Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2007

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 141

Full-Text Articles in Business

Improving Practices In A Small Software Firm: An Ambidextrous Perspective, Nannette Napier Dec 2007

Improving Practices In A Small Software Firm: An Ambidextrous Perspective, Nannette Napier

Computer Information Systems Dissertations

Despite documented best practices and specialized tools, software organizations struggle to deliver quality software that is on time, within budget, and meets customer requirements. Managers seeking improved software project outcomes face two dominant software paradigms which differ in their emphasis on upfront planning, customer collaboration, and product documentation: plan-driven and agile. Rather than promoting one approach over the other, this research advocates improving software management practices by developing the organization’s ambidextrous capability. Ambidextrous organizations have the ability to simultaneously succeed at two seemingly contradictory capabilities (e.g. discipline and agility) which leads to enhanced organizational performance. Overall, this study asks the …


Bad News Reporting On Troubled It Projects: The Role Of Personal, Situational, And Organizational Factors, Chongwoo Park Dec 2007

Bad News Reporting On Troubled It Projects: The Role Of Personal, Situational, And Organizational Factors, Chongwoo Park

Computer Information Systems Dissertations

An individual’s bad news reporting behavior has been studied from a number of perspectives and has resulted in a variety of research streams including the MUM effect (or reluctance to transmit bad news), whistle-blowing, and organizational silence. While many scholars in different areas have studied reporting behavior, it has not been widely discussed in the information systems literature. This dissertation research addresses an individual’s bad news reporting behavior (and its antecedents) in the troubled IT project context. Many social phenomena are multi-causal (Hollander 1971). The silence phenomenon involved in an individual’s bad news reporting behavior is multi-causal too. While prior …


Escalation Of Commitment In Information Technology Projects: A Goal Setting Theory Perspective, Vijay Kasi Dec 2007

Escalation Of Commitment In Information Technology Projects: A Goal Setting Theory Perspective, Vijay Kasi

Computer Information Systems Dissertations

ABSTRACT ESCALATION OF COMMITMENT IN INFORMATION TECHNOLOGY PROJECTS: A GOAL SETTING THEORY PERSPECTIVE BY VIJAY KASI Aug 30, 2007 Committee Chair: Dr. Mark Keil Major Academic Unit: Center for Process Innovation Information technology (IT) projects are prone to failure. One explanation for the high failure rate among IT projects is that managers overly commit to a failing course of action, a phenomenon referred as escalation of commitment. While the notion of goals and commitment are central to the phenomenon of escalation, very few prior studies have investigated their impact on escalation. In this study, a research model rooted in goal …


Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle Dec 2007

Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Silent Processes For Independent Living, Hubert Oesterle Dec 2007

Silent Processes For Independent Living, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula Dec 2007

Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula

Management Faculty Research

Do you want to affirmatively continue your and Tom Peters's Search for Excellence? Then practice MBI. A corollary to Ken Blanchard's idea of the One Minute Manager is the concept of Management by Interruptions (MBI). Although we do not want to overly manage the details of work, usually called micro management, we are often called upon as leaders and managers to supply frequent small segments of data and information. Mini management is good; micro management is not.


Measuring Organizational Usage Of Information Technology, Anand Jeyaraj Dec 2007

Measuring Organizational Usage Of Information Technology, Anand Jeyaraj

ISSCM Faculty Publications

Organizations make considerable investments in information technology to support their internal and external operations. For instance, a recent research report by Gartner Inc. indicates that worldwide spending on information technology will reach United States $3.3 trillion for the year 2008.


A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen Dec 2007

A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen

Business and Information Technology Faculty Research & Creative Works

The lack of trust is one of the most frequently cited reasons for customer's not returning to Internet service providers. As a new form of commercial activity, online financial services and stock trading involve more uncertainty and risk than traditional financial services. Trust is therefore a relatively influential factor of customer behavior in online financial services. The purpose of this study is to propose a framework of Intention to continuously adopt online financial services. Furthermore, the mediated effects of website trust are trusted. The main method of data collection for this study is a survey instrument designed by the author. …


An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz Dec 2007

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz

CGU Faculty Publications and Research

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …


A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman Dec 2007

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …


Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard Dec 2007

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard

Research Collection School Of Computing and Information Systems

The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …


It-Basierte Geschäftsmodelle, Hubert Oesterle Nov 2007

It-Basierte Geschäftsmodelle, Hubert Oesterle

Hubert Oesterle

No abstract provided.


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh Nov 2007

The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh

Research Collection School Of Accountancy

Past research using the resource-based view of a firm suggests that it is important to consider how firms develop, manage, and deploy resources and capabilities to influence the overall process of strategy formation and implementation. Relatively little research has been conducted in conceptualizing how firms implement and manage modularity of organizational routines during capability development. Yet, most companies would benefit from implementing modularity in organizational routines when competing in dynamic market conditions. Such implementations may require fundamental organizational reorientation that incurs significant coordination costs, and in some cases, such modularization attempts may fail, costing organizations significant amounts of valuable resources. …


Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller Nov 2007

Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …


Entrepreneurs Vs. Business Plans: A Study Of Practicality And Usefulness, Sam Pd Anantadjaya Oct 2007

Entrepreneurs Vs. Business Plans: A Study Of Practicality And Usefulness, Sam Pd Anantadjaya

The South East Asian Journal of Management

In higher education, the topic on business plan is relatively studied in great details to note the importance on formulating business plans. Business plans are regarded as the reference point for business people; managers and members of the board of directors, to really realize the business activities. At least, the topic on business plan, which are discussed and studied in universities, ought to have its own value in the real business operations. Many entrepreneurs, however, face difficulties in formulating structural business plans. Many entrepreneurs may not actually formulate business plans as they are regarded important in many classrooms’ teaching, to …


Adoption Of Innovative Information Systems By Smes: Comparing The Role Of Firm’S Enacted Capabilities Of Active Adopters And Non-Active Adopters, Noor Akma Mohd Salleh Oct 2007

Adoption Of Innovative Information Systems By Smes: Comparing The Role Of Firm’S Enacted Capabilities Of Active Adopters And Non-Active Adopters, Noor Akma Mohd Salleh

The South East Asian Journal of Management

The adoption of innovative information systems (IS) by small-and medium-sized enterprises (SMEs) across heterogeneous culture, locales, and markets are a critical and an ongoing challenge. Such challenge requires more than just good ideas and extensive resources. It requires organisational capabilities that can be labelled as “enacted capabilities”. This study defines enacted capabilities as the firm’s ability to mobilise and deploy IS-based resources in combination or co-present with other capabilities within SMEs. Consequently, the aim of this study is to make a contribution by empirically examining the enacted capabilities of SMEs in developing countries that may influence the success of innovative …


The Effect Of Headquarter Integration Mechanisms On Subsidiaries’ New Product Success: From Control To Coordination Mechanism, Firmanzah Firmanzah Oct 2007

The Effect Of Headquarter Integration Mechanisms On Subsidiaries’ New Product Success: From Control To Coordination Mechanism, Firmanzah Firmanzah

The South East Asian Journal of Management

New product launching (NPL) to the local market by subsidiary managers is a strategic activity, which requires organizational supports from MNC global network. The NPL activity is marked by high level of uncertainty, risk, and market failure. Thus, a headquarter needs to integrate the subsidiary NPL into global strategy. There are two mechanisms to integrate subsidiaries’ activities during NPL process; coordination and control process. By testing the effect of each mechanism on role clarity and functional conflict, I found that coordination mechanism increase role clarity between headquarter and subsidiaries’ managers. In contrast, exercising control mechanism reduces role clarity and functional …


Enterprise Factors Contributing To The Success Of Malaysian Biotechnology Smes: A Grounded Theory Approach, Saridan Abu Bakar, Mohamed Sulaiman, Intan Osman Oct 2007

Enterprise Factors Contributing To The Success Of Malaysian Biotechnology Smes: A Grounded Theory Approach, Saridan Abu Bakar, Mohamed Sulaiman, Intan Osman

The South East Asian Journal of Management

While numerous empirical studies have been conducted in Western countries on biotechnology enterprises, little empirical research has been done in Malaysia especially in respect to the factors that contribute to the success of biotechnology small and medium enterprises (SMEs). In view of this, a study was undertaken recently in Malaysia to address this gap in the existing body of biotechnology knowledge. Using a grounded theory approach, this qualitative study managed to develop a conceptual framework that sheds useful information on the enterprise factors that significantly impact the success of Malaysian biotechnology SMEs. Specifically, this study found that organizational structure, innovation …


Organizational Model Of The Southern Asia Cluster Family Businesses, Vipin Gupta, Nancy M. Levenburg, Lynda L. Moore, Jaideep Motwani, Thomas V. Schwarz Oct 2007

Organizational Model Of The Southern Asia Cluster Family Businesses, Vipin Gupta, Nancy M. Levenburg, Lynda L. Moore, Jaideep Motwani, Thomas V. Schwarz

The South East Asian Journal of Management

Recently, there has been an increased interest in the family business organization. Traditionally, the ideal typical organizational model was one where the management, governance, and ownership entities are kept separate. This principal agent model has been a subject of public debate in the wake of several corporate scandals. In the family business organization, significant management, governance and ownership is often with the members of a family & its trusted partners. It is common in the US to regulate the management, governance, and ownership roles of the family members by using competitive criteria for the involvement of different members. In Southern …


Living Electronically, Wayne Dennison Oct 2007

Living Electronically, Wayne Dennison

Wayne Dennison

Moving your office from paper to electronic, including electronic surveys and overcoming the hurdles that are involved with this transition.


Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova Oct 2007

Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova

Liana Napalkova

No abstract provided.


A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible Oct 2007

A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible

Management Information Systems Faculty Research

This paper examines the graduation rates for all types of degrees earned by students majoring in information technologies at U.S. colleges and universities. The numbers used in this report are based on graduation numbers reported to the U.S. Department of Education. These numbers show a growth in the total number of graduates between 1995 and 2005 from 103,039 to 187,237 with a peak in 2003 of 240,862. There is a sharp decline between 2003 and 2005. This decline can be linked to major events: the burst of the IT bubble and the terrorist attacks of September 11, 2001. And there …


Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs Oct 2007

Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs

MIS/OM/DS Faculty Publications

The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …


Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo Oct 2007

Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo

Research Collection School Of Computing and Information Systems

In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …


A Survey Of Schema Matching Research, Roger Blake Sep 2007

A Survey Of Schema Matching Research, Roger Blake

College of Management Working Papers and Reports

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova Sep 2007

Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova

Liana Napalkova

This paper focuses on the development of simulation-based environment for multi-echelon cyclic planning and optimisation in the product maturity phase. It is based on integration of analytical and simulation techniques. Analytical techniques are used to obtain initial planning decisions under conditions of stochastic demand and lead time, whereas simulation techniques extend these conditions to backlogging and capacity constraints. Simulation is used to analyse and improve cyclical decisions received from the analytical model. The proposed environment includes four components, such as database, process, optimisation and procedural one. Database component defines a supply chain network and its input parameters. Procedural component generates …


Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle Sep 2007

Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle

Hubert Oesterle

No abstract provided.


A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan Sep 2007

A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan

Management Faculty Publications

Radio Frequency Identification (RFID) technology promises to transform supply chain management. Building on previous research in information systems and supply chain management, this paper proposes a theoretical framework for RFID adoption and benefits, and tests the framework using data on U.S. firms. Our analysis suggests that there is a positive association between information technology (IT) application deployment and RFID adoption. We find that RFID implementation spending and partner mandate are associated with an expectation of early return on RFID investment, and a perceived lack of industry-wide standards is associated with an expectation of delayed return on RFID investment. These results …


The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr. Sep 2007

The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr.

ISSCM Faculty Publications

The Greater Dayton IT Alliance 2008-11 Strategic Plan is the product of tactical collaboration by the Board of Trustees and members. This team developed the key elements of the plan which were then individually examined to create required actions, programs and metrics.