Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- E-business and e-government (7)
- Proceedings (7)
- Architectural strategy (5)
- E-learning (5)
- Information systems (5)
-
- Individual Computing Capabilities / End-User Training / IT Training (4)
- Information security (4)
- Local government (4)
- Theory and Meta-Theory (4)
- Adoption (3)
- Cyber (3)
- Cyber Operations (3)
- Cyber operations (3)
- Gender (3)
- Innovation (3)
- Internet (3)
- Municipal Councils (3)
- Sequestration (3)
- TQM (3)
- Total Quality Management (3)
- Adaptive Structuration Theory (2)
- Assimilation (2)
- Austerity (2)
- Case study (2)
- Change management (2)
- Collaboration (2)
- Competition cases (2)
- Computer Assisted Decision Making (2)
- Computer based nursing documentation (2)
- Computer science (2)
- Publication
-
- Associate Professor Linda Dawson (13)
- Saurabh Gupta (9)
- C. Jason Woodard (8)
- Pratyush Bharati (8)
- Jan Kallberg (7)
-
- Surendra Sarnikar (5)
- Dr Khin Win (4)
- Chong W. Kim (3)
- Herbert J. Mattord (3)
- Humayun Zafar (3)
- Maurice Dawson (3)
- Steven Alter (3)
- Adriane B. Randolph (2)
- Aileen Koh (2)
- Andrew Sikula, Sr. (2)
- Associate Professor Ghassan Beydoun (2)
- Associate Professor Peter Hyland (2)
- Associate Professor Rajeev Sharma (2)
- Dr Akemi Chatfield (2)
- Dr Deogratias Harorimana (2)
- Dr Holly Tootell (2)
- Dr Lam-Son Le (2)
- Jason Bennett Thatcher (2)
- Professor Rajeev Sharma (2)
- Roger H. Blake (2)
- Shahriar Akter (2)
- Solvay Gerke (2)
- Amit Deokar (1)
- Anna Ujwary-Gil (1)
- Arcot Desai NARASIMHALU (1)
- File Type
Articles 1 - 30 of 125
Full-Text Articles in Business
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Shahriar Akter
Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
Dr Khin Win
This research explores users’ intention to use teleconsultation technology. The study also explores the influence of facilitating conditions on the acceptance of the technology in the health care environment in Malaysia. Further, the study compares the level of user acceptance in two organizational settings: (1) between emergency and non-emergency environment, and (2) between referring and referral hospital. This research presumes on the basis of exploratory and descriptive study engaging a survey of healthcare providers who practice in public hospitals in Malaysia. The study reports a high level of acceptance and acceptable extent of facilitating conditions of teleconsultation technology. Thus, some …
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Dr Khin Win
The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of “Triangulation research method” and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Dr Khin Win
The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
Dr Khin Win
Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …
Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield
Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield
Dr Akemi Chatfield
Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
Dr Akemi Chatfield
While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …
Use Centric Hci Requirements Elicitation, Robert Brown
Use Centric Hci Requirements Elicitation, Robert Brown
Dr Robert Brown
Among persistent issues in HCI are its separation from the other disciplines involved in the construction of Information Systems, any coherently extensive methodology and straight forward techniques for clustering interface elements for best effect. An approach to HCI which encompasses the full context of use (rather than just of usage) and entails more traditional SA&D within a single framework could be of some value. This paper introduces the HCI values of the Activity Theoretic System Architecture (ATSA) Method.
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Associate Professor Ghassan Beydoun
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Associate Professor Ghassan Beydoun
Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Dr Glenn Bewsell
This research investigates mechanisms that impact trust and trust as an organising principle at online auctions using data collected from a community website. Qualitative analysis is used to make sense of the data collected and to identify key factors that impact trust and organising for trust. As a result of the discussion, I attempt to explore key factors that impact trust at online auctions and relate the discussion to previous research. This research adds to the understanding of trust theory and online auction trust, and this research can be used by practitioners to better support users and improve the design …
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Dr Ping Yu
This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Dr Holly Tootell
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Dr Holly Tootell
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …
A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford
A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford
Associate Professor Rajeev Sharma
The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria for the selection of the marker variable proposed in the literature. Our findings show that the conclusions that can be drawn under different criteria are significantly and substantially different, raising doubts about the validity of the marker variable technique. Proposals for developing theoretically grounded criteria for …
Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus
Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus
Associate Professor Rajeev Sharma
Organisational culture is an important influence in shaping the organisational impacts of Information Systems. However, the conceptualisation and operationalisation of culture in empirical studies does not reflect the richness of the theoretical literature. In particular, our review finds that the dynamic, emergent and reciprocal nature of the IS-culture relationship has not been adequately examined in the empirical literature. This is partly due to the methodologies employed in existing research. Suggestions for enriching empirical research into the IS- culture relationship are discussed.
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Professor Rajeev Sharma
Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
Professor Rajeev Sharma
Business analytics involves interpreting organizational data to improve decision-making and to optimise business processes. It has the potential to improve firm performance and increase competitive advantage. Although many case studies have been reported that describe business analytics applications and speculate about how they might contribute to firm performance, there is no clearly articulated and theoretically grounded model in the literature. This paper proposes a theoretical framework for understanding how and why business analytics technology and capabilities can lead to value-creating actions that lead to improved form performance and competitive advantage. We focus particularly on how strategy and maturity impact business …
Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford
Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford
Aileen Koh
The increasing use of projects and programs by organizations to achieve business strategy and goals has led to the need for understanding project portfolio management. Along with the increasing diffusion of portfolio management, a new managerial role has evolved: the portfolio manager. This new role is pivotal in planning and controlling complex project landscapes more effectively and efficiently. This study investigates the governance structures and the roles, responsibilities, and practices of portfolio managers. A sequential mixed-method approach under a realism paradigm is used. This article presents the first-stage qualitative study, using an inductive interview-based approach with six portfolio managers from …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Chong W. Kim
As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
Dr Lam-Son Le
The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …
Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê
Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê
Dr Lam-Son Le
Business services arguably play a central role in service-based information systems as they would fill in the gap between the technicality of Service-Oriented Architecture and the business processes captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in plain Web services. The representation of business services requires that we view human activity and human-mediated functionality through the lens of computing and systems engineering. We give insights into the modeling of business services and relationships between them. This work sheds light on the analysis, design and reusability of business-aware services that business owners, entrepreneurs and business …
Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland
Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland
Associate Professor Peter Hyland
Many vendors have acclaimed Service Oriented Architecture (SOA) as a better way to design and build enterprise-wide software. While these claims may be true in the private sector, there is scant evidence in the literature for the same success in the public sector. The adoption of SOA as the dominant development paradigm within an organisation often requires significant organisational changes, which are difficult to achieve in the public sector, with its strict hierarchies and departmental independence. Indeed, many government departments are not ready to adopt this new paradigm. However, the literature does not provide a suitable SOA readiness framework for …
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Associate Professor Peter Hyland
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
Professor John Fulcher
Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
Dr Hoa Dam
The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Andrew Sikula, Sr.
As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …