Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Business

An Examination Of The Relationship Between Digital Divide And Economic Freedom: An International Perspective, Ravi Nath, N.R. Vasudeva Murthy Jan 2003

An Examination Of The Relationship Between Digital Divide And Economic Freedom: An International Perspective, Ravi Nath, N.R. Vasudeva Murthy

Journal of International Information Management

Due to various economic, political and social reasons, the Internet usage remains relatively Iom> in many countries around the world. The difference in access to new information technologies and the Internet among countries, is known as the "digital divide." This is a significant economic phenomenon that warrants the attention of analysts and policy makers. Furthermore, since information technologies and the Internet have proven to be key drivers for economic growth and global trade, many nations are in danger of being marginalized. This paper examines the relationship between economic freedom as indicated by the Economic Freedom Index (EFI), proposed by Beach …


Implementation Of Simulation Software Packages For Healthcare Scheduling, Sang M. Lee, Arben A. Asllani Jan 2003

Implementation Of Simulation Software Packages For Healthcare Scheduling, Sang M. Lee, Arben A. Asllani

Journal of International Information Management

Simulation methodology is considered an effective decision making tool in the process of patient scheduling in healthcare centers. In spite of the large number of simulation software packages that are commercially available, operation researches still are facing difficulties to implement simulation models in healthcare centers. In many cases, healthcare schedulers must spend extra efforts trying to mold scheduling requirements to conform to the features of the package. In this paper, we offer a systematic approach that can be used by practitioners to successfully adopt the available software simulation packages, develop simulation models, and transform their findings into practical scheduling rules. …


The Development Of A Business Rules Engine: A Condition-Action Rule Algorithm For Finite Static Lists, Terri D. Giddens, Kevin E. Gaasch Jan 2003

The Development Of A Business Rules Engine: A Condition-Action Rule Algorithm For Finite Static Lists, Terri D. Giddens, Kevin E. Gaasch

Journal of International Information Management

An on-going theme in Information Systems research is the methods by which business rules are gathered and implemented. Additionally, many efforts have been made to develop reusable algorithms for processing business rules to reduce system development, testing, and maintenance time. The objective of this paper is to present a reusable algorithm for condition-action rules that are applied to finite static lists. More importantly, the algorithm is generalized for complex rules that are complicated by differences in user authorizations and other dependencies.


Perceptions Of Unsolicited Electronic Mail Or Spam, Jack T. Marchewka, Chang Liu, Charles G. Peterson Jan 2003

Perceptions Of Unsolicited Electronic Mail Or Spam, Jack T. Marchewka, Chang Liu, Charles G. Peterson

Journal of International Information Management

The proliferation of unsolicited electronic mail or spam is becoming a global concern for many organizations. This paper explores perceptions of unsolicited email, its impact on personal productivity, the question of whether spam is an invasion of privacy, the perceived need to control spam, and the effectiveness of unsolicited email. The results clearly show that while the respondents find spam annoying, they spend very little time in dealing with it. Although the respondents express the need to control spam, they do not believe that governmental control is the solution, but rather that Internet Service Providers and organizations should take the …


Salaries Of Information Technology Managers; A Trend Analysis, Kai S. Koong, Lui C. Liu, Richard Fowler Jan 2003

Salaries Of Information Technology Managers; A Trend Analysis, Kai S. Koong, Lui C. Liu, Richard Fowler

Journal of International Information Management

During the economic boom of the last decade, companies and organizations have to offer lucrative salaries and a wide variety of incentive programs to attract and to retain highly skilled IT workers. While it is true that the economic downturn has affected the dramatic rise in salary trends, determining the worth of an employee as measured by wages will always remain a critical management issue. History has shown that irrespective of economic conditions, salaries will continue to rise. As the economy recovers and given the projected mass exodus of governmental information technology workers in the coming years, managers will need …


The Virtual Organizing Process—A Critical Tool For Enterprise Competitiveness In The Information Era, Wu F, Chu Lk, Li Hz, Han Xm, Sculli D Jan 2003

The Virtual Organizing Process—A Critical Tool For Enterprise Competitiveness In The Information Era, Wu F, Chu Lk, Li Hz, Han Xm, Sculli D

Journal of International Information Management

The term virtual enterprise has generated considerable confusion because of its rather liberal interpretation. This paper argues that the successful establishment of a virtual enterprise is mainly dependent on the virtual organizing processes of an enterprise's strategies ( VOPES), rather than on the actual manifested transformation of the whole into a single virtual organization. A three-dimensional dynamic framework for VOPES is presented, with the aim of providing a coherent model for positioning the various virtual organizing strategies, and at the same time giving VOPES dynamic tendencies towards market negotiation, co-operation, co-ordination and collaboration. To achieve a competitive advantage, the top …


Seleclting Middleware For N-Tier Applications, Thomas Sandman, Timothy Riley Jan 2003

Seleclting Middleware For N-Tier Applications, Thomas Sandman, Timothy Riley

Journal of International Information Management

This paper describes middleware for n-tier architecture, describes how this middleware is meeting the unique demands of Internet applications and e-commerce, and suggests selection guidelines to assist business managers in choosing appropriate types of middleware for n-tier systems that will meet their internet needs. Different types of middleware provide the functionality for addressing many distinct and disparate problems arising from the distributed processing associated with n-tier systems. This paper associates the type of middleware with the nature of the system being developed.


Mining The Fx Electronic Inter-Dealer Market, Melody Lo, Chang T. Hsieh Jan 2003

Mining The Fx Electronic Inter-Dealer Market, Melody Lo, Chang T. Hsieh

Journal of International Information Management

This paper examines the feasibility of applying data mining techniques to testing market efficiency hypothesis using a high frequency, up to one thousand of a second, electronic brokerage data. Results suggest the existence of a pattern of negative autocorrelation in returns of DEM/USD over relative short lags (less than 40 seconds). However, this pattern is not feasible by two reasons: (1) the structure of autocorrelation pattern is inconsistent and changes too rapidly (2) the largest potential speculative profit is smaller than the regulated tick size. These results indicate that dealers have engaged in any potential profitable speculations based on past …


A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen Jan 2003

A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen

Journal of International Information Management

The. primary purpose of this paper is to explore Microsoft's platform - .Net, Web services, and XML for supply chain management. The following topics are studied: 1) The development of scripting languages for a supply chain management application; 2) The use of XML to enhance compatibility of the scripted applications; and 3) The implementation issues of Microsoft .Net platform. To answer the research questions, a technique similar to content analysis is used in this study. Seventeen case studies regarding the implementation of the .Net Web Services are examined.


Electronic Data Interchange: If A Perspective From Taiwan, Mary C. Jones, Ronald L. Berry, Catherina Yi-Fang Ku Jan 2003

Electronic Data Interchange: If A Perspective From Taiwan, Mary C. Jones, Ronald L. Berry, Catherina Yi-Fang Ku

Journal of International Information Management

This study presents findings about perceptions and use of Electronic Data Interchange (EDI) in Taiwan. It was undertaken to help build a framework within which to better understand EDI in a global setting. Findings indicate that there are differences and similarities between perceptions and use of EDI in Taiwan and what we know about EDI use in Western cultures. Possible explanations are offered for these findings. Several research questions arise out of the findings that can guide future research about EDI in a variety of cultures, and sets of propositions for each research question are suggested.


Knowledge Management: The Role Of Epss, Denise Johnson Mcmanus, Charles A. Snyder Jan 2003

Knowledge Management: The Role Of Epss, Denise Johnson Mcmanus, Charles A. Snyder

Journal of International Information Management

Knowledge Management (KM) has become a key business strategy. KM involves the systematic mapping, harvesting, storing, sharing, maintaining, and refreshing knowledge from many sources. An Electronic Performance Support System (EPSS) can perform an essential role of encapsulating and delivering knowledge at the time needed. Expanding globalization and reliance on distributed knowledge means that the EPSS delivered via networks should have a high priority. We present an argument to show the linkage between components of a KM system and EPSS. The approach involves the creation of software that is designed to assist decisionmakers and performers while they accomplish organizational processes.


V/Hat Have Happened To Export Intermediaries?, Lee Li Jan 2003

V/Hat Have Happened To Export Intermediaries?, Lee Li

Journal of International Information Management

The Internet has changed significantly business operation across national borders. However, existing literature about its impacts on export channels remains limited. This inductive study explored the Internet's impacts on the relations between 13 Chinese manufacturers and their export intermediaries in Canada. Findings from this study suggest that export intermediaries that provide financing and credit, intensive after-sales services, and important distribution infrastructure survive the Internet while those that offer traditional market-sensing and customer-linking services can hardly survive the Internet.


Vendor And Professional Certification Where Is It Headed?, Garry L. White, James R. Cook Jan 2003

Vendor And Professional Certification Where Is It Headed?, Garry L. White, James R. Cook

Journal of International Information Management

Trade journals and magazines define three categories of computer certification: "professional, " industry, " and "vendor. " The purpose of this study was to compare Information Systems IS) professionals' value of professional and vendor certification types in relation to technical and management positions in IS. It appears that IS professionals value both certification types equally when not considering job position. Findings suggest technical and managerial IS professionals value the two types of certifications differently when job position is considered. Future research is warranted to determine why the respondents considered these two certifications differently for both technical (programmers and analysts) and …


An Empirical Model Of Price And Quality Effects Of E-Commerce, Scott E. Sampson, Kendall Hulet Jan 2003

An Empirical Model Of Price And Quality Effects Of E-Commerce, Scott E. Sampson, Kendall Hulet

Journal of International Information Management

During the e-Commerce boom of the late 1990s it was predicted that the Internet would have a significant impact on prices of various goods and services. Whether the net impact would he p ositive or negative was harder to forecast, there being opposing effects. We develop a model that describes some of those effects, including information asymmetry, search costs, price dispersion, trust premiums, and convenience premiums. The model is discussed, and a major portion is statistically tested with empirical data. As an exploratory gesture, the model is extended to consider product quality effects of online shopping. The final section concludes …


Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok Jan 2003

Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok

Journal of International Information Management

In this study we applied Technology Acceptance Model (TAM) to address consumers' online purchasing intentions and examine the effect of gender as a moderating variable on purchase intention. Six hypotheses were proposed based on our research model. We validate TAM in an ecommerce environment using two split data sets one containing females and the other males. Structural equation modelling and t tests were performed to test the hypotheses. The results show that gender is an important moderating variable in online commerce. Understanding the differences between males and females provides practitioners with better understanding of the behaviour of consumers on the …


Supplier Selection Problem: Methodology Literature Review, M. Khurrum S. Bhutta Jan 2003

Supplier Selection Problem: Methodology Literature Review, M. Khurrum S. Bhutta

Journal of International Information Management

Supplier selection and evaluation has attracted serious research attention at both the academic and the practitioner levels. In this paper, an attempt is made to review the status of methodology literature in supplier selection. A total of 154 papers from 68 refereed journals were selected and reviewed. This paper provides insights to the literature by considering the breakdown of journals that have published research in this area, by classifying the literature into various categories and considering the various methods/techniques suggested in the literature. Eased on the review, avenues for further research are also discussed.


An Artificial Neural Network Approach To Learning From Factory Performance In A Kanban-Based System, Barry A. Wray, Ina S. Markham, Richard G. Mathieu Jan 2003

An Artificial Neural Network Approach To Learning From Factory Performance In A Kanban-Based System, Barry A. Wray, Ina S. Markham, Richard G. Mathieu

Journal of International Information Management

Many Just-In-Time (JIT) manufacturing environments generate operational data reflecting both efficient and inefficient factory performance. Frequently data for inefficient performance is lost or discarded for fear of replicating poor performance. The purpose of this paper is two fold. First, historical JIT shop data is analyzed using a genetic algorithm (GA) to determine which shop factors are important determinants offactory performance. Second, subsequent to these important factors being identified by a GA, an artificial neural network (ANN) is used to learn the relationships between these factors and factory performance. The ANN can then be used to predict factory performance for future …


All Integrated Model For Improving Security Management In The E-Commerce Environment, Hossein Bidgoli Jan 2003

All Integrated Model For Improving Security Management In The E-Commerce Environment, Hossein Bidgoli

Journal of International Information Management

Security issues and threats in the e-commerce environment are varied and can be caused intentionally and unintentionally by insiders and outsiders. Many experts believe that insiders create the majority of the security threats and issues. Security issues and threats related to ecommerce environment can be categorized as controllable, partially controllable and uncontrollable. This article presents an integrated model that identifies various security issues and threats in the e-commerce environment and then offers a comprehensive e-commerce security plan. The integrated model includes six steps: identification of basic e-commerce security safeguards, identification of e-commerce general security threats, identification of intentional e-commerce threats, …


Evaluating The Use Of The Web By Print Firms, Greg Parry Jan 2003

Evaluating The Use Of The Web By Print Firms, Greg Parry

Research outputs pre 2011

The disruptive impact of electronic commerce on the print industry has the potential to radically transform its value proposition. The challenge for the industry is to utilise the disruptive aspects of emerging technology to offer customers greater variety in the delivery of information and communication, and take advantage of potential cost innovations to improve declining rates of return. This paper reviews these developments and reports on an exploratory study of the Australian print industry that suggests that the extent of transformation has, to date, been limited.