Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,450 Full-Text Articles 5,918 Authors 3,557,654 Downloads 161 Institutions

All Articles in Management Information Systems

Faceted Search

4,450 full-text articles. Page 117 of 153.

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg 2013 University of Texas at Dallas

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Hybrid Mail And Lights-Out Factory, Jacob Johnsen 2013 SelectedWorks

Hybrid Mail And Lights-Out Factory, Jacob Johnsen

Jacob Johnsen, MSc

Based on new technological possibilities a completely automatic factory for production of letters is now possible. Jacob Johnsen explains how.


How Can African Countries Advance Their Outsourcing Industries: An Overview Of Possible Approaches, Pamela Abbott 2013 Department of Information Systems and Computing, Brunel University, West London, UK

How Can African Countries Advance Their Outsourcing Industries: An Overview Of Possible Approaches, Pamela Abbott

The African Journal of Information Systems

Offshore outsourcing has become a multi-billion dollar industry with global dominance. This editorial provides an overview of offshore outsourcing and identifies factors affecting success of offshore outsourcing in low-income countries.


Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter 2013 University of Wollongong

Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter

Dr Samuel Fosso Wamba

Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.


Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane 2013 University of Massachusetts Amherst

Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane

Open Access Dissertations

Identity has long been a prolific research interest for organizational scholars. Its popularity can be attributed to the development of post-bureaucratic organizations, where control is no longer achieved through external forms (i.e. rules and procedures), but rather, "softer" mechanisms, such as organizational culture and values. Examining identity therefore becomes crucial for understanding how employees internalize organizational goals to exhibit desired behaviors. While the predominant approach has been to analyze how organizations help shape, control, and regulate member identity, this project calls into question the assumption of organizational employment to explore the micro-processes of identity construction among a growing class of …


Evaluating Applicability Of E-Service Quality In Online Hotel Bookings, Seung Hyun Kim, A.J. Singh, Sungsik Yoon 2013 Michigan State University

Evaluating Applicability Of E-Service Quality In Online Hotel Bookings, Seung Hyun Kim, A.J. Singh, Sungsik Yoon

Hospitality Review

This study evaluates applicability of E-service quality measurements in the context of online hotel bookings. Data was collected from an online survey of undergraduate college students at two universities in the United States. The Transaction Process-based Framework (eTransQual) conceptualized by Bauer et al. (2006) was adapted, and the dimensionality of e-service quality was identified. The study identified process/reliability as the most important factor influencing overall quality of booking websites.


Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter 2013 University of San Francisco

Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter

Business Analytics and Information Systems

This paper presents a current, accessible, and overarching view of work system theory. WST is the core of an integrated body of theory that emerged from a long-term research project to develop a systems analysis and design method for business professionals called the work system method (WSM). After discussing WST’s basic premises and its two central frameworks, this paper summarizes the relationship between WST and WSM. It shows how experience with early versions of WSM led to three extensions of WST that addressed limitations-in-use in one of the central frameworks in WST. After comparisons with related theories, this paper closes …


Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter 2013 University of San Francisco

Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter

Steven Alter

This paper presents a current, accessible, and overarching view of work system theory. WST is the core of an integrated body of theory that emerged from a long-term research project to develop a systems analysis and design method for business professionals called the work system method (WSM). After discussing WST’s basic premises and its two central frameworks, this paper summarizes the relationship between WST and WSM. It shows how experience with early versions of WSM led to three extensions of WST that addressed limitations-in-use in one of the central frameworks in WST. After comparisons with related theories, this paper closes …


A Quantitative Analysis Of Business Process Reengineering And Organizational Resistance: The Case Of Uganda, Samali Violet Mlay, Irina Zlotnikova, Susan Watundu 2013 Makerere University Business School

A Quantitative Analysis Of Business Process Reengineering And Organizational Resistance: The Case Of Uganda, Samali Violet Mlay, Irina Zlotnikova, Susan Watundu

The African Journal of Information Systems

ABSTRACT

Despite efforts by many organisations to redesign their processes, many of them have not succeeded. The main objective of the study was to analyse the extent to which organisational resistance impacts on the implementation of BPR. We used survey methodology using a questionnaire for data collection. Descriptive analysis of factors that cause resistance was conducted and results showed that only 30.4% of BPR in Uganda have been successful. The results showed that the factors that impact on BPR implementation include; users’ awareness of BPR project, level of emotional response, organisational resistance, and failure of management to create awareness among …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther 2013 University of Texas at Dallas

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Emerging Risks And Systemic Concerns In Information Security Research And Applications Minitrack, Eliot Rich, Guido Schryen, Robert Minch 2013 University of Regensburg

Emerging Risks And Systemic Concerns In Information Security Research And Applications Minitrack, Eliot Rich, Guido Schryen, Robert Minch

Robert P. Minch

The pervasiveness of computer networks has increased our vulnerability to systems-based attacks. In response, organizations have increased the attention paid to computer-based threats to their information, systems, and processes. The effects of this scrutiny are not at all clear, and the intention to increase security does not always follow with the desired effect. This mini-track presents three sessions and a wide range of papers that look towards improving our understanding and readiness for an inherently unpredictable future.


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham 2013 University of Texas at Dallas

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Enabling Greater Access To Home Meal Delivery, Maciek Nowak, Leo Gala, Mike Hewitt 2013 Loyola University Chicago

Enabling Greater Access To Home Meal Delivery, Maciek Nowak, Leo Gala, Mike Hewitt

Information Systems and Operations Management: Faculty Publications & Other Works

Non-profit organizations like the Meals on Wheels (MOW) association of America prepare and deliver meals, typically daily, to approximately one million homebound citizens in the United States alone. However, many MOW agencies are facing a steadily increasing number of clients requesting meal service without an increase in resources (either financial or human). One strategy for accommodating these requests is to deliver multiple (frozen) meals at a time and thus make fewer delivers. However, many of the stakeholders (funders, volunteers, meal recipients) value the relationships that are developed by having a client receive daily deliveries from the same volunteer. Further, meal …


Online Course Evaluations Response Rates, Faruk Guder, Mary Malliaris 2013 Loyola University Chicago

Online Course Evaluations Response Rates, Faruk Guder, Mary Malliaris

Information Systems and Operations Management: Faculty Publications & Other Works

This paper studies the reasons for low response rates in online evaluations. Survey data are collected from the students to understand factors that might affect student participation in the course evaluation process. When course evaluations were opened to the student body, an email announcement was sent to all students, and a reminder email was sent a week later. Our study showed that participation rates increased not only when emails were sent, but also when faculty used in-class time to emphasize the importance of completing the evaluations.


Workforce Management In Periodic Delivery Operations, Karen Smilowitz, Maciek Nowak, Tingting Jiang 2013 Northwestern University

Workforce Management In Periodic Delivery Operations, Karen Smilowitz, Maciek Nowak, Tingting Jiang

Information Systems and Operations Management: Faculty Publications & Other Works

Service quality and driver efficiency in the delivery industry may be enhanced by increasing the regularity with which a driver visits the same set of customers. However, effectively managing a workforce of drivers may increase travel distance, a traditional metric of the vehicle routing problem (VRP). This paper evaluates the effect that workforce management has on routing costs, providing insight for managerial decision making. The analysis is presented in the context of the period vehicle routing problem (PVRP), an extension of the VRP with vehicle routes constructed to service customers according to preset visit frequencies over an established period of …


Managing Inventory In Global Supply Chains Facing Port-Of-Entry Disruption Risks, Alan Erera, Maciek Nowak, Chelsea White 2013 Georgia Institute of Technology - Main Campus

Managing Inventory In Global Supply Chains Facing Port-Of-Entry Disruption Risks, Alan Erera, Maciek Nowak, Chelsea White

Information Systems and Operations Management: Faculty Publications & Other Works

Ports-of-entry are critical components of the modern international supply chain infrastructure, particularly container seaports and airfreight hubs. The potential operational and economic impact resulting from their temporary closure is unknown, but is widely believed to be very significant. This paper investigates one aspect of this potential impact, focusing specifically on the use of supply chain inventory as a risk mitigation strategy for a one supplier, one customer system in which goods are transported through a port-of-entry subject to temporary closures. Closure likelihood and duration are modeled using a completely observed, exogenous Markov chain. Order lead times are dependent on the …


The Dynamic Impacts Of Employee Job Motivation On Employee Job Performance And Corporate Customer Satisfaction: The Contingent Role Of Erp System Implementation, Junyi Yang, Anjing Zhao, J.J. Po-An Hsieh, Kimmy Chan Wa 2013 Hong Kong Polytechnic University

The Dynamic Impacts Of Employee Job Motivation On Employee Job Performance And Corporate Customer Satisfaction: The Contingent Role Of Erp System Implementation, Junyi Yang, Anjing Zhao, J.J. Po-An Hsieh, Kimmy Chan Wa

Computer Information Systems Faculty Publications

Prior research has generally found a significant, positive impact of employees' job motivation on job performance, and which in turn, leads to more satisfied customers. However, little attention is directed towards how implementation of centralized information systems (IS), such as Enterprise Resource Planning (ERP) systems, will affect these relationships in the business to business (B2B) context. Toward this end, we plan to conduct a field study to empirically compare the effects of these relationships before and after the implementation of an ERP system. This cross-disciplinary study will contribute to the extant organization, marketing, and IS literature by examining how a …


Objective Measures Of Is Usage Behavior Under Conditions Of Experience And Pressure Using Eye Fixation Data, Andreas Eckhardt, Christian Maier, J.J. Po-An Hsieh, Tim Chuk, Antoni B. Chan, Janet H. Hsiao, Ricardo Buettner 2013 Goethe University

Objective Measures Of Is Usage Behavior Under Conditions Of Experience And Pressure Using Eye Fixation Data, Andreas Eckhardt, Christian Maier, J.J. Po-An Hsieh, Tim Chuk, Antoni B. Chan, Janet H. Hsiao, Ricardo Buettner

Computer Information Systems Faculty Publications

The core objective of this study is to understand individuals IS usage by going beyond the traditional subjective self-reported and objective system-log measures to unveil the delicate process through which users interact with IS. In this study, we conducted a laboratory experiment to capture users’ eye movement and, more importantly, applied a novel methodology that uses the Gaussian mixture model (GMM) to analyze the gathered physiological data. We also examine how performance pressure and prior usage experience of the investigative system affect IS usage patterns. Our results suggest that experienced and pressured users demonstrate more efficient and focused usage patterns …


Motivational Differences Across Post-Acceptance Is Usage Behaviors, Xixi Li, J.J. Po-An Hsieh, Arun Rai 2013 Georgia State University

Motivational Differences Across Post-Acceptance Is Usage Behaviors, Xixi Li, J.J. Po-An Hsieh, Arun Rai

Computer Information Systems Faculty Publications

We identify two post-acceptance information system (IS) usage behaviors related to how employees leverage implemented systems. While routine use (RTN) refers to employees’ using IS in a routine and standardized manner to support their work, innovative use (INV) describes employees’ discovering new ways to use IS to support their work. We use motivation theory as the overarching perspective to explain RTN and INV and appropriate the rich intrinsic motivation (RIM) concept from social psychology to propose a conceptualization of RIM toward IS use, which includes intrinsic motivation toward accomplishment (IMap), intrinsic motivation to know (IMkw), and intrinsic motivation to experience …


Exploring The Zone Of Tolerance For Internal Customers In It-Enabled Call Centers, J.J. Po-An Hsieh, Piyush Sharma, Arun Rai, A. Parasuraman 2013 Georgia State University

Exploring The Zone Of Tolerance For Internal Customers In It-Enabled Call Centers, J.J. Po-An Hsieh, Piyush Sharma, Arun Rai, A. Parasuraman

Computer Information Systems Faculty Publications

Today, call center employees’ service encounters with external customers are extensively supported with modern information technology (IT). However, prior research on service quality and zone of tolerance (ZOT) focuses primarily on external customers with little attention paid to how internal customers (e.g., service employees) respond to services provided by internal functions, particularly IT function that supports employees’ IT use. Drawing on theory of administrative behavior and IT success literature, we conducted a study at a call center of a telecommunications firm and found that the impact of internal IT service quality (ITSQ) on employees’ service quality (ESQ) to external customers, …


Digital Commons powered by bepress