rpc Pooling System, Jay Singh, Paul Singh, Kyle Desautels, Koushik Saha, Eric Olsen

Eric Olsen

This study focused on the ability of radio frequency identification (RFID) tags applied on reusable plastic containers (RPCs) to withstand repeated abuse due to physical distribution and storage environment related hazards. It also studied the effect of the chemical cleaning environments that RPCs are commonly exposed to in the pooling/rental systems commonly used to distribute fresh produce. RPCs are being successfully deployed in the US, Europe and Asia to ship fresh produce from growers to retailers. The increasing demand for traceability and tracking of fresh produce from ‘farm to fork’ requires these containers to be monitored and identified in ...


Organizational Impact Of System Quality, Information Quality, And Service Quality, Toni Somers 2009 Wayne State University, School of Business Administration

Organizational Impact Of System Quality, Information Quality, And Service Quality, Toni Somers

Toni M. Somers

No abstract provided.


The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz Al-Debei, Guy Fitzgerald 2009 The University of Jordan

The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

This paper addresses the design and engineering problem related to mobile data services. The aim of the research is to inform and advise mobile service design and engineering by looking at this issue from a rigorous and holistic perspective. To this aim, this paper develops an ontology based on business model thinking. The developed ontology identifies four primary dimensions in designing business models of mobile data services: value proposition, value network, value architecture, and value finance. Within these dimensions, 15 key design concepts are identified along with their interrelationships and rules in the telecommunication service business model domain and unambiguous ...


Similarities And Differences Between Indian Born And Us Born It Workers, Pamila Dembla, Amy Woszczynski 2009 Kennesaw State University

Similarities And Differences Between Indian Born And Us Born It Workers, Pamila Dembla, Amy Woszczynski

Amy B. Woszczynski

No abstract provided.


How The Lack Of Prescriptive Technical Granularity In Hipaa Has Compromised Patient Privacy (Hipaa Ehr (Electronic Health Record) Systems Security Recommendations), Tim Wafa 2009 Loyola Law School

How The Lack Of Prescriptive Technical Granularity In Hipaa Has Compromised Patient Privacy (Hipaa Ehr (Electronic Health Record) Systems Security Recommendations), Tim Wafa

Tim Wafa

This paper argues that HIPAA legislation has a severe flaw within its architecture; a flaw which is severely compromising patient privacy. Although the drafters of the legislation recognized the importance of providing comprehensive privacy legislation at the federal level (to improve uniformity amongst states), they failed to recognize the importance highly specific ("granular") technical requirements play in facilitating improved privacy for patients. This paper suggests that HIPAA rules surrounding technology implementation give too much latitude to covered entities. Consequently, the rules fail to provide adequate protection to protected health information. HIPAA rules should be amended to mandate baseline technical granular ...


Dienstleistungen Für Independent Living: Kundenanforderungen, Potenzialbewertung Und Handlungsempfehlungen, Philipp Osl 2009 Institute of Information Management, University of St. Gallen

Dienstleistungen Für Independent Living: Kundenanforderungen, Potenzialbewertung Und Handlungsempfehlungen, Philipp Osl

Philipp Osl

Trotz intensiver Suche nach Lösungen, die ein Independent Living, d.h. ein unabhängiges und selbstbestimmtes Leben im Alter bei hoher Lebensqualität, ermöglichen, haben bislang nur wenige Geschäftsideen den Markteintritt auf breiter Front geschafft. Independent Living gilt weiterhin als Wachstumsmarkt und damit als Hoffnungsträger für viele Branchen. Hinsichtlich der Wege zur Erschliessung dieses Potenzials besteht aber grosse Unsicherheit. Um zukünftige betriebswirtschaftliche Innovationen im Bereich von Independent Living zu unterstützen, untersucht das vorliegende Buch die Nachfrage nach verschiedenen Dienstleistungen sowie die Kundenanforderungen an die unterschiedlichen Services. Im Rahmen einer Marktanalyse bestimmt es das Leistungs- und monetäre Marktvolumen für haushaltsnahe Services sowie ambulante ...


Konsortialforschung - Eine Methode Für Die Zusammenarbeit Von Forschung Und Praxis In Der Gestaltungsorientierten Wirtschaftsinformatikforschung, Hubert Oesterle 2009 University of St. Gallen

Konsortialforschung - Eine Methode Für Die Zusammenarbeit Von Forschung Und Praxis In Der Gestaltungsorientierten Wirtschaftsinformatikforschung, Hubert Oesterle

Hubert Oesterle

Gestaltungsorientierte Forschung in der Wirtschaftsinformatik strebt Ergebnisse an, welche den Anforderungen wissenschaftlicher Strenge und praktischer Relevanz gleichermaßen genügen. Jedoch stehen Forscher heutzutage vor der Herausforderung, überhaupt Zugang zur Wissensbasis in der Praxis zu erhalten und dieses Wissen zu erfassen. Vor diesem Hintergrund schlägt dieser Aufsatz eine Methode für Konsortialforschung vor, welche die multilaterale Zusammenarbeit zwischen Forschern und Praktikern im Forschungsprozess ermöglichen soll. Der Entwurf der Methode basiert auf einem selbstbewertenden Gestaltungsprozess, welcher sich über einen Zeitraum von über zwanzig Jahren erstreckte. Der Aufsatz trägt in zweifacher Weise zur wissenschaftlichen Diskussion bei. Zum einen adressiert er die wissenschaftliche Grundlage gestaltungsorientierter Forschung ...


The Re-Emergence Of Hybrid Mail, Jacob Johnsen 2009 Selected Works

The Re-Emergence Of Hybrid Mail, Jacob Johnsen

Jacob Johnsen, MSc

There is a revived interest in hybrid solution. With the convergence of digital and physical, posts can occupy the unique and pivotal space at the centre as described by Jacob Johnsen.


Organizational Impact Of System Quality, Information Quality, And Service Quality, Narasimhaiah Gorla, Toni M. Somers, Betty Wong 2009 Wayne State University, School of Business Administration

Organizational Impact Of System Quality, Information Quality, And Service Quality, Narasimhaiah Gorla, Toni M. Somers, Betty Wong

Toni M. Somers

No abstract provided.


Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner 2009 Selected Works

Gestaltungsorientierte Wirtschaftsinformatik: Ein Plädoyer Für Rigor Und Relevanz, Hubert Oesterle, Robert Winter, Walter Brenner

Hubert Oesterle

No abstract provided.


Using Realist Social Theory To Explain Project Outcomes, Michael J. Cuellar 2009 North Carolina Central University

Using Realist Social Theory To Explain Project Outcomes, Michael J. Cuellar

Michael J. Cuellar

In researching IS phenomena, many different theoretical lenses have been advanced. This paper proposes the use of Margaret Archer’s Morphogenetic Approach to Analytical Dualism (MAAD) as a social theoretic approach to explain why social phenomena may occur in a case study. This paper provides a brief overview to MAAD, providing a description of its tenets and methodology for use in an empirical study. As an example, the author applies MAAD to the implementation of Lotus Notes in the Alpha consulting organization as reported by Orlikowski (2000). This approach shows that the differential success of the implementation efforts in the ...


A Snapshot Of Results Of The Survey Study On Rfid Technology, S. F. Wamba 2009 University of Wollongong

A Snapshot Of Results Of The Survey Study On Rfid Technology, S. F. Wamba

Dr Samuel Fosso Wamba

No abstract provided.


Desk-Top Software Development Using Html Applications, John N. Dyer 2009 Georgia Southern University

Desk-Top Software Development Using Html Applications, John N. Dyer

John N. Dyer

While many business managers today have experience with office productivity software, internet browsing, and html development, few outside of the I.T. field have the knowledge, skills and experience in developing desk-top applications. The purpose of this article is to provide a relatively simple (but little known) method of developing and deploying Windows client-side applications, called html applications (HTA), using html, Windows Scripting Languages (WSL), and Windows COM and Objects. Few standard programming courses (with the exception of Visual Basic (VB)) include topics directly related to Windows application development. A recent literature review found no textbooks or journal articles, and ...


Accommondations, Sascha Vitzthum 2009 Illinois Wesleyan University

Accommondations, Sascha Vitzthum

Sascha Vitzthum

No abstract provided.


Digital Commons powered by bepress