Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2006

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 108 of 108

Full-Text Articles in Business

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


The Role Of Convergence In Information Systems And Business Planning, Sharath Sasidharan, Jiming Wu, Dennis Pearce, Grover S. Kearns, Albert L. Lederer Jan 2006

The Role Of Convergence In Information Systems And Business Planning, Sharath Sasidharan, Jiming Wu, Dennis Pearce, Grover S. Kearns, Albert L. Lederer

Journal of International Technology and Information Management

A key challenge to top management is the alignment of IS and business plans for the purpose of producing an IT-based competitive advantage. This study uses a well known communication theory to provide new insight into the impact of CEO and CIO planning participation on IS and business alignment via the convergence of views between the CEO and CIO regarding the current and future strategic impact of IT on the firm’s success. One hundred and nine matched pairs of questionnaire responses from CIOs and CEOs were collected using a postal survey. Results indicated that CIO participation in business planning predicted …


A Comprehensive Study On The Differences In Erp Implementation Between Manufacturing And Service Industry, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh Jan 2006

A Comprehensive Study On The Differences In Erp Implementation Between Manufacturing And Service Industry, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh

Journal of International Technology and Information Management

In the first part, this paper presents a review of current literatures on key critical success factors (KCSFs) and their inevitable relative links with ERP benefits, project (strategic) goals and objectives in ERP implementation; this literature review searches for the available KCSFs in two sectors: manufacturing and service industry. The second part of paper looks into the available literature on differences in manufacturing and service industry. From these differences we deduct that there are differences in ERP implementation between manufacturing and services.


Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed Jan 2006

Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed

Journal of International Technology and Information Management

Data warehouses are large complex systems with many interacting nonlinear components. It is an amalgamation of many different systems and integration of such diverse elements is its primary concern. It is often difficult for a data warehouse manager to predict the performance of the system especially when demand pattern for the required data keeps changing. We have developed a simulation model using ARENA simulation package that will simulate the behavior and performance of a data warehouse system environment based on its overall design. Given such a model, a data warehouse manager can walk through various what-if scenarios and can pinpoint …


A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli Jan 2006

A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli

Journal of International Technology and Information Management

This paper describes the development of an agent-based framework that supports the purchasing function in supply chain management. The framework has been applied in a case situation for planned order releasing from a manufacturer’s materials requirement planning (MRP) system. The proposed framework incorporates a negotiation protocol that can effectively coordinate the negotiation process between a buyer agent and several supply agents, which may represent the manufacturer and its suppliers respectively. These agents negotiate according to their preferred strategies which aim to conclude a deal that achieves their own objectives. The implementation of the negotiation process involves considerations of the price …


Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang Jan 2006

Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang

Journal of International Technology and Information Management

The slicing of Silicon wafer is a complex manufacturing process in producing the raw materials for electronic chips and requires the efforts to effectively monitor the stability in production line and ensure the quality for the products composed of different shapes and materials. Human decision failure and other analytical errors are the most common source of management problems in such manufacturing stage. This paper presents a case regarding the silicon wafer manufacturing to examine the response to quality errors. The study has adopted the approach of grey situation decision-making algorithm for problem detection that suggests a technique to attain the …


Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara Jan 2006

Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara

Journal of International Technology and Information Management

This study suggests that having access to a computer and the Internet at home leads to better wages. We normally have the idea that people with higher wages have computers and Internet access at home. But with declining prices of home PCs and the increasing importance of Internet, this no longer seems to be the case. The new owners of PC today are considerably poorer and less educated than in the past. People with access to a PC and Internet at home appear to earn 8.6% more than their counterpart. This result seems to suggest that University policies requiring students …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures


An Integrative Approach For Examining The Determinants Of Abnormal Returns: The Cases Of Internet Security Breach And Ecommerce Initiative, Francis Kofi Andoh-Baidoo Jan 2006

An Integrative Approach For Examining The Determinants Of Abnormal Returns: The Cases Of Internet Security Breach And Ecommerce Initiative, Francis Kofi Andoh-Baidoo

Theses and Dissertations

Researchers in various business disciplines use the event study methodology to assess the market value of firms through capital market reaction to news in the public media about the firm's activities. Capital market reaction is assessed based on cumulative abnormal return (sum of abnormal returns over the event window). In this study, the event study methodology is used to assess the impact that two important information technology activities, Internet security breach and ecommerce initiative, have on the market value of firms. While prior research on the relationship between these business activities and cumulative abnormal return involved the use of regression …


Rebuilding Theories Of Technology Acceptance: A Qualitative Case Study Of Physicians' Acceptance Of Technology, Jon T. Blue Jan 2006

Rebuilding Theories Of Technology Acceptance: A Qualitative Case Study Of Physicians' Acceptance Of Technology, Jon T. Blue

Theses and Dissertations

The Technology Acceptance Model has been widely applied and has been quite successful at explaining the behavioral intention to use technology in many organizations. One of the most significant variables in the Technology Acceptance Model is perceived ease of use. The Technology Acceptance Model purports that perceived ease of use contributes to the behavioral intention to use technology. Additionally, the model purports that perceived ease of use is an antecedent of perceived usefulness. In the adoption and use of technology by physicians, previous studies show that the Technology Acceptance Model predictions have been incorrect. Specifically, the aforementioned perceived ease of …


Analyzing Faulty Knowledge Systems In Project-Based Environments: An Empirical Investigation In A R&D Organization, Rafael E. Landaeta, Cesar Ariel Pinto, Timothy G. Kotnour, William R. Peterson Jan 2006

Analyzing Faulty Knowledge Systems In Project-Based Environments: An Empirical Investigation In A R&D Organization, Rafael E. Landaeta, Cesar Ariel Pinto, Timothy G. Kotnour, William R. Peterson

Engineering Management & Systems Engineering Faculty Publications

This investigation contributes a framework of the relationships among the faulty elements of a knowledge system in a project-based organization. The framework was developed during an applied research project at a R&D organization. A knowledge system can be defined as a series of inputs, processes, and outputs that interact with each other with the purpose of enhance the performance and capabilities of an organization or work unit through knowledge. The framework was developed using literature, our experience as applied researchers, and data collected from members of a R&D organization. Data was collected through a survey, interviews, and group meetings. The …


End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom Dec 2005

End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

End-User Training (EUT) has enjoyed a rich tradition of research in Information Systems. However, with the growing pace of change in technology and the dynamic nature of business, organizations are spending an increasing amount of money on end-user training. Training methods are also changing with little research to support new approaches. Thus, extensive research is required in the future. To be credible, end-user training research should preserve and build upon the significant literature that exists, both in IS and Education. This paper provides a review of EUT literature focusing on training methods. It summarizes the findings, while pointing out key …


Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom Dec 2005

Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

As organizations struggle with how to develop and use their inherent expertise, the importance of knowledge management and collaboration has grown in both academic and practitioner communities. This paper outlines a new concept of collaborative knowledge management (CKM), which bridges the two fields. Drawing from literature, we present a conceptual framework for understanding the concepts underlying CKM. Next, this paper explores how a new technology, peer-to-peer (P2P), fits in the CKM paradigm. A discussion on P2P tools and a comparison of these tools with client server tools for enabling the CKM process is presented. P2P has great appeal for CKM …


Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas Dec 2005

Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas

Saurabh Gupta

No abstract provided.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.


Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati Dec 2005

Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati

Pratyush Bharati

No abstract provided.


Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.