Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

PDF

2014

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 219

Full-Text Articles in Entire DC Network

Absorptive Capacity And Ict Adoption Strategies For Smes: A Case Study In Kenya, Joshua R A Ndiege, Marlien E. Herselman, Stephen V. Flowerday Oct 2014

Absorptive Capacity And Ict Adoption Strategies For Smes: A Case Study In Kenya, Joshua R A Ndiege, Marlien E. Herselman, Stephen V. Flowerday

The African Journal of Information Systems

Many small and medium enterprises (SMEs) in developing countries continue to be challenged by their information technology (IT) adoption process, which is often characterized by a number of deficiencies. The purpose of this study was to examine the role of absorptive capacity (AC) in SMEs’ performance, as well as establish the correlation between SMEs’ AC and their IT adoption process. The findings of this study, obtained by measuring different dimensions of AC using Jimenez-Barrionuevo, Garcia-Morales, and Molina’s scale of 18 items, suggest that AC plays a critical role in the performance of SMEs in Kenya and that SMEs with strong …


Constructing Frugal Sales System For Small Enterprises, Oludayo O. Olugbara, Brenda N. Ndhlovu Oct 2014

Constructing Frugal Sales System For Small Enterprises, Oludayo O. Olugbara, Brenda N. Ndhlovu

The African Journal of Information Systems

In the current study, the authors report on the application of the design science methodology to construct, utilize, and evaluate a frugal information system that uses mobile devices and cloud computing resources for documenting daily sales transactions of very small enterprises (VSEs). Small enterprises play significant roles in the socioeconomic landscape of a community by providing employment opportunities and contributing to the gross domestic product. However, VSEs have very little access to innovative information technologies that could help them manage their challenges that are restricting their effective growth, sustainability, and participation in a knowledge economy. The results of a field-evaluation …


Isscm Cohort, Fall 2014-2015, Raj Soin College Of Business, Wright State University Oct 2014

Isscm Cohort, Fall 2014-2015, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster featuring the Fall 2014-2015 Cohort from the Master of Information Systems and the Master of Science in Logistics and Supply Chain Management Programs.


Risk Profiles In Individual Software Development And Packaged Software Implementation Projects: A Delphi Study At A German-Based Financial Services Company, Stefan Hoermann, Michael Schermann, Marco Aust, Helmut Krcmar Oct 2014

Risk Profiles In Individual Software Development And Packaged Software Implementation Projects: A Delphi Study At A German-Based Financial Services Company, Stefan Hoermann, Michael Schermann, Marco Aust, Helmut Krcmar

Information Systems and Analytics

The aim of this paper is to compare risk profiles of individual software development (ISD) and packaged software implementation (PSI) projects. While researchers have investigated risks in either PSI projects or ISD projects, an integrated perspective on how the risk profiles of these two types of information system (IS) projects differ is missing. To explore these differences, this work conducted a Delphi study at a German-based financial services company. The results suggest that: First, ISD projects seem to be more heterogeneous and face a larger variety of risks than the more straightforward PSI projects. Second, ISD projects seem to be …


A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul Oct 2014

A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul

Management Faculty Research

Objectives: A tele-intensive care unit (tele-ICU) uses telemedicine in an intensive care unit (ICU) setting, applying technology to provide care to critically ill patients by off-site clinical resources. The purpose of this review was to examine the implementation, adoption, and utilization of tele-ICU systems by hospitals to determine their efficiency and efficacy as identified by cost savings and patient outcomes.

Methods: This literature review examined a large number of studies of implementa­tion of tele-ICU systems in hospitals.

Results: The evidence supporting cost savings was mixed. Implementation of a tele- ICU system was associated with cost savings, shorter lengths of stay, …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


A Research Framework For The Impact Of Cultural Differences On It Outsourcing, Anil Gurung, Edmund Pratter Sep 2014

A Research Framework For The Impact Of Cultural Differences On It Outsourcing, Anil Gurung, Edmund Pratter

Management Information Systems Faculty Research

Contracting Global Virtual Teams as part of global IT outsourcing is currently en vogue. As might be expected when virtual team members are from different countries, cultural factors play an important role in the success of outsourcing. However, there have been very few studies that assess the effect of culture on IT outsourcing and virtual teams. This conceptual paper addresses this oversight by looking at the effect of cultural differences on IT outsourcing and virtual teams' performance. The applicable literature on outsourcing, virtual teams and culture is analyzed and a framework of offshore outsourcing success is developed. This framework includes …


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


African E-Government Research Landscape, Jean Vincent Fonou Dombeu, Nelson Rannyai Sep 2014

African E-Government Research Landscape, Jean Vincent Fonou Dombeu, Nelson Rannyai

The African Journal of Information Systems

Over the past decade, African governments have followed the worldwide trends towards establishing e-government with the aim of improving public service delivery to citizens through the use of Information and Communication Technology (ICT). As a consequence, authors from academia, government departments and agencies, civil society, industry, non-governmental and international organizations have embarked into e-government research focusing on Africa. However, the state of the art of e-government research in Africa is poorly documented. This study analyzes the status of e-government research in Africa. A qualitative technique based on online searches and literature reviews is used to collect data that have addressed …


Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang Sep 2014

Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang

MIS/OM/DS Faculty Publications

The authors of this paper outline a capacity planning problem in which a risk-averse firm reserves capacities with potential suppliers that are located in multiple low-cost countries. While demand is uncertain, the firm also faces multi-country foreign currency exposures. This study develops a mean-variance model that maximizes the firm’s optimal utility and derives optimal utility and optimal decisions in capacity and financial hedging size. The authors show that when demand and exchange rate risks are perfectly correlated, a risk- averse firm, by using financial hedging, will achieve the same optimal utility as a risk-neutral firm. In this paper as well, …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Sep 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Journal Articles

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra Sep 2014

Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra

Research Collection School Of Computing and Information Systems

Understanding the personality traits and current attitudes of individual consumers is crucial for retailers and mobile advertisers. In this paper, we investigate the phenomenon of “variety seeking tendencies" in mobile users in their (1) online (represented by their App usage behavior), and (2) physical (represented by their location visits) worlds. We show that different categories of users exhibit different levels of variety. Further, by analyzing at various time scales, we show that there exists correlation between when a person is likely to visit new places in the real world and when he/she is likely to explore new Apps in the …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


Intent-Based User Segmentation With Query Enhancement, Wei Xiong Aug 2014

Intent-Based User Segmentation With Query Enhancement, Wei Xiong

Dissertations

With the rapid advancement of the internet, accurate prediction of user's online intent underlying their search queries has received increasing attention from the online advertising community. As a rich source of information on web user's behavior, query logs have been leveraged by advertising companies to deliver personalized advertisements. However, a typical query usually contains very few terms, which only carry a small amount of information about a user's interest. The tendency of users to use short and ambiguous queries makes it difficult to fully describe and distinguish a user's intent. In addition, the query feature space is sparse, as only …


How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer Aug 2014

How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer

Arnoud DE MEYER

The large majority of modern production companies have at their disposal a multitude of computer systems. The immediate challenge for these companies consists of integrating these computer systems and databases. How will one arrive at this integration? On the basis of a questionnaire administered in 1985, 1986 and 1987 among a group of large European manufacturers, one comes to the conclusion that this integration is one of the immediate priorities for this group of companies. They do not intend to implement turnkey systems. but instead will integrate the different databases and computer systems gradually. One can see emerging islands of …


The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka Aug 2014

The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka

Adriane B. Randolph

Due to the increased availability of both neuroscience methods and theories, Information Systems (IS) scholars have begun to investigate the potential of neuroscience for IS research. This new field of research is referred to as NeuroIS. Moreover, large technology companies (e.g., Microsoft and Philips) started research programs to evaluate the potential of neuroscience for their business. The application of neuroscientific approaches is also expected to significantly contribute to advancements in human-computer interaction (HCI) research. Against this background, a panel debate is organized to discuss the potential of neuroscience for HCI studies. The panel hosts an intellectual debate from different perspectives, …


User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph Aug 2014

User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph

Adriane B. Randolph

The loss of communication is one of the most profound disabilities a human being can experience, inhibiting social contact and complicating medical and personal care. Locked-in patients are paralyzed and unable to speak, but cognitively intact. Developments in biometric technology provide non-muscular channels of control and provide opportunities to restore some communication for people with little or no muscle movement. Although these biometric devices have been effective, the input rate is very slow for the requirements of interactive communication. Prediction techniques increase the speed of communication in assistive technology. However, the user’s context (time of day, location, presence of conversational …


Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson Aug 2014

Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson

Adriane B. Randolph

Individuals suffering from locked-in syndrome are completely paralyzed and unable to speak but otherwise cognitively intact. Traditional assistive technology is ineffective for this population of users due to the physical nature of input devices. Brain-computer and biometric interfaces offer users with severe motor disabilities a non-muscular input channel for communication and control, but require that users be able to harness their appropriate electrophysiological responses for effective use of the interface. There is currently no formalized process for determining a user’s aptitude for control of various biometric interfaces without testing on an actual system. This study presents how basic information captured …


The Effect Of Ceo It Expertise On The Information Environment: Evidence From Management Earnings Forecasts, Jacob Zachary Haislip Aug 2014

The Effect Of Ceo It Expertise On The Information Environment: Evidence From Management Earnings Forecasts, Jacob Zachary Haislip

Graduate Theses and Dissertations

Firms depend on information technology to provide high quality internal information, but prior research suggests that IT is underutilized (Venkatesh and Bala 2008). Therefore, using a sample of firms with equivalent levels of technology in their information systems, I investigate whether firms that employ CEOs with IT expertise make forecasts that are more accurate. I argue that CEOs with IT expertise are more likely to encourage the utilization of IT in making earnings forecasts, thus increasing the accuracy of the forecasts. This argument is supported by prior research that suggests that people are more likely to utilize technology if they …


A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni Aug 2014

A Lean Information Management Model For Efficient Operations Of An Educational Entity At The University Of Tennessee, Harshitha Muppaneni

Masters Theses

A software based Management Information System (MIS) is designed and implemented in the Department of Industrial and Systems Engineering at University of Tennessee to handle different types of data requests that are currently processed through multiple steps. This thesis addresses the current resource intensive data management model in educational institutions and proposes a decentralized and customized solution. The proposed software based data management system provides information to authorized sources in the requested format with minimal or no time consumption. The quantification of the new systems’ impact is done by comparing it with current data management process using Graph Theoretic Approach …


Information Security Governance For The Non-Security Business Executive, Michael Whitman, Herbert J. Mattord Jul 2014

Information Security Governance For The Non-Security Business Executive, Michael Whitman, Herbert J. Mattord

Faculty Articles

Information security is a critical aspect of information systems usage in current organizations. Often relegated to the IT staff, it is in fact the responsibility of senior management to assure the secure use and operation of information assets. Most managers recognize that governance is the responsibility of executive management. The primary objective of governance can be achieved when the members of an organization know what to do, how it should be done, as well as who should do it. The focus on governance has expanded to include more aspects of the organizational hierarchy to include information systems and information security. …


Small Businesses Encounters With Information Technology, Liliana Lopez Jimenez Jul 2014

Small Businesses Encounters With Information Technology, Liliana Lopez Jimenez

Electronic Thesis and Dissertation Repository

This dissertation advances the concept of IT encountering, defined as the process whereby individuals pay attention, interpret and respond to cues suggesting changes to IT, in ways that appear sensible to them, and it studies IT encountering in the context of small businesses.

I review the literatures on organizational IT adoption and IT selection, and conclude that these literatures have relied on assumptions which leave unattended important aspects of the process leading to choice: the adoption literature presupposes the saliency and significance of a focal technology to a decision maker, and the IT selection literature generally assumes that suitable IT …


Buyer Beware : Consumer Response To Manipulations Of Online Product Reviews, Mengzhou Zhuang Jul 2014

Buyer Beware : Consumer Response To Manipulations Of Online Product Reviews, Mengzhou Zhuang

Theses & Dissertations

Online product reviews have become an important and influential source of information for consumers. Firms often manipulate online product reviews to influence consumer perceptions about the product, making it a research topic of urgent need for theory development and empirical investigation. In this thesis, we examine how consumers perceive and respond to the three commonly used manipulation tactics. Firstly, an exploratory pre-study via in-depth interviews with online shoppers indicates that consumers commonly have the knowledge for online review manipulations as well as for detecting them. In the first study, a survey was used to investigate the three popular manipulation tactics …


Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya Jul 2014

Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya

Monica Adya

Studies of human decision making have demonstrated that stress exacerbates risk taking. Since all decisions involve some element of risk, stress has critical impact on decision quality. Decisions are found to improve with stress up to an optimal threshold beyond which deterioration is observed. However, few studies have examined the psychological experiences underlying risk-taking behavior in conjunction with stress creators. In this paper we propose a research framework that integrates pre-conditions of stress (perceptions of high gain/loss, risk, complexity, and organizational pressure) with observed psychological experiences (time pressure, uncertainty, information overload, and dynamism) that potentially result in risky decision making. …


Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof Jul 2014

Identifying Critical Success Factors: The Case Of Erp Systems In Higher Education, Billy Mathias Bm Kalema Dr, Oludayo O. Olugbara Prof, Ray M. Kekwaletswe Prof

The African Journal of Information Systems

This paper reports on a study that uses a combination of techniques to formally characterize and determine the critical success factors influencing the effective usage of enterprise resource planning (ERP) systems, with special reference to higher education institutions. The thirty-seven ERP success factors identified from the literature are classified into: Critical, Active, Reactive and Inert categories. The classification of decision factors can generally support organizations to explore their current challenges and to adequately prepare decisions in a more participatory way for future endeavors. This study suggests a possible alternative that decision makers should take when a factor or a set …


Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter Jul 2014

Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter

Steven Alter

This paper explores how work system theory (WST) and related core ideas in various versions of the work system method (WSM) overlap with enterprise engineering and with the DEMO methodology. Based on the definition of work system, an enterprise can be viewed as a set of interacting work systems. A work system can be summarized at various levels of detail. The simplest level is basically a verb phrase. The next level is a “work system snapshot.” More detailed descriptions are based on a work system metamodel. This paper’s contribution is in two areas, 1) establishing links between WST/WSM and enterprise …