Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (27)
- SelectedWorks (19)
- Singapore Management University (15)
- Selected Works (11)
- Universitas Indonesia (10)
-
- Georgia State University (9)
- New Jersey Institute of Technology (5)
- San Jose State University (5)
- Air Force Institute of Technology (4)
- Wright State University (4)
- Claremont Colleges (3)
- Marshall University (3)
- Sacred Heart University (3)
- Boise State University (2)
- Kennesaw State University (2)
- University of Dayton (2)
- University of Richmond (2)
- Butler University (1)
- DePaul University (1)
- Edith Cowan University (1)
- Loyola University Chicago (1)
- Missouri University of Science and Technology (1)
- Munster Technological University (1)
- Old Dominion University (1)
- Santa Clara University (1)
- Syracuse University (1)
- University of Central Florida (1)
- University of Massachusetts Boston (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- Keyword
-
- Technology (12)
- Information (7)
- Internet (7)
- Präsentation (7)
- IT (6)
-
- Analysis (5)
- Business (5)
- Economy (5)
- Knowledge management (5)
- Management (5)
- System (5)
- Web (5)
- Online (4)
- Communication (3)
- Consumer (3)
- Entrepreneurship (3)
- Geschäftsmodell (3)
- Konferenzpapier (3)
- Network (3)
- Organizational learning (3)
- Privacy (3)
- Quality (3)
- Security (3)
- Communication in organizations (2)
- Competitive advantage (2)
- DSS (2)
- Data (2)
- ERP (2)
- Enterprise Information Systems (2)
- Finance (2)
- Publication
-
- Journal of International Technology and Information Management (26)
- Research Collection School Of Computing and Information Systems (14)
- Hubert Oesterle (10)
- The South East Asian Journal of Management (10)
- Computer Information Systems Dissertations (6)
-
- Dissertations (5)
- Dariusz Jemielniak (4)
- ISSCM Faculty Publications (4)
- Theses and Dissertations (4)
- Wayne Dennison (4)
- CGU Faculty Publications and Research (3)
- Computer Information Systems Faculty Publications (3)
- Management Faculty Publications (3)
- WCBT Faculty Publications (3)
- Faculty Publications, Information Systems & Technology (2)
- Faculty and Research Publications (2)
- IT and Supply Chain Management Faculty Publications and Presentations (2)
- Liana Napalkova (2)
- MIS/OM/DS Faculty Publications (2)
- Management Faculty Research (2)
- Qing Hu (2)
- Saurabh Gupta (2)
- Business and Information Technology Faculty Research & Creative Works (1)
- College of Computing and Digital Media Dissertations (1)
- College of Management Working Papers and Reports (1)
- Dr Shah Jahan Miah (1)
- E-JASL 1999-2009 (Volumes 1-10) (1)
- Electronic Theses and Dissertations (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Faculty Publications (1)
- Publication Type
- File Type
Articles 1 - 30 of 141
Full-Text Articles in Business
Improving Practices In A Small Software Firm: An Ambidextrous Perspective, Nannette Napier
Improving Practices In A Small Software Firm: An Ambidextrous Perspective, Nannette Napier
Computer Information Systems Dissertations
Despite documented best practices and specialized tools, software organizations struggle to deliver quality software that is on time, within budget, and meets customer requirements. Managers seeking improved software project outcomes face two dominant software paradigms which differ in their emphasis on upfront planning, customer collaboration, and product documentation: plan-driven and agile. Rather than promoting one approach over the other, this research advocates improving software management practices by developing the organization’s ambidextrous capability. Ambidextrous organizations have the ability to simultaneously succeed at two seemingly contradictory capabilities (e.g. discipline and agility) which leads to enhanced organizational performance. Overall, this study asks the …
Bad News Reporting On Troubled It Projects: The Role Of Personal, Situational, And Organizational Factors, Chongwoo Park
Bad News Reporting On Troubled It Projects: The Role Of Personal, Situational, And Organizational Factors, Chongwoo Park
Computer Information Systems Dissertations
An individual’s bad news reporting behavior has been studied from a number of perspectives and has resulted in a variety of research streams including the MUM effect (or reluctance to transmit bad news), whistle-blowing, and organizational silence. While many scholars in different areas have studied reporting behavior, it has not been widely discussed in the information systems literature. This dissertation research addresses an individual’s bad news reporting behavior (and its antecedents) in the troubled IT project context. Many social phenomena are multi-causal (Hollander 1971). The silence phenomenon involved in an individual’s bad news reporting behavior is multi-causal too. While prior …
Escalation Of Commitment In Information Technology Projects: A Goal Setting Theory Perspective, Vijay Kasi
Escalation Of Commitment In Information Technology Projects: A Goal Setting Theory Perspective, Vijay Kasi
Computer Information Systems Dissertations
ABSTRACT ESCALATION OF COMMITMENT IN INFORMATION TECHNOLOGY PROJECTS: A GOAL SETTING THEORY PERSPECTIVE BY VIJAY KASI Aug 30, 2007 Committee Chair: Dr. Mark Keil Major Academic Unit: Center for Process Innovation Information technology (IT) projects are prone to failure. One explanation for the high failure rate among IT projects is that managers overly commit to a failing course of action, a phenomenon referred as escalation of commitment. While the notion of goals and commitment are central to the phenomenon of escalation, very few prior studies have investigated their impact on escalation. In this study, a research model rooted in goal …
Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle
Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle
Hubert Oesterle
No abstract provided.
Silent Processes For Independent Living, Hubert Oesterle
Silent Processes For Independent Living, Hubert Oesterle
Hubert Oesterle
No abstract provided.
Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula
Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula
Management Faculty Research
Do you want to affirmatively continue your and Tom Peters's Search for Excellence? Then practice MBI. A corollary to Ken Blanchard's idea of the One Minute Manager is the concept of Management by Interruptions (MBI). Although we do not want to overly manage the details of work, usually called micro management, we are often called upon as leaders and managers to supply frequent small segments of data and information. Mini management is good; micro management is not.
Measuring Organizational Usage Of Information Technology, Anand Jeyaraj
Measuring Organizational Usage Of Information Technology, Anand Jeyaraj
ISSCM Faculty Publications
Organizations make considerable investments in information technology to support their internal and external operations. For instance, a recent research report by Gartner Inc. indicates that worldwide spending on information technology will reach United States $3.3 trillion for the year 2008.
A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen
A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen
Business and Information Technology Faculty Research & Creative Works
The lack of trust is one of the most frequently cited reasons for customer's not returning to Internet service providers. As a new form of commercial activity, online financial services and stock trading involve more uncertainty and risk than traditional financial services. Trust is therefore a relatively influential factor of customer behavior in online financial services. The purpose of this study is to propose a framework of Intention to continuously adopt online financial services. Furthermore, the mediated effects of website trust are trusted. The main method of data collection for this study is a survey instrument designed by the author. …
An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz
An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz
CGU Faculty Publications and Research
The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …
A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman
A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman
Research Collection School Of Computing and Information Systems
Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …
Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard
Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard
Research Collection School Of Computing and Information Systems
The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …
It-Basierte Geschäftsmodelle, Hubert Oesterle
An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng
An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng
Research Collection School Of Computing and Information Systems
This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …
The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh
The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh
Research Collection School Of Accountancy
Past research using the resource-based view of a firm suggests that it is important to consider how firms develop, manage, and deploy resources and capabilities to influence the overall process of strategy formation and implementation. Relatively little research has been conducted in conceptualizing how firms implement and manage modularity of organizational routines during capability development. Yet, most companies would benefit from implementing modularity in organizational routines when competing in dynamic market conditions. Such implementations may require fundamental organizational reorientation that incurs significant coordination costs, and in some cases, such modularization attempts may fail, costing organizations significant amounts of valuable resources. …
Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller
Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller
Research Collection School Of Computing and Information Systems
When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …
Entrepreneurs Vs. Business Plans: A Study Of Practicality And Usefulness, Sam Pd Anantadjaya
Entrepreneurs Vs. Business Plans: A Study Of Practicality And Usefulness, Sam Pd Anantadjaya
The South East Asian Journal of Management
In higher education, the topic on business plan is relatively studied in great details to note the importance on formulating business plans. Business plans are regarded as the reference point for business people; managers and members of the board of directors, to really realize the business activities. At least, the topic on business plan, which are discussed and studied in universities, ought to have its own value in the real business operations. Many entrepreneurs, however, face difficulties in formulating structural business plans. Many entrepreneurs may not actually formulate business plans as they are regarded important in many classrooms’ teaching, to …
Adoption Of Innovative Information Systems By Smes: Comparing The Role Of Firm’S Enacted Capabilities Of Active Adopters And Non-Active Adopters, Noor Akma Mohd Salleh
Adoption Of Innovative Information Systems By Smes: Comparing The Role Of Firm’S Enacted Capabilities Of Active Adopters And Non-Active Adopters, Noor Akma Mohd Salleh
The South East Asian Journal of Management
The adoption of innovative information systems (IS) by small-and medium-sized enterprises (SMEs) across heterogeneous culture, locales, and markets are a critical and an ongoing challenge. Such challenge requires more than just good ideas and extensive resources. It requires organisational capabilities that can be labelled as “enacted capabilities”. This study defines enacted capabilities as the firm’s ability to mobilise and deploy IS-based resources in combination or co-present with other capabilities within SMEs. Consequently, the aim of this study is to make a contribution by empirically examining the enacted capabilities of SMEs in developing countries that may influence the success of innovative …
The Effect Of Headquarter Integration Mechanisms On Subsidiaries’ New Product Success: From Control To Coordination Mechanism, Firmanzah Firmanzah
The Effect Of Headquarter Integration Mechanisms On Subsidiaries’ New Product Success: From Control To Coordination Mechanism, Firmanzah Firmanzah
The South East Asian Journal of Management
New product launching (NPL) to the local market by subsidiary managers is a strategic activity, which requires organizational supports from MNC global network. The NPL activity is marked by high level of uncertainty, risk, and market failure. Thus, a headquarter needs to integrate the subsidiary NPL into global strategy. There are two mechanisms to integrate subsidiaries’ activities during NPL process; coordination and control process. By testing the effect of each mechanism on role clarity and functional conflict, I found that coordination mechanism increase role clarity between headquarter and subsidiaries’ managers. In contrast, exercising control mechanism reduces role clarity and functional …
Enterprise Factors Contributing To The Success Of Malaysian Biotechnology Smes: A Grounded Theory Approach, Saridan Abu Bakar, Mohamed Sulaiman, Intan Osman
Enterprise Factors Contributing To The Success Of Malaysian Biotechnology Smes: A Grounded Theory Approach, Saridan Abu Bakar, Mohamed Sulaiman, Intan Osman
The South East Asian Journal of Management
While numerous empirical studies have been conducted in Western countries on biotechnology enterprises, little empirical research has been done in Malaysia especially in respect to the factors that contribute to the success of biotechnology small and medium enterprises (SMEs). In view of this, a study was undertaken recently in Malaysia to address this gap in the existing body of biotechnology knowledge. Using a grounded theory approach, this qualitative study managed to develop a conceptual framework that sheds useful information on the enterprise factors that significantly impact the success of Malaysian biotechnology SMEs. Specifically, this study found that organizational structure, innovation …
Organizational Model Of The Southern Asia Cluster Family Businesses, Vipin Gupta, Nancy M. Levenburg, Lynda L. Moore, Jaideep Motwani, Thomas V. Schwarz
Organizational Model Of The Southern Asia Cluster Family Businesses, Vipin Gupta, Nancy M. Levenburg, Lynda L. Moore, Jaideep Motwani, Thomas V. Schwarz
The South East Asian Journal of Management
Recently, there has been an increased interest in the family business organization. Traditionally, the ideal typical organizational model was one where the management, governance, and ownership entities are kept separate. This principal agent model has been a subject of public debate in the wake of several corporate scandals. In the family business organization, significant management, governance and ownership is often with the members of a family & its trusted partners. It is common in the US to regulate the management, governance, and ownership roles of the family members by using competitive criteria for the involvement of different members. In Southern …
Living Electronically, Wayne Dennison
Living Electronically, Wayne Dennison
Wayne Dennison
Moving your office from paper to electronic, including electronic surveys and overcoming the hurdles that are involved with this transition.
Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova
Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova
Liana Napalkova
No abstract provided.
A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible
A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible
Management Information Systems Faculty Research
This paper examines the graduation rates for all types of degrees earned by students majoring in information technologies at U.S. colleges and universities. The numbers used in this report are based on graduation numbers reported to the U.S. Department of Education. These numbers show a growth in the total number of graduates between 1995 and 2005 from 103,039 to 187,237 with a peak in 2003 of 240,862. There is a sharp decline between 2003 and 2005. This decline can be linked to major events: the burst of the IT bubble and the terrorist attacks of September 11, 2001. And there …
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
MIS/OM/DS Faculty Publications
The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …
Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo
Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo
Research Collection School Of Computing and Information Systems
In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …
A Survey Of Schema Matching Research, Roger Blake
A Survey Of Schema Matching Research, Roger Blake
College of Management Working Papers and Reports
Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …
Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova
Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova
Liana Napalkova
This paper focuses on the development of simulation-based environment for multi-echelon cyclic planning and optimisation in the product maturity phase. It is based on integration of analytical and simulation techniques. Analytical techniques are used to obtain initial planning decisions under conditions of stochastic demand and lead time, whereas simulation techniques extend these conditions to backlogging and capacity constraints. Simulation is used to analyse and improve cyclical decisions received from the analytical model. The proposed environment includes four components, such as database, process, optimisation and procedural one. Database component defines a supply chain network and its input parameters. Procedural component generates …
Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle
Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle
Hubert Oesterle
No abstract provided.
A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan
A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan
Management Faculty Publications
Radio Frequency Identification (RFID) technology promises to transform supply chain management. Building on previous research in information systems and supply chain management, this paper proposes a theoretical framework for RFID adoption and benefits, and tests the framework using data on U.S. firms. Our analysis suggests that there is a positive association between information technology (IT) application deployment and RFID adoption. We find that RFID implementation spending and partner mandate are associated with an expectation of early return on RFID investment, and a perceived lack of industry-wide standards is associated with an expectation of delayed return on RFID investment. These results …
The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr.
The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr.
ISSCM Faculty Publications
The Greater Dayton IT Alliance 2008-11 Strategic Plan is the product of tactical collaboration by the Board of Trustees and members. This team developed the key elements of the plan which were then individually examined to create required actions, programs and metrics.