Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 184

Full-Text Articles in Business

Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis, Roland Akindele, Stella Jesuloluwa Adewuyi Oct 2023

Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis, Roland Akindele, Stella Jesuloluwa Adewuyi

Communications of the IIMA

The pervasive influence of technology has revolutionised numerous sectors across the globe, underscoring the need for a comprehensive evaluation of the tools that technology has engendered. Artificial Intelligence (AI), as a prominent technological tool, has exceeded expectations and proven immensely beneficial to humanity. Consequently, it is imperative to scrutinise the ethical and regulatory frameworks governing its application. This paper employs a doctrinal methodology to analyse the regulatory landscape and ethical guidelines surrounding AI technology in Nigeria and some selected jurisdictions. The findings highlight the necessity of establishing a robust governance system to govern the utilisation of this transformative technology. In …


The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector, Joris Zomerdijk, Benny De Waal Oct 2023

The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector, Joris Zomerdijk, Benny De Waal

Communications of the IIMA

The COVID-19 pandemic has accelerated remote working and working at the office. This hybrid working is an indispensable part of today's life even within Agile Software Development (ASD) teams. Before COVID-19 ASD teams were working closely together in an Agile way at the office. The Agile Manifesto describes 12 principles to make agile working successful. These principles are about working closely together, face-to-face contact and continuously responding to changes. To what extent does hybrid working influence these agile principles that have been indispensable in today's software development since its creation in 2001? Based on a quantitative study within 22 Dutch …


A Framework For Building Cognitive Knowledge Management Systems, Samir Jarjoui, Renita Murimi Oct 2023

A Framework For Building Cognitive Knowledge Management Systems, Samir Jarjoui, Renita Murimi

Communications of the IIMA

Knowledge Management Systems (KMSs) are a critical component of economic development and growth. The accumulation and effective utilization of knowledge capabilities allow firms to create value and improve competitiveness. However, recent technological advances in KMSs have outpaced research in this area, which continues to be siloed and characterized by a lack of cohesive frameworks and a limited focus on cognitive learning. This paper provides a conceptual framework for the development of cognitive KMSs. The proposed framework comprises of strategy, people, processes, learning, and technology that are designed to improve knowledge management and organizational memory.


Enterprise Architecture In Healthcare Networks: A Systematic Literature Review, Arjen Maris, Stijn Hoppenbrouwers, Jos Van Hillegersberg Oct 2023

Enterprise Architecture In Healthcare Networks: A Systematic Literature Review, Arjen Maris, Stijn Hoppenbrouwers, Jos Van Hillegersberg

Communications of the IIMA

Healthcare organizations collaborate, share knowledge, and need to be accountable to each other. Therefore, healthcare organizations manage a dynamic information system landscape. Enterprise Architecture (EA) is a management tool for aligning these landscapes to the primary information needs that healthcare organizations have. EA is of value in some environments, but it seems to be not well suited to the dynamics of healthcare. Despite the publication of several systematic literature reviews on EA in healthcare, a systematic literature study comparing EA applicability at various levels of cooperation (intra, inter, and network collaboration) is lacking. Therefore, we posed the following research question: …


Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals, C. Christopher Lee, Hyoun Sook Lim, Decorti Rodgers-Tonge, Lisa Frank Oct 2023

Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals, C. Christopher Lee, Hyoun Sook Lim, Decorti Rodgers-Tonge, Lisa Frank

Communications of the IIMA

Electronic clinical quality measures (eCQMs) are an integral part of health information technology (HIT). This study explores the effect of eCQM implementation on hospital performance. The study proposes hospital profitability, efficiency, and quality to measure hospital performance. Based on the literature, this research hypothesizes that implementing eCQMs would positively impact hospital profitability, efficiency, and quality. The sample data are drawn from the 2017 American Hospital Association (AHA) U.S. Hospital Survey datasets (N = 6282), the 2017 AHA U.S. Hospital I.T. Survey dataset (N = 3451), and the 2017 Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) datasets (N = …


Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian Oct 2023

Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian

Communications of the IIMA

Advancement in technology has brought in widespread adoption and utilization of data mining tools. Successful implementation of data mining requires a careful assessment of the various data mining tools. Although several works have compared data mining tools based on usability, opensource, integrated data mining tools for statistical analysis, big/small scale, and data visualization, none of them has suggested the tools for various industry-sectors. This paper attempts to provide a comparative study of various data mining tools based on popularity and usage among various industry-sectors such as business, education, and healthcare. The factors used in the comparison are performance and scalability, …


Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments, Ramesh Subramanian Oct 2023

Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments, Ramesh Subramanian

Communications of the IIMA

This paper is an essay on the differences between “formal” Western logic and Indian logical traditions and how the latter impacts present-day AI developments. Upon the colonization of India, Western philosophers often dismissed Indian logical constructs as being underdeveloped or clumsy. Others, however, saw such denigration as emanating from Western racial prejudice rather than objectivity. This debate has persisted. I discuss the salient aspects of this debate, and then focus on the inductive aspects of Indian logic. This is especially relevant to the present, when there is an explosion of artificial intelligence based applications. I discuss the salient features of …


Forecasting Gasoline Price With Time Series Models, Xin James He Oct 2023

Forecasting Gasoline Price With Time Series Models, Xin James He

Communications of the IIMA

This research forecasts the gasoline price in U.S. and analyzes its managerial implications by means of both univariate and multivariate time series forecasting models. Gasoline price forecast is among the most difficulty time series variables during its importance to the economy and extremely volatile nature. The average regular gasoline price in U.S. reached $5.06 per gallon in the month of June 2022, as opposed to $3.41 at the beginning of 2022, a 48% increase. While gasoline prices had been rising over the first half of 2022 due to supply chain disruptions as a result of global Covid 19 lockdowns and …


Measuring Circularity: The Gordian Knot Of The 21st Century, Arjen Wierikx, Pascal Ravesteijn, Néomie Raassens, Alex Alblas Oct 2023

Measuring Circularity: The Gordian Knot Of The 21st Century, Arjen Wierikx, Pascal Ravesteijn, Néomie Raassens, Alex Alblas

Communications of the IIMA

Organizations are currently facing substantial challenges regarding becoming circular by 2050 – also referred to as Circular Economy (CE). Subsequently, increasing complexity on all organizational levels creates uncertainty about respective organizational and technological capabilities and adequate strategies to develop these capabilities. Organizations are struggling in picking up the CE ambitions and answering the what’s in it for me question. Scholars are developing models and frameworks to enable organizations to measure CE performance. Over 125 assessment methods are available for micro level assessment – measuring up to 365 different metrics. Moreover, extant literature is available presenting barriers and opportunities for CE …


How Does Bpm Maturity Affect Process Performance? Feb 2023

How Does Bpm Maturity Affect Process Performance?

Communications of the IIMA

Organizations are increasingly confronted with the consequences of globalization, digitalization and disruptive (technological) developments. The constantly changing and dynamic social, economic, and political environment as well as the public opinion require public organizations to deliver effective and efficient services. These trends also apply to Dutch housing associations who are working together with suppliers in the process of property maintenance to increase quality and to reduce costs. Business Process Management (BPM) has the prospect of enhancing the performance of maintenance processes. Previous studies have confirmed a positive relationship between BPM-maturity and Process performance. However, in different contexts this relation is sometimes …


Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web Feb 2023

Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web

Communications of the IIMA

Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to understand potential vulnerabilities it does have and threats it is facing. One important CTI for proactive cyber defense is exploit type with possible values system, web, network, website or Mobile. This study compares the performance of machine learning algorithms in predicating exploit types using form posts in the dark web, which is a semi- structured dataset collected from dark web. The study uses the CRISP data science approach. The results of the study show that machine learning algorithms which are function-based including support vector machine and …


Exploring Consumer Mobile Payment Adoption: A Multi-Country Study, Yu-Chun Pan, Aimee Jacobs, Chekfoung Tan, Jasmine Tehraini Jun 2022

Exploring Consumer Mobile Payment Adoption: A Multi-Country Study, Yu-Chun Pan, Aimee Jacobs, Chekfoung Tan, Jasmine Tehraini

Communications of the IIMA

The increasing popularity of mobile technologies is reshaping human activities including financial transactions. This research focuses on the use and acceptance of NFC-enabled proximity mobile payment (m-payment). This research builds on previous research highlighting the various factors influencing the use and acceptance of m-payment through the Technology Acceptance Model (TAM) and Diffusion of Innovation of (DoI). The results indicate a statistically significant relationship between compatibility, personal innovativeness, and behavioural intention to use m-payment. The findings of this study confirm the influence of external factors, i.e., compatibility and personal innovativeness, determines the end-users’ perceived usefulness and perceived ease of use of …


Examination Of The Implication Of Information Processing On The Library Users Learning Comprehension/Satisfaction., Obia Gopeh Inyang, Juliana Agwunobi Apr 2022

Examination Of The Implication Of Information Processing On The Library Users Learning Comprehension/Satisfaction., Obia Gopeh Inyang, Juliana Agwunobi

Communications of the IIMA

The paper looked at Information Processing Theory's implications for the Library users’ learning satisfaction. The study discussed the nature of information and asserted that the dissemination of information empowers learning since the world is increasingly becoming information-based. It looked at information processing as the standard for understanding and satisfactory learning against memorization, leading to poor academic performance as it does not allow what the learner has learned to be part of him. The study also discussed that the instructor, facilitator, teacher, lecturer, and users have a role to play in processing information that improves learning. What remains essential is the …


Evaluation Approach For An Effective Blockchain Implementation In An Accounting Environment, Angel R. Otero, Ryan P. Fink Feb 2022

Evaluation Approach For An Effective Blockchain Implementation In An Accounting Environment, Angel R. Otero, Ryan P. Fink

Communications of the IIMA

Blockchain has the potential to revolutionize accounting transactions in the same way the Internet revolutionized the collection and dissemination of information. Nonetheless, like the Internet, blockchain technology is a double-edged sword offering tremendous benefits but also drawbacks. The literature points to inadequacies in blockchain implementations, particularly when evaluating and selecting controls to help ensure an effective blockchain implementation in organizations. This research develops an approach that not only addresses the inadequacies identified in the literature, but also prompts organizations to a more precise evaluation and selection of controls to achieve effective blockchain implementation. The approach uses Desirability Functions to quantify …


Information Technology Usage Among Afghan Women Business Leaders, Karen A. Putnam Nov 2021

Information Technology Usage Among Afghan Women Business Leaders, Karen A. Putnam

Communications of the IIMA

Prior to 2001, under the Taliban-ruled government, Afghanistan Information Technology (IT) usage was restricted to a few select individuals. Women were not allowed to attend schools or enter public areas without a related male escort and were expected to stay in the family home (Roshan, 2013). However, since 2001, the Afghan IT infrastructure allowed women to join the business sector to become educated in commerce, and they marketed products, goods, or services. Simple IT tools such as mobile phones have offered affordable business options for women, such as payment transactions over the phone or social media accounts. Afghan women leaders …


The Value Of A Technical Service Bulletin Index For The Consumer, Robert J. Richardson Sep 2021

The Value Of A Technical Service Bulletin Index For The Consumer, Robert J. Richardson

Communications of the IIMA

Automobile Technical Service Bulletin Index represents additional information pertaining on the quality of a vehicle. Currently, there is no way for the consumer to evaluate this large amount of information when buying a new car. A Technical Service Bulletin Index is developed as an aid to the consumer to better understand the quality issues related to thirty different car models. When compared to two major existing surveys, the J.D. Power Initial Quality Study and the J.D. Power Vehicle Dependability Study, the Technical Service Bulletin Index proved that it provides new, useful information about automobile quality for consumers to use when …


Modelling Case-Based Reasoning In Situation-Aware Disaster Management, Nuka Nwiabu, Ian Allison, Babs Oyeneyin May 2021

Modelling Case-Based Reasoning In Situation-Aware Disaster Management, Nuka Nwiabu, Ian Allison, Babs Oyeneyin

Communications of the IIMA

Situation-aware disaster management (SADIM) is a continuous decision-making and action taking process. This process requires prior knowledge of the ongoing environment and context. SADIM comprises two major processes: situation awareness (SA) - a cognitive process that assesses current situations and anticipate future situations in the environment; and, disaster management (DM) which is a decision-making process preventing, preparing, responding, and recovering for and from a disaster. One of the decision-making technologies used in current SADIM is case-based reasoning (CBR) CBR is used for the disaster management element only. Situation awareness process in current SADIM is carried out using domain rules, statistical …


A Text-Mining Approach To Evaluate The Importance Of Information Systems Research Themes, Navid Aghakhani, Arben Asllani Jan 2021

A Text-Mining Approach To Evaluate The Importance Of Information Systems Research Themes, Navid Aghakhani, Arben Asllani

Communications of the IIMA

This study combines text-mining techniques and exploratory factor analysis to identify significant research themes in the information systems (IS) field during the last decade. We analyzed 483 papers that have been published in the Management Information Systems Quarterly (MISQ) journal since 2010. We found that the most published themes in the MISQ are: (1) the impact of information systems and digital innovation on organizational performance, (2) the influence of computer-mediated communication and social media within individuals and groups, (3) information systems development and project management, (4) design science, and (5) decision making and information Systems. We also perform econometric analysis …


Bpm Maturity And Digital Leadership: An Exploratory Study, Joyce Van Ee, Ibtissam El Attoti, Pascal Ravesteyn, Benny M.E. De Waal Jul 2020

Bpm Maturity And Digital Leadership: An Exploratory Study, Joyce Van Ee, Ibtissam El Attoti, Pascal Ravesteyn, Benny M.E. De Waal

Communications of the IIMA

When organizations start to digitize, this often means that processes will be changed. The management paradigm that is centered on the continues review and improvement of organizational processes is Business Process Management (BPM). To digitize processes, an organization should have the right competences to deal with both technological and process changes. However, currently, it is not known which competences are needed by leaders to guide an organization with digital process transformation initiatives. Hence, this paper consists of an explorative study based on interviews with five experts to find out if and how the competences related to digital leadership can guide …


Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez Apr 2020

Change Management Over Financial Information: A Multi-Criteria Evaluation Of System Change Controls Using Desirability Functions, Angel R. Otero, Christian Sonnenberg, Ivonne Delgado-Perez

Communications of the IIMA

The increasing complexity of information technology, attacks on confidential information, and the passing of new laws and regulations have shifted the focus around internal controls in organizations. Particularly, general information technology controls related to change management (i.e., system change controls) are critical in ensuring the integrity, completeness, and reliability of financial information. The literature points to various evaluation methods for these controls to determine which ones to implement. However, these methods do not necessarily consider relevant organization constraints, preventing the inclusion of required controls or the exclusion of unnecessary controls. This paper proposes a novel approach, using Desirability Functions, for …


A Framework Of Blockchain Technology, Frank Lin, Danny Chung, Conrad Shayo, Francisca Beer Mar 2020

A Framework Of Blockchain Technology, Frank Lin, Danny Chung, Conrad Shayo, Francisca Beer

Communications of the IIMA

With the introduction of Bitcoin by Nakamoto (2008), came a key underlying technology that holds great disruptive promise to many crucial industries: Blockchain. The nature of a decentralized, distributed ledger will truly change the way we currently trade and interact through its clear transparency and high integrity (Casey & Vigna, 2018; Sullivan, 2015). Based on trust, Blockchain allows various parties to be involved in transacting with each other without the need to know each other (Botsman, 2017; Deloitte, 2016; Drescher, 2017; Mauri, 2017). The purpose of this paper is to provide a framework for Blockchain by focusing on how Blockchain …


Global Project Management - Chinese And American Cultural Differences, Kosin Chen, Gerhard Steinke Mar 2020

Global Project Management - Chinese And American Cultural Differences, Kosin Chen, Gerhard Steinke

Communications of the IIMA

This paper investigates cultural differences between Chinese and American project managers in the IT industry through a pilot study of interviewing six professional project managers with qualitative and quantitative questions. The interview questions were developed to compare core Chinese values and cultural styles with American cultural styles. Initial results found that Chinese and American project managers in the IT industry have similar ideas regarding resistance to corruption but have differences toward the idea of trustworthiness, harmony, avoiding confrontation, and non- competition.


Opioid Adjunct Drug Therapy: Evaluating Effectiveness Using Text Analytics Of Real World Data, Michael Veronin, Robert P. Schumaker Mar 2020

Opioid Adjunct Drug Therapy: Evaluating Effectiveness Using Text Analytics Of Real World Data, Michael Veronin, Robert P. Schumaker

Communications of the IIMA

Opioid analgesics continue to be the mainstay of pharmacologic treatment of moderate to severe pain. An adjunct is a drug that in its pharmacological characteristic is not identified primarily as an analgesic, but that has been found in clinical practice to have either an independent analgesic effect or additive analgesic properties when used with opioids. By using an adjunct to maximize the level of analgesia, the required opioid dosage may be reduced, together with concomitant adverse effects. BACKGROUND Real World Data (RWD) refers to data that describe observations in normal clinical practice obtained by any non- interventional methodology, such as …


The Impact Of College And University Advertising Expenditures On Key Performance Indicators Using Business Analytics Modeling, Alison Munsch, Jason Diffenderfer, Charles Cante Mar 2020

The Impact Of College And University Advertising Expenditures On Key Performance Indicators Using Business Analytics Modeling, Alison Munsch, Jason Diffenderfer, Charles Cante

Communications of the IIMA

Marketers in the 21st century now more than ever face a competitive business environment. The battle for marketers to to capture value from customers across a variety of verticals in the form of brand equity and sales is as fierce as it has ever been. This is because customers have numerous choices partially driven by the access and information provided by the internet (Solomon, 2017). As such, consumers are exposed to a plethora of alternative products and services more than ever as compared to the past. As such, consumers apply a high level of effect in the market about several …


Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia Dec 2019

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia

Communications of the IIMA

This paper explores issues of accessibility in Web design, including the applicability of various federal statutes such as the Americans with Disabilities Act of 1990 (ADA) and Section 508 of the Rehabilitation Act of 1973. A pilot study of six private sector websites is completed to gauge the effectiveness of current accessibility standards as interpreted from the ADA and Section 508. Evaluating these sites shows that even after 25 years, sites still have accessibility issues.


Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari Dec 2019

Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari

Communications of the IIMA

Retail industry has suffered some of the biggest data breaches in recent times. Organizations are deploying technological tools to limit data breaches. However, purely technological solution is not going to be sufficient because human-factor is often considered to be the weakest link in Information Security. In this paper, the authors investigate the behavioral aspect of information security in a retail setting. Specifically, the factors that influence compliance behaviors to information security policies (ISP) in retail stores are identified. Attitude, awareness, and sanctions are proposed as key variables that influence compliance intentions to ISP. The authors test the proposed model using …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker Sep 2019

What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker

Communications of the IIMA

Media analyses of soccer statistics and game play has accelerated in recent years. This is evident in visual displays of ball and player tracking, average player locations and distances they run. These media depictions aim to be attractive, entertaining and informative for viewers. But are such statistics predictive of goal scoring and match outcome? To answer this question we review the sixty-four matches of the 2014 World Cup and examine nine common match statistics, and others, to evaluate their predictive value for goal production and match outcome.


The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck Sep 2019

The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck

Communications of the IIMA

The difficulty of students transferring from Further Education Colleges and progressing to Higher Education Universities in the United Kingdom is a well-known problem. The study presented here focuses on the ability of students to begin to engage with the subject of computer programming on transferring after 2 years of study at a further education college into a 3rd year of a university programme. There is an assumption that there are environmental factors within the change that cause the problems of student engagement with their studies. The findings of this study concurs with difficulties for many students with beginning to …


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng Sep 2019

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …