Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Information

California State University, San Bernardino

2010

Articles 1 - 7 of 7

Full-Text Articles in Business

Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao Jan 2010

Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao

Journal of International Technology and Information Management

No abstract provided.


It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry Jan 2010

It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry

Journal of International Technology and Information Management

In an increasingly fast-paced business context, agility is crucial to firm performance. Competitive agility, the ability of a firm to rapidly sense and respond to changes in its environment, is especially important during industry turbulence. This research examines whether investment in Information Technology (IT) enhances firms’ competitive agility using analysis of firm performance during industry growth and contraction. The research approach addresses the causality question faced by previous IT productivity studies by focusing on ex-ante IT investment and subsequent firm performance during periods of unanticipated industry shocks. Findings indicate that IT investment enhances competitive agility but only in industries with …


Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young Jan 2010

Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young

Journal of International Technology and Information Management

Organizations integrate information security measures through information security planning and policy development. This study aims to examine how the extent of collaborative exchange within the organization and extent of formalization of the information security function impact the effective utilization of well-established information security objectives. The security objectives of interest, described in general deterrence theory, are deterrence, detection and recovery. This study finds that organizations that exhibit higher levels of collaborative exchange and develop and implement more information security policies are more effectively utilizing the information security strategies of detection, deterrence and recovery. This study highlights the importance of the complementary …


A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka Jan 2010

A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Managing the costs, complexity, and risks of IT projects continues to be a challenge for many organizations. Project risk management is becoming an important sub-discipline of software engineering, and focuses on identifying, analyzing, and developing strategies for responding to project risk efficiently and effectively. This paper presents an IT project risk identification framework to facilitate identifying and understanding various project risks as part of an overall project risk management process. The proposed framework should be of interest to IT practitioners during the creation of the project plan and over the course of a project so that appropriate and corrective actions …


Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon Jan 2010

Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon

Journal of International Technology and Information Management

Ad-hoc extraction of information from documents can ensure the transparency of decisions made by an organization. Different Information Extraction methods have been applied to extract information from various domains. Most widely known methods use manually annotated training documents that require high development time. The automated training methods are not scalable to large application domains. We have developed a semi-automated knowledge-engineering method for building the knowledge-base with minimal efforts. Because our method reduces manual processing of the training data, the development process is very fast. We have developed a prototype application to extract information from the project-reports of the American Recovery …


Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu Jan 2010

Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu

Journal of International Technology and Information Management

The notion of sharing information has become a critical element in competitive advantage for mobile phone companies. The purpose of this particular research is to collate, compare and prioritize gender differences in the determinants of sharing information via mobile phones. The content analysis and the analytic hierarchy process methods were made use of to collect and examine relevant data. According to the findings of this research, the determinants of information sharing via mobile phones may be arranged into four fundamental categories. The categories, in order of significant, are: situational factors (including time pressures, convenience, and price discounts), the unique characteristics …


Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston Jan 2010

Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston

Journal of International Technology and Information Management

This article looks at the value of certification from the employer's perspective. It is perhaps the first study in this area that gathers data directly from employers. A survey of directors of university information technology departments is analyzed, and the results indicate limited support for certifications being valued assets of their employees. While not sufficiently strong enough to warrant generalization of the results to business in general, with this information, students and professionals should be able to better prepare themselves for finding employment and academic programs can better evaluate the appropriateness of the inclusion of certification training in their curricula.