Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2012

Management Information Systems

Articles 1 - 30 of 125

Full-Text Articles in Business

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra Dec 2015

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra

Shahriar Akter

Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win Dec 2012

The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win

Dr Khin Win

This research explores users’ intention to use teleconsultation technology. The study also explores the influence of facilitating conditions on the acceptance of the technology in the health care environment in Malaysia. Further, the study compares the level of user acceptance in two organizational settings: (1) between emergency and non-emergency environment, and (2) between referring and referral hospital. This research presumes on the basis of exploratory and descriptive study engaging a survey of healthcare providers who practice in public hospitals in Malaysia. The study reports a high level of acceptance and acceptable extent of facilitating conditions of teleconsultation technology. Thus, some …


Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung Dec 2012

Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung

Dr Khin Win

The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of “Triangulation research method” and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …


Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win Dec 2012

Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win

Dr Khin Win

The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …


A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher Dec 2012

A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher

Dr Khin Win

Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield Dec 2012

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield

Dr Akemi Chatfield

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Dec 2012

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Dr Akemi Chatfield

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Use Centric Hci Requirements Elicitation, Robert Brown Dec 2012

Use Centric Hci Requirements Elicitation, Robert Brown

Dr Robert Brown

Among persistent issues in HCI are its separation from the other disciplines involved in the construction of Information Systems, any coherently extensive methodology and straight forward techniques for clustering interface elements for best effect. An approach to HCI which encompasses the full context of use (rather than just of usage) and entails more traditional SA&D within a single framework could be of some value. This paper introduces the HCI values of the Activity Theoretic System Architecture (ATSA) Method.


Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell Dec 2012

Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell

Associate Professor Ghassan Beydoun

Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …


Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun Dec 2012

Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun

Associate Professor Ghassan Beydoun

Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …


Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell Dec 2012

Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell

Dr Glenn Bewsell

This research investigates mechanisms that impact trust and trust as an organising principle at online auctions using data collected from a community website. Qualitative analysis is used to make sense of the data collected and to identify key factors that impact trust and organising for trust. As a result of the discussion, I attempt to explore key factors that impact trust at online auctions and relate the discussion to previous research. This research adds to the understanding of trust theory and online auction trust, and this research can be used by practitioners to better support users and improve the design …


Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety Dec 2012

Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety

Dr Ping Yu

This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell Dec 2012

Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell

Dr Holly Tootell

Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Dec 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Dr Holly Tootell

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford Dec 2012

A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford

Associate Professor Rajeev Sharma

The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria for the selection of the marker variable proposed in the literature. Our findings show that the conclusions that can be drawn under different criteria are significantly and substantially different, raising doubts about the validity of the marker variable technique. Proposals for developing theoretically grounded criteria for …


Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus Dec 2012

Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus

Associate Professor Rajeev Sharma

Organisational culture is an important influence in shaping the organisational impacts of Information Systems. However, the conceptualisation and operationalisation of culture in empirical studies does not reflect the richness of the theoretical literature. In particular, our review finds that the dynamic, emergent and reciprocal nature of the IS-culture relationship has not been adequately examined in the empirical literature. This is partly due to the methodologies employed in existing research. Suggestions for enriching empirical research into the IS- culture relationship are discussed.


Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma Dec 2012

Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma

Professor Rajeev Sharma

Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.


The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds Dec 2012

The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds

Professor Rajeev Sharma

Business analytics involves interpreting organizational data to improve decision-making and to optimise business processes. It has the potential to improve firm performance and increase competitive advantage. Although many case studies have been reported that describe business analytics applications and speculate about how they might contribute to firm performance, there is no clearly articulated and theoretically grounded model in the literature. This paper proposes a theoretical framework for understanding how and why business analytics technology and capabilities can lead to value-creating actions that lead to improved form performance and competitive advantage. We focus particularly on how strategy and maturity impact business …


Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford Nov 2012

Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford

Aileen Koh

The increasing use of projects and programs by organizations to achieve business strategy and goals has led to the need for understanding project portfolio management. Along with the increasing diffusion of portfolio management, a new managerial role has evolved: the portfolio manager. This new role is pivotal in planning and controlling complex project landscapes more effectively and efficiently. This study investigates the governance structures and the roles, responsibilities, and practices of portfolio managers. A sequential mixed-method approach under a realism paradigm is used. This article presents the first-stage qualitative study, using an inductive interview-based approach with six portfolio managers from …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr. Nov 2012

Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.

Chong W. Kim

As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …


On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose Nov 2012

On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose

Dr Lam-Son Le

The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …


Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê Nov 2012

Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê

Dr Lam-Son Le

Business services arguably play a central role in service-based information systems as they would fill in the gap between the technicality of Service-Oriented Architecture and the business processes captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in plain Web services. The representation of business services requires that we view human activity and human-mediated functionality through the lens of computing and systems engineering. We give insights into the modeling of business services and relationships between them. This work sheds light on the analysis, design and reusability of business-aware services that business owners, entrepreneurs and business …


Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland Nov 2012

Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland

Associate Professor Peter Hyland

Many vendors have acclaimed Service Oriented Architecture (SOA) as a better way to design and build enterprise-wide software. While these claims may be true in the private sector, there is scant evidence in the literature for the same success in the public sector. The adoption of SOA as the dominant development paradigm within an organisation often requires significant organisational changes, which are difficult to achieve in the public sector, with its strict hierarchies and departmental independence. Indeed, many government departments are not ready to adopt this new paradigm. However, the literature does not provide a suitable SOA readiness framework for …


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Nov 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Associate Professor Peter Hyland

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher Nov 2012

A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher

Professor John Fulcher

Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …


On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose Nov 2012

On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose

Dr Hoa Dam

The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …


Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr. Nov 2012

Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.

Andrew Sikula, Sr.

As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …