Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, 2013 University of Texas at Dallas
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Hybrid Mail And Lights-Out Factory, 2013 SelectedWorks
Hybrid Mail And Lights-Out Factory, Jacob Johnsen
Jacob Johnsen, MSc
Based on new technological possibilities a completely automatic factory for production of letters is now possible. Jacob Johnsen explains how.
How Can African Countries Advance Their Outsourcing Industries: An Overview Of Possible Approaches, 2013 Department of Information Systems and Computing, Brunel University, West London, UK
How Can African Countries Advance Their Outsourcing Industries: An Overview Of Possible Approaches, Pamela Abbott
The African Journal of Information Systems
Offshore outsourcing has become a multi-billion dollar industry with global dominance. This editorial provides an overview of offshore outsourcing and identifies factors affecting success of offshore outsourcing in low-income countries.
Twitter Adoption And Use By Smes: An Empirical Study, 2013 University of Wollongong
Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter
Dr Samuel Fosso Wamba
Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.
Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, 2013 University of Massachusetts Amherst
Coaching The Self: Identity Work(Ing) And The Self-Employed Professional, Sinéad Grace Ruane
Open Access Dissertations
Identity has long been a prolific research interest for organizational scholars. Its popularity can be attributed to the development of post-bureaucratic organizations, where control is no longer achieved through external forms (i.e. rules and procedures), but rather, "softer" mechanisms, such as organizational culture and values. Examining identity therefore becomes crucial for understanding how employees internalize organizational goals to exhibit desired behaviors. While the predominant approach has been to analyze how organizations help shape, control, and regulate member identity, this project calls into question the assumption of organizational employment to explore the micro-processes of identity construction among a growing class of …
Evaluating Applicability Of E-Service Quality In Online Hotel Bookings, 2013 Michigan State University
Evaluating Applicability Of E-Service Quality In Online Hotel Bookings, Seung Hyun Kim, A.J. Singh, Sungsik Yoon
Hospitality Review
This study evaluates applicability of E-service quality measurements in the context of online hotel bookings. Data was collected from an online survey of undergraduate college students at two universities in the United States. The Transaction Process-based Framework (eTransQual) conceptualized by Bauer et al. (2006) was adapted, and the dimensionality of e-service quality was identified. The study identified process/reliability as the most important factor influencing overall quality of booking websites.
Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, 2013 University of San Francisco
Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter
Business Analytics and Information Systems
This paper presents a current, accessible, and overarching view of work system theory. WST is the core of an integrated body of theory that emerged from a long-term research project to develop a systems analysis and design method for business professionals called the work system method (WSM). After discussing WST’s basic premises and its two central frameworks, this paper summarizes the relationship between WST and WSM. It shows how experience with early versions of WSM led to three extensions of WST that addressed limitations-in-use in one of the central frameworks in WST. After comparisons with related theories, this paper closes …
Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, 2013 University of San Francisco
Work System Theory: Overview Of Core Concepts, Extensions, And Challenges For The Future, Steven Alter
Steven Alter
This paper presents a current, accessible, and overarching view of work system theory. WST is the core of an integrated body of theory that emerged from a long-term research project to develop a systems analysis and design method for business professionals called the work system method (WSM). After discussing WST’s basic premises and its two central frameworks, this paper summarizes the relationship between WST and WSM. It shows how experience with early versions of WSM led to three extensions of WST that addressed limitations-in-use in one of the central frameworks in WST. After comparisons with related theories, this paper closes …
A Quantitative Analysis Of Business Process Reengineering And Organizational Resistance: The Case Of Uganda, 2013 Makerere University Business School
A Quantitative Analysis Of Business Process Reengineering And Organizational Resistance: The Case Of Uganda, Samali Violet Mlay, Irina Zlotnikova, Susan Watundu
The African Journal of Information Systems
ABSTRACT
Despite efforts by many organisations to redesign their processes, many of them have not succeeded. The main objective of the study was to analyse the extent to which organisational resistance impacts on the implementation of BPR. We used survey methodology using a questionnaire for data collection. Descriptive analysis of factors that cause resistance was conducted and results showed that only 30.4% of BPR in Uganda have been successful. The results showed that the factors that impact on BPR implementation include; users’ awareness of BPR project, level of emotional response, organisational resistance, and failure of management to create awareness among …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, 2013 University of Texas at Dallas
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Emerging Risks And Systemic Concerns In Information Security Research And Applications Minitrack, 2013 University of Regensburg
Emerging Risks And Systemic Concerns In Information Security Research And Applications Minitrack, Eliot Rich, Guido Schryen, Robert Minch
Robert P. Minch
The pervasiveness of computer networks has increased our vulnerability to systems-based attacks. In response, organizations have increased the attention paid to computer-based threats to their information, systems, and processes. The effects of this scrutiny are not at all clear, and the intention to increase security does not always follow with the desired effect. This mini-track presents three sessions and a wide range of papers that look towards improving our understanding and readiness for an inherently unpredictable future.
Cyber Operations Bridging From Concept To Cyber Superiority, 2013 University of Texas at Dallas
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Enabling Greater Access To Home Meal Delivery, 2013 Loyola University Chicago
Enabling Greater Access To Home Meal Delivery, Maciek Nowak, Leo Gala, Mike Hewitt
Information Systems and Operations Management: Faculty Publications & Other Works
Non-profit organizations like the Meals on Wheels (MOW) association of America prepare and deliver meals, typically daily, to approximately one million homebound citizens in the United States alone. However, many MOW agencies are facing a steadily increasing number of clients requesting meal service without an increase in resources (either financial or human). One strategy for accommodating these requests is to deliver multiple (frozen) meals at a time and thus make fewer delivers. However, many of the stakeholders (funders, volunteers, meal recipients) value the relationships that are developed by having a client receive daily deliveries from the same volunteer. Further, meal …
Online Course Evaluations Response Rates, 2013 Loyola University Chicago
Online Course Evaluations Response Rates, Faruk Guder, Mary Malliaris
Information Systems and Operations Management: Faculty Publications & Other Works
This paper studies the reasons for low response rates in online evaluations. Survey data are collected from the students to understand factors that might affect student participation in the course evaluation process. When course evaluations were opened to the student body, an email announcement was sent to all students, and a reminder email was sent a week later. Our study showed that participation rates increased not only when emails were sent, but also when faculty used in-class time to emphasize the importance of completing the evaluations.
Workforce Management In Periodic Delivery Operations, 2013 Northwestern University
Workforce Management In Periodic Delivery Operations, Karen Smilowitz, Maciek Nowak, Tingting Jiang
Information Systems and Operations Management: Faculty Publications & Other Works
Service quality and driver efficiency in the delivery industry may be enhanced by increasing the regularity with which a driver visits the same set of customers. However, effectively managing a workforce of drivers may increase travel distance, a traditional metric of the vehicle routing problem (VRP). This paper evaluates the effect that workforce management has on routing costs, providing insight for managerial decision making. The analysis is presented in the context of the period vehicle routing problem (PVRP), an extension of the VRP with vehicle routes constructed to service customers according to preset visit frequencies over an established period of …
Managing Inventory In Global Supply Chains Facing Port-Of-Entry Disruption Risks, 2013 Georgia Institute of Technology - Main Campus
Managing Inventory In Global Supply Chains Facing Port-Of-Entry Disruption Risks, Alan Erera, Maciek Nowak, Chelsea White
Information Systems and Operations Management: Faculty Publications & Other Works
Ports-of-entry are critical components of the modern international supply chain infrastructure, particularly container seaports and airfreight hubs. The potential operational and economic impact resulting from their temporary closure is unknown, but is widely believed to be very significant. This paper investigates one aspect of this potential impact, focusing specifically on the use of supply chain inventory as a risk mitigation strategy for a one supplier, one customer system in which goods are transported through a port-of-entry subject to temporary closures. Closure likelihood and duration are modeled using a completely observed, exogenous Markov chain. Order lead times are dependent on the …
The Dynamic Impacts Of Employee Job Motivation On Employee Job Performance And Corporate Customer Satisfaction: The Contingent Role Of Erp System Implementation, 2013 Hong Kong Polytechnic University
The Dynamic Impacts Of Employee Job Motivation On Employee Job Performance And Corporate Customer Satisfaction: The Contingent Role Of Erp System Implementation, Junyi Yang, Anjing Zhao, J.J. Po-An Hsieh, Kimmy Chan Wa
Computer Information Systems Faculty Publications
Prior research has generally found a significant, positive impact of employees' job motivation on job performance, and which in turn, leads to more satisfied customers. However, little attention is directed towards how implementation of centralized information systems (IS), such as Enterprise Resource Planning (ERP) systems, will affect these relationships in the business to business (B2B) context. Toward this end, we plan to conduct a field study to empirically compare the effects of these relationships before and after the implementation of an ERP system. This cross-disciplinary study will contribute to the extant organization, marketing, and IS literature by examining how a …
Objective Measures Of Is Usage Behavior Under Conditions Of Experience And Pressure Using Eye Fixation Data, 2013 Goethe University
Objective Measures Of Is Usage Behavior Under Conditions Of Experience And Pressure Using Eye Fixation Data, Andreas Eckhardt, Christian Maier, J.J. Po-An Hsieh, Tim Chuk, Antoni B. Chan, Janet H. Hsiao, Ricardo Buettner
Computer Information Systems Faculty Publications
The core objective of this study is to understand individuals IS usage by going beyond the traditional subjective self-reported and objective system-log measures to unveil the delicate process through which users interact with IS. In this study, we conducted a laboratory experiment to capture users’ eye movement and, more importantly, applied a novel methodology that uses the Gaussian mixture model (GMM) to analyze the gathered physiological data. We also examine how performance pressure and prior usage experience of the investigative system affect IS usage patterns. Our results suggest that experienced and pressured users demonstrate more efficient and focused usage patterns …
Motivational Differences Across Post-Acceptance Is Usage Behaviors, 2013 Georgia State University
Motivational Differences Across Post-Acceptance Is Usage Behaviors, Xixi Li, J.J. Po-An Hsieh, Arun Rai
Computer Information Systems Faculty Publications
We identify two post-acceptance information system (IS) usage behaviors related to how employees leverage implemented systems. While routine use (RTN) refers to employees’ using IS in a routine and standardized manner to support their work, innovative use (INV) describes employees’ discovering new ways to use IS to support their work. We use motivation theory as the overarching perspective to explain RTN and INV and appropriate the rich intrinsic motivation (RIM) concept from social psychology to propose a conceptualization of RIM toward IS use, which includes intrinsic motivation toward accomplishment (IMap), intrinsic motivation to know (IMkw), and intrinsic motivation to experience …
Exploring The Zone Of Tolerance For Internal Customers In It-Enabled Call Centers, 2013 Georgia State University
Exploring The Zone Of Tolerance For Internal Customers In It-Enabled Call Centers, J.J. Po-An Hsieh, Piyush Sharma, Arun Rai, A. Parasuraman
Computer Information Systems Faculty Publications
Today, call center employees’ service encounters with external customers are extensively supported with modern information technology (IT). However, prior research on service quality and zone of tolerance (ZOT) focuses primarily on external customers with little attention paid to how internal customers (e.g., service employees) respond to services provided by internal functions, particularly IT function that supports employees’ IT use. Drawing on theory of administrative behavior and IT success literature, we conducted a study at a call center of a telecommunications firm and found that the impact of internal IT service quality (ITSQ) on employees’ service quality (ESQ) to external customers, …