Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Ethics (3)
- IT and ethics (3)
- Information technology (IT) (3)
- Information systems (2)
- Adaptive structuration theory (1)
-
- Asynchronous learning (1)
- Big data (1)
- Business Case Analysis (1)
- Business process change (1)
- Computer science (1)
- Curriculum development (1)
- Cyber Security (1)
- DACUM (1)
- Data analytics (1)
- DeLone and McLean Information Success Model (1)
- Design (1)
- Diffusion of innovation theory (1)
- E-Loyalty (1)
- E-Tailing (1)
- Employee morale (1)
- Forensic Accounting (1)
- Forensic Analysis (1)
- Forensic Economics (1)
- Forensic Finance (1)
- Forensic Marketing (1)
- Forensic Psychology (1)
- Gender (1)
- Global business (1)
- Healthcare management (1)
- Heroes (1)
- Publication
-
- Leila A. Halawi (6)
- Donald Wynn (4)
- Harvey Enns (3)
- Michael Schermann (3)
- Thomas Ferratt (3)
-
- Alberto Coustasse, DrPH, MD, MBA, MPH (2)
- Jennifer Y Mak (2)
- Mark A. Jacobs (2)
- Michael F. Gorman (2)
- Ralph E. McKinney (2)
- Christopher L. "Kit" Scott (1)
- Group 6 649 (1)
- Karthikeyan Umapathy (1)
- Maurice Dawson (1)
- Paul B. Sweeney (1)
- Robert P. Minch (1)
- Scott T. Allison (1)
- William D Salisbury PhD (1)
Articles 1 - 30 of 37
Full-Text Articles in Business
Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott
Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott
Christopher L. "Kit" Scott
This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used asynchronously. We conducted an experiment with 49 students from three classes of a web development class at an American university. Our results suggest that an asynchronous tutorial can achieve the same learning outcomes as a traditional lecture format by using automated feedback for convergence. Somewhat surprisingly, we found that performance did …
Information Technology Ethics: A Research Framework, Richard V. Mccarthy, Leila Halawi, Jay E. Aronson
Information Technology Ethics: A Research Framework, Richard V. Mccarthy, Leila Halawi, Jay E. Aronson
Leila A. Halawi
Information technology has become so pervasive that opportunities for abuses abound. IT Ethics has taken on increasing importance as the size and complexity of IT issues continues to grow. This paper outlines a research framework to analyze: Do significant ethical differences exist amongst undergraduate and graduate MIS students?
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Leila A. Halawi
We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Leila A. Halawi
Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.
Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian
Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian
Leila A. Halawi
This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios.
Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. Mccarthy
Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. Mccarthy
Leila A. Halawi
Unethical information technology (IT) conduct is estimated to cost billions of dollars in deficits for enterprises. Included in this unethical behavior are issues associated with the knowledge age. Many IT ethics concerns do not have guidelines that are well recognized or broadly accepted. This study will explore the ethical perception of a diverse group of knowledge workers. It will also examine the effects of deterrents, individual factors and external variables to determine if there are noted differences in ethical perceptions that can be explained by these variables.
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Leila A. Halawi
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
Mark A. Jacobs
The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …
Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs
Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs
Mark A. Jacobs
Business leaders are concerned about the impacts of increasing levels of product portfolio complexity since many sense that complexity related costs such as order management, procurement, and inventory threaten to undermine operational efficiencies and consume profits. Even so, managers do not fully understand the extent and breadth of the impacts of product portfolio complexity. A more complete understanding of the operational effects of product portfolio complexity is lacking partially because researchers have not yet offered a robust theoretical perspective or studied it in a focused controlled way; until now. Herein, measures of product portfolio complexity are developed and related to …
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
Paul B. Sweeney
Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …
Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman
Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman
Michael F. Gorman
We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function. Our results from test cases show with high confidence that current prices are not optimal, as indicated by a …
Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman
Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman
Michael F. Gorman
In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.
Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.
The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt
The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt
Donald Wynn
In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Donald Wynn
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Donald Wynn
Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Donald Wynn
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
Harvey Enns
Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Harvey Enns
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
Harvey Enns
Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
William D Salisbury PhD
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Thomas Ferratt
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Thomas Ferratt
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Thomas Ferratt
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul
A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul
Alberto Coustasse, DrPH, MD, MBA, MPH
Objectives: A tele-intensive care unit (tele-ICU) uses telemedicine in an intensive care unit (ICU) setting, applying technology to provide care to critically ill patients by off-site clinical resources. The purpose of this review was to examine the implementation, adoption, and utilization of tele-ICU systems by hospitals to determine their efficiency and efficacy as identified by cost savings and patient outcomes. Methods: This literature review examined a large number of studies of implementation of tele-ICU systems in hospitals. Results: The evidence supporting cost savings was mixed. Implementation of a tele- ICU system was associated with cost savings, shorter lengths of stay, …
The Qualitative And Quantitative Effects Of Patient Centered Medical Home In The Veterans Health Administration, Samuel N. Lovejoy, Eric Stalnaker, William K. Willis, Alberto Coustasse
The Qualitative And Quantitative Effects Of Patient Centered Medical Home In The Veterans Health Administration, Samuel N. Lovejoy, Eric Stalnaker, William K. Willis, Alberto Coustasse
Alberto Coustasse, DrPH, MD, MBA, MPH
Since the 1990’s, the Veteran’s Health Administration (VHA) has implemented a system of primary care that has been considered some of the best care that can be offered (Klein, 2011). The Patient Center Medical Home (PCMH) Model, also called “Patient Aligned Care Team” (PACT) in the VHA, has been coordinating and integrating services which ensure optimal health outcomes at an acceptable value (Bidassie, Davies, Stark, & Boushon, 2014).
PACT was created in 2010, building on 20 years of the VHA transforming from a loosely based system of inpatient services to a provider of outpatient primary care for veterans. From 2010 …
Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.
Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.
Ralph E. McKinney
The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in …
The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.
The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.
Ralph E. McKinney
This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender, including …
Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak
Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak
Jennifer Y Mak
The purpose of this study was to identify whether there were differences in the expectations of job responsibilities between different levels of recreation and sports managers towards the same post. The problem was divided into two sub-problems: (l) to determine the relationship in the perceived importance of entry-level managers' job responsibilities between entry-level managers and middle-level managers; and (2) to determine the relationship in the perceived importance of middle-level managers job responsibilities between middle-level managers and top-level managers. Several items were found to have significant difference in the perceptions among the subjects.
Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak
Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak
Jennifer Y Mak
The purpose of this study was to identify whether there were differences in the expectations of job responsibilities between different levels of recreation and sports managers towards the same post. The problem was divided into two sub-problems: (l) to determine the relationship in the perceived importance of entry-level managers' job responsibilities between entry-level managers and middle-level managers; and (2) to determine the relationship in the perceived importance of middle-level managers job responsibilities between middle-level managers and top-level managers. Several items were found to have significant difference in the perceptions among the subjects.
Determinants Of Vendor Profitability In Two Contractual Regimes: An Empirical Analysis Of Enterprise Resource Planning Projects, Stefan Hoermann, Tobias Hlavka, Michael Schermann, Helmut Krcmar
Determinants Of Vendor Profitability In Two Contractual Regimes: An Empirical Analysis Of Enterprise Resource Planning Projects, Stefan Hoermann, Tobias Hlavka, Michael Schermann, Helmut Krcmar
Michael Schermann
In this paper, we investigate the effects of four determinants of vendor profitability in enterprise resource planning (ERP) outsourcing projects under two contractual regimes: fixed price (FP) contracts and time and material (TM) contracts. We hypothesize that effect sizes are larger under FP contracts than under TM contracts. From a transaction cost economics perspective, we hypothesize that project uncertainty and project size are negatively associated with vendor profitability. From a knowledge-based view of the firm perspective, we hypothesize that industry knowledge and client knowledge are positively associated with vendor profitability. We tested these hypotheses on a comprehensive archival data set …