Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Business

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff Jan 2015

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff

Communications of the IIMA

The rapid advances in information and communication technologies coupled with the dominant overarching Neo-liberal/capitalist ideological underpinnings of the dominant Western powers have generated a momentum towards a homogeneous global village. The impact of which has been to expand World conflict and propelled many nations towards losing their national identity and traditions. This article discusses the various impacts from IT globalization and calls for a new global communication awareness.


A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang Jan 2015

A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang

Communications of the IIMA

After reviewing the literature, the concept of Business Model or E-Business Models are discussed in Ms paper. Firms keep interacting with each other and build all kinds of relationships among them. Based on the theory of business networks, we put forward a networking-based view of business model analysis frame. When we make decisions to choose one or other business models, first, the source of value should be found. Second, business network models, which show the procedure of value creation and distribution, should be analyzed. Third, we choose the feasible network among networks we analyzed. Finally, the firms' strategy to ensure …


Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot Jan 2015

Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot

Communications of the IIMA

University-based education is facing direct competition from for-profit corporations over the lucrative lifetime-learning market. This is occurring primarily because universities have not adapted to advances in technology and changes in the educational needs of students. To correct this problem, a new curriculum solution is proposed. This solution is loosely based upon the model curricula generated by professional organizations. The solution utilizes personal learning plans tied to a global learning schema. The end result is a very flexible curriculum delivery model that effectively utilizes modern technology and is potentially superior to any offered by commercial education providers.


Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta Jan 2015

Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta

Communications of the IIMA

With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. The main problem related to the retrieval of information from the World Wide Web is the enormous number of unstructured documents and resources, i.e., the difficulty of locating and tracking appropriate sources. In this article, a survey of the research in the area of web mining and suggest web mining categories and techniques. Furthermore, a presentation of …


Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette Jan 2015

Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette

Communications of the IIMA

When individuals and businesses conduct transactions electronically over a network using mobile devices, they have participated in mobile e-commerce. The advantages and disadvantages of mobile e-commerce are presented in this paper. This is followed by a discussion of who is using mobile e-commerce and why they are using it. Information is also presented on how to be successful with mobile e-commerce.


The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak Jan 2015

The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak

Communications of the IIMA

Medical information has a special status among the various items of personal information. The introduction of information technology (IT) has changed the handling of medical information in ways that are both promising for improving health care as well as threatening to the individual patient's medical information privacy. The challenge to business practitioners is to manage medical information intelligently and to avoid the negative consequences of mismanaging this information, which may include customer backlash in the forms of boycotts, lawsuits, and loss of company reputation. This challenge is particularly important in the context of the U.S. National Health Information Network initiative, …


Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir Jan 2015

Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir

Communications of the IIMA

This paper discusses the performance of traffic flow over Local Area Networks (LAN) utilizing buffers to avoid any irrelevant traffic that clusters the network using sniffer pro. The study applies buffer technology to filter out unnecessary information so the system captures only required information packets. Buffers that capture the protocols are identified. These are. Address Resolution Protocols (ARP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). The study identified to the user/analyzer of an Ethernet technology, how to isolate a cluster network problem, monitor network performance, and offer tips on how to correctly assess …


The Business Models Of E-Marketplace, Weijun Zheng Jan 2015

The Business Models Of E-Marketplace, Weijun Zheng

Communications of the IIMA

An electronic marketplace (EM) is an inter-organizational information intermediary that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior researches on EM design have not defined EM business model clearly. With a review of existing literatures on business model, this paper developed taxonomy of EM business models and classified existing EMs business model from a network role perspective. Further discussion of the evolution of EM business model is provided at the end.


Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer Jan 2015

Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer

Communications of the IIMA

This research focused on mid-term planning representing the tactical level of supply chain management among manufacturers. Mid-term planning is based on established frame contracts between suppliers and customers. Demand forecasts and early customer orders (from retailers or consumers) are the starting point for performing planning runs involving logistical functions such as procurement, production, storage, and distribution. The aim is to draw up consistent plans among supply chain partners.


Check 21: The New Technological Drive Towards Paperless Banking, Chang-Tseh Hsieh Jan 2015

Check 21: The New Technological Drive Towards Paperless Banking, Chang-Tseh Hsieh

Communications of the IIMA

Over the last decade, banks have spent a great deal of resources on technology improvements. With decreasing interest rate spreads, banks are being forced to look for new ways to increase profits. Recently, new legislation was passed that will allow banks to become more efficient in check truncation through technology. The new legislation is commonly referred to as Check 21. If used properly. Check 21 will increase employee efficiency and reduce other operational costs such as courier services. This paper examines the short history of Check 21 and discusses how technology affects banks profitability. Key areas where banks can become …


Dell's Use Of Crm-Scm Integration To Dominate The Pc Market, Sharon Klinker, Ronald Terrell, Ahmed Y. Mahfouz Jan 2015

Dell's Use Of Crm-Scm Integration To Dominate The Pc Market, Sharon Klinker, Ronald Terrell, Ahmed Y. Mahfouz

Communications of the IIMA

Dell is one of the most successful and profitable computer corporations in history. It has been known for its innovative customer service and product custom configuration. As it continues to grow, it is faced with the challenge of how to maintain its customer relationships and inventory management, while continuing to meet the demands and requirements of its customers. This paper will examine how Dell implements enterprise-wide computing software, which profiles and targets its customers, as well as streamlines the flow of its products throughout the supply chain. Dell's collaboration with other computer software companies has allowed it to become a …


Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang Jan 2015

Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang

Communications of the IIMA

The major purpose of this paper is to investigation the issues of teaching ERP systems in a supply chain management course. The secondary purpose of the paper is to evaluate the effectiveness of students' perception of learning ERF systems in a supply chain management course.


Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller Jan 2015

Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller

Communications of the IIMA

The Semantic Web is expected to be the next generation of the WWW. Ontologies and agents are major ingredients of the Semantic Web. In (Lee and Geller 2005), we have argued that some existing ontologies make use of unnatural concepts. We stated that unnatural concepts make it difficult to use an ontology and they contradict the purpose of an ontology, which includes explanatory power for the purpose of sharing information. In this paper we elaborate what makes a concept unnatural. We also analyze existing ontologies to get numeric measures of how natural their concepts are.


A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel Jan 2015

A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel

Communications of the IIMA

A great deal of research is focused on formation of a data warehouse. This is an important area of research as it could save many computation cycles and thus allow accurate information provided to the right people at the right time. Two considerations when forming a data warehouse are data cleansing (including entity resolution) and with schema integration (including record linkage). Uncleansed and fragmented data requires time to decipher and may lead to increased costs for an organization, so data cleansing and schema integration can save a great many (human) computation cycles and can lead to higher organizational efficiency. In …


Explicitly Stated Security Policies Of Web Sites Of Global Banks Of Europe, Australia, Asia And The U.S, Donald R. Moscato, Eric D. Moscato Jan 2015

Explicitly Stated Security Policies Of Web Sites Of Global Banks Of Europe, Australia, Asia And The U.S, Donald R. Moscato, Eric D. Moscato

Communications of the IIMA

This paper is the latest component of a research project conducted by the authors over a three-year period. The first phase emphasized the privacy policies of global banks and other businesses engaged in E-commerce. Over 600 individualized web-sites were visited and evaluated. This, the second phase of the research project, focuses on the security policies in place for global financial institutions. The purpose of this research study is to review, compare and summarize the security policies of global banks as they are expressed on their web sites. A total of over 300 web sites of global banks were included in …


A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka Jan 2015

A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka

Communications of the IIMA

Recently, SBC Communications (SBC) initiated a project to improve the software development processes of its Information Technology (IT) group. The project was named EXPRESS (Excellence in Process for Enterprise Software Solutions), and the goal was to transform the IT function to a Capability Maturity Model (CMM) Level 3 operation. SBC's management hopes that achieving CMM level 3 will result in improved delivery of IT services and products through greater efficiency by having a standardized means to initiate and perform IT work. This paper provides a case study that describes the EXPRESS project. This will include comparing SBC's former project management …


A Case Study Of Pratt And Whitney Aircraft's Commercial Spares Planning, Vincent A. Mabert, Ashok Soni, Gerard Campbell Jan 2015

A Case Study Of Pratt And Whitney Aircraft's Commercial Spares Planning, Vincent A. Mabert, Ashok Soni, Gerard Campbell

Communications of the IIMA

This case study, which can be used as a teaching case, deals with jet engine spare parts planning at Pratt and Whitney Aircraft Company, a division of United Technologies Corporation. The case includes background on the company's history and an overview of their jet engine manufacturing operations. The primary focus of the case is on the application and evaluation offorecasting models for demand planning within an ERF system environment. An Excel-based decision support system (DSS), which is available from the authors upon request, enables the evaluation of alternative time series forecasting models for a variety of jet engine spare parts. …


Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago Jan 2015

Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago

Communications of the IIMA

While much has been studied and written about the adjustments managers must make when supervising remote workers in virtual work arrangements, little has been written about the potential change in the organizational culture and the effect the culture has on the virtual worker's quality of work life and professional isolation. Not only may culture affect the implementation and success of telecommuting arrangements, but the increased isolation and independence of a virtual worker may impact the culture surrounding remote workers and create an organizational subculture. This study examines the relationship between quality of work life, professional isolation, and an organization's cultural …


Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke Jan 2015

Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke

Communications of the IIMA

This paper attempts to take an objective look at offshore outsourcing within the information technology (IT) industry. Background material is provided to establish a clear definition and context for the discussion. Basic benefits, risks, and trends are identified and domestic market impacts are explored.


Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen Jan 2015

Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen

Communications of the IIMA

This study aims to finding the factors that affect the adoption of web services technology. The study proposes a web service technology adoption model in which three contexts from Tornatzky and Fleischer's (1990) framework, namely, external environmental context, technological context and organizational context, and two constructs from the TAM (Davis, 1989) model, perceived usefulness and perceived ease of use, are studied to determine their influence on web services adoption. Exploratory factor analysis is used to explore the factors affecting the adoption of web services technology. Structural Equation modeling is used to validate and analyze the research model.


Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb Jan 2015

Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb

Communications of the IIMA

The purpose of the study was to identify the policies and procedures required in U.S. hospitals to meet the requirements of the Health Information Portability and Accountability Act (HIPAA). A major aspect of the study focused on the degree of change required to meet the security standards and on the types of security devices used by the hospitals. Findings from a survey of 286 U.S. hospitals found the greatest amount of change needed to meet HIPAA security compliance were changes resulting in increased Information Systems (IS) budget requirements, changes to network monitoring, and additional hiring in the IS department.


An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones Jan 2015

An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones

Communications of the IIMA

Electronic Data Interchange (EDI) is widely regarded by organizations worldwide as the business standard for the timely and secure exchange of electronic business transactions in an expanding global marketplace. While numerous research efforts have explored how the adoption, implementation, and integration of this technology can impact an organization's technical, organizational, and competitive environment - few studies have documented the process used by organizations to implement EDI transaction sets with trading partners. This paper advances an innovative lifecycle used by a food manufacturing company to successfully design, implement, and test an EDI transaction set. This paper also describes how this transaction …


The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul Jan 2015

The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul

Communications of the IIMA

This paper investigates the interrelationship and effect of trust and culture on the level of goal setting within the context of information systems security. In doing so, it explores and discusses the concepts of trust and strong culture and seeks to demonstrate their importance in setting efficiently information systems security goals. The paper contributes to interpretive information systems research with the study of goal setting in a security management context and its grounding within an interpretive epistemology.


Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie Jan 2015

Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie

Communications of the IIMA

The number of severe computer security breaches in e-commerce applications has been on the increase over the last few years. This has become one of the biggest security problems in recent years. Although there are tools to build e-commerce application firewalls to alert and prevent intruder attacks, these tools are not trivial to install (they are not plug-and-play). Internet intruders can create havoc and produce catastrophe results by exploiting weaknesses in e- commerce applications. Therefore, developers of e-commerce web sites have to incorporate ways to systematically identify and eliminate vulnerabilities in the EC applications to enhance their security. This paper …


Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen Jan 2015

Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen

Communications of the IIMA

Facing the competitive pressure from new hospitals and new regulations from the Bureau of National Health Insurance, hospital managers in Taiwan are concentrating on reducing the hospital operation costs and improving the healthcare quality. Practitioners and academic researchers agree that reducing the pharmacy cost is one of the best solutions to sustain competitive advantage. As electronic commerce becomes popular in many industry sectors, e- procurement is growing rapidly in the healthcare industry. The purpose of this paper is to investigate the managers' perceptions of benefits of using electronic procurement system. After surveying 152 hospitals in Taiwan, we find that hospital …


Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka Jan 2015

Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka

Communications of the IIMA

This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm's president supported the project to the extent that it …


Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani Jan 2015

Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani

Communications of the IIMA

Several factors can influence a consumer's likelihood of purchasing on the Web including trust, ease-of-use, and price discounts. This study examines over a dozen different variables that affect the decision to conduct business online. A survey of experienced Web users validated that poor design, security, and reliability tend to decrease a person's willingness to purchase through the Web.


Implementation Issues For Mobile-Wireless Infrastructure And Mobile Health Care Computing Devices For A Hospital Ward Setting, Liza Heslop, Stephen Weeding, Linda Dawson, Julie Fisher, Andrew Howard Dec 2009

Implementation Issues For Mobile-Wireless Infrastructure And Mobile Health Care Computing Devices For A Hospital Ward Setting, Liza Heslop, Stephen Weeding, Linda Dawson, Julie Fisher, Andrew Howard

Associate Professor Linda Dawson

mWard is a project whose purpose is to enhance existing clinical and administrative decision support and to consider mobile computers, connected via wireless network, for bringing clinical information to the point of care. The mWard project allowed a limited number of users to test and evaluate a selected range of mobile-wireless infrastructure and mobile health care computing devices at the neuroscience ward at Southern Health’s Monash Medical Centre, Victoria, Australia. Before the project commenced, the ward had two PC’s which were used as terminals by all ward-based staff and numerous multidisciplinary staff who visited the ward each day. The first …


Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson Jan 2006

Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson

Journal of International Technology and Information Management

This exploratory research was initiated to develop a computer-based interview tool that would help determine the factors that companies in the information and communications technology (ICT) industry consider a problem in regards to the economic environment within a local study region. Topics included the labor market and community issues, including costs of doing business and quality-of-life questions. A computer-based process was employed in telephone interviews to solicit and record responses from executives in ICT-related companies for the 197 cases that are included in this study. Descriptive data are presented along with a first-order and a second-order factor analysis.


A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt Jan 2005

A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt

Journal of International Technology and Information Management

Ultra-wideband (UWB) is a promising class of high-speed wireless communications applications that is projected to significantly change local and wide area network architectures. This article describes the technology, its probable application areas, the environmental forces that are constraining and enabling commercialization, and the prospects for short-term growth for UWB services. Commercial sale and distribution of UWB products has been approved, and widespread sale is expected by 2007.