Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 314

Full-Text Articles in Business

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson Jan 2015

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson

Communications of the IIMA

Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.


The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris Jan 2015

The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris

Communications of the IIMA

This manuscript examines the evolution of internet value systems in the motion control industry. We believe the primary reason behind the inconsistent performance of that industry's adoption of the internet in the supply channel was largely due to poor strategy. Using a the concepts of bias exchanges and game theory it is suggested that intemet strategies such as disintermediation and first-mover advantage were elusive because firms focused too much on technology and not enough on customer value. Lessons for managers and future decisions are offered.


The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen Jan 2015

The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen

Communications of the IIMA

A company named Syscom was recently acquired by another company, Matcom. Both companies were focused on software development in similar markets, however, the Management Information Systems (MIS) decisions made by each company have resulted in significant differences as to how employees go about the business of developing, selling and supporting software. This paper highlights how Information Systems (IS) decisions made at these two companies enabled different ways for people to work together along with affecting various aspects of business operations and team communications. In addition, this paper presents issues with the integration of Syscom with the Matcom IS structure as …


The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan Jan 2015

The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan

Communications of the IIMA

This pilot project was designed to evaluate study abroad participants' degree of homesickness and use of communication channels, specifically telephone and email. A questionnaire was developed to assess several dimensions involved with studying abroad, including degree of culture shock and homesickness, and frequency and methods of communicating home. Respondents were 14 study abroad participants from a medium-sized southern university, including 4 males and 10 females. Based on the findings of this study, homesickness and degree of culture shock were related as measured by the items of strain, helpless, missing, accepted, escape, and shock. As hypothesized, students who reported being homesick …


The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia Jan 2015

The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia

Communications of the IIMA

With the recent advances in telecommunications networking and teleconferencing software, small companies can become more cost competitive by outsourcing appropriate functions to lower wage countries. Ad-Station Systems is a startup media advertising company that provides a number of online and off-line advertising services. The online product offering requires support and programming. It was decided to evaluate whether these functions could be provided from a foreign location. An industrial dynamics model indicated that this is a viable option. The processes were designed and documented, and are described here.


A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke Jan 2015

A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke

Communications of the IIMA

There are a variety of models, methods and tools to help organizations manage defects found in the development of software. Defect tracking and processing must be integrated in the project life cycle and the testing process for software. This paper reviews a number of defect models and proposes the Full Life Cycle Defect Process model to manage defects that supports defect, project, and test processes. We describe the various states in our model and provide examples of various scenarios and paths through the model.


Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke Jan 2015

Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke

Communications of the IIMA

This paper attempts to take an objective look at offshore outsourcing within the information technology (IT) industry. Background material is provided to establish a clear definition and context for the discussion. Basic benefits, risks, and trends are identified and domestic market impacts are explored.


Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen Jan 2015

Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen

Communications of the IIMA

This study aims to finding the factors that affect the adoption of web services technology. The study proposes a web service technology adoption model in which three contexts from Tornatzky and Fleischer's (1990) framework, namely, external environmental context, technological context and organizational context, and two constructs from the TAM (Davis, 1989) model, perceived usefulness and perceived ease of use, are studied to determine their influence on web services adoption. Exploratory factor analysis is used to explore the factors affecting the adoption of web services technology. Structural Equation modeling is used to validate and analyze the research model.


Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb Jan 2015

Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb

Communications of the IIMA

The purpose of the study was to identify the policies and procedures required in U.S. hospitals to meet the requirements of the Health Information Portability and Accountability Act (HIPAA). A major aspect of the study focused on the degree of change required to meet the security standards and on the types of security devices used by the hospitals. Findings from a survey of 286 U.S. hospitals found the greatest amount of change needed to meet HIPAA security compliance were changes resulting in increased Information Systems (IS) budget requirements, changes to network monitoring, and additional hiring in the IS department.


An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones Jan 2015

An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones

Communications of the IIMA

Electronic Data Interchange (EDI) is widely regarded by organizations worldwide as the business standard for the timely and secure exchange of electronic business transactions in an expanding global marketplace. While numerous research efforts have explored how the adoption, implementation, and integration of this technology can impact an organization's technical, organizational, and competitive environment - few studies have documented the process used by organizations to implement EDI transaction sets with trading partners. This paper advances an innovative lifecycle used by a food manufacturing company to successfully design, implement, and test an EDI transaction set. This paper also describes how this transaction …


The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul Jan 2015

The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul

Communications of the IIMA

This paper investigates the interrelationship and effect of trust and culture on the level of goal setting within the context of information systems security. In doing so, it explores and discusses the concepts of trust and strong culture and seeks to demonstrate their importance in setting efficiently information systems security goals. The paper contributes to interpretive information systems research with the study of goal setting in a security management context and its grounding within an interpretive epistemology.


Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie Jan 2015

Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie

Communications of the IIMA

The number of severe computer security breaches in e-commerce applications has been on the increase over the last few years. This has become one of the biggest security problems in recent years. Although there are tools to build e-commerce application firewalls to alert and prevent intruder attacks, these tools are not trivial to install (they are not plug-and-play). Internet intruders can create havoc and produce catastrophe results by exploiting weaknesses in e- commerce applications. Therefore, developers of e-commerce web sites have to incorporate ways to systematically identify and eliminate vulnerabilities in the EC applications to enhance their security. This paper …


Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen Jan 2015

Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen

Communications of the IIMA

Facing the competitive pressure from new hospitals and new regulations from the Bureau of National Health Insurance, hospital managers in Taiwan are concentrating on reducing the hospital operation costs and improving the healthcare quality. Practitioners and academic researchers agree that reducing the pharmacy cost is one of the best solutions to sustain competitive advantage. As electronic commerce becomes popular in many industry sectors, e- procurement is growing rapidly in the healthcare industry. The purpose of this paper is to investigate the managers' perceptions of benefits of using electronic procurement system. After surveying 152 hospitals in Taiwan, we find that hospital …


Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka Jan 2015

Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka

Communications of the IIMA

This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm's president supported the project to the extent that it …


Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani Jan 2015

Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani

Communications of the IIMA

Several factors can influence a consumer's likelihood of purchasing on the Web including trust, ease-of-use, and price discounts. This study examines over a dozen different variables that affect the decision to conduct business online. A survey of experienced Web users validated that poor design, security, and reliability tend to decrease a person's willingness to purchase through the Web.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr. Dec 2014

Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr.

Communications of the IIMA

In an effort to understand content, its taxonomy and management, we define content management as the process of managing the creation, categorization, delivery and archiving of content in which workflow and business processes are maximized. Built upon what industry experts have to offer about enterprise content taxonomy, we have enacted a framework to better understand, create and manage enterprise taxonomies. This framework will be able to integrate rich content, modern computing technology, advanced analytics, automated worlflow, business requirements and human resources into a process where companies can easily manage their information for decision making and gaining competitive advantages.


An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot Dec 2014

An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot

Communications of the IIMA

Technology has improved to the point where web-sites for every course taught by an instructor are possible. This has produced many instructional benefits; however, it has also created a new set of problems. The problem addressed by this paper is the question of which web-site components to include in the class web-site. This is important because different web components support different student learning styles. Because it is not feasible to include all known webcomponents, the instructor must select those components that are most useful and support the broadest group of students. To address this question, a survey instrument was developed …


Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez Dec 2014

Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez

Communications of the IIMA

The explosion in information technology in the last 20 years, and in particular, data communications networks, has had a major impact on ethical thinking and ethical issues. This has been manifested in the recent accounting and business scandals, as it is becoming apparent that the ethical dimensions of information systems-related business decisions cannot be safely ignored. It is important for business educators to introduce students to relevant ethical situations that they may face in the business world. This paper discusses the Information Systems ethical environment and students performance on business ethics cases in a telecommunications course. The results of this …


Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno Dec 2014

Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno

Communications of the IIMA

On-line courses have become an important component of the delivery of courses in all areas of education. The validity of online delivery is challenged if Web students perform poorly in subsequent major courses. This paper investigates the effect of mode of delivery and other factors on the level of success, failure, potential, and limitations of web delivery in course sequences. This study was conducted on a two-course sequence in the Computer Information Systems Department at Metropolitan State College of Denver. The result of this research identifies important factors impacting student success in this two course sequence.


A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken Dec 2014

A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken

Communications of the IIMA

This paper reports on a longitudinal pedagogical study of performance and perceptions of 1021 students in 39 online and 25 face-to-face sections of seven different courses taught by six different professors. The differences between the students' perceptions of the quality of the instructors and student performance are statistically significant based on the mode of course delivery. Students rated the quality of instructors in the online courses higher for the duration of the study. Student grade averages are slightly lower in the online courses. For all of the other survey questions dealing with the evaluation of the courses and the instructors, …


The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl Dec 2014

The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl

Communications of the IIMA

One of the most pressing questions that governments and societies have to answer is how to develop the infrastructure of the expected information society. In this paper I will take a look at two archetypical positions: at a state-oriented and a market-oriented view. I will recount the arguments for both sides in order to then demonstrate that all of these arguments are in fact derivatives of the older discussion about state versus market that has been with us at least since Marx. I will then try to show that these arguments are based on metaphysical assumptions about the nature of …


An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery Dec 2014

An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery

Communications of the IIMA

This study is an exploratory investigation into whether different leaning styles predict performance in an online course. Students enrolled in several cohorts of an accredited MBA program were surveyed with regard to their learning styles and those styles were correlated with the grades earned in the course. The program is unique in that the entire program could be completed online.


Discussing Issues Of Information Technology In Country Development, Rami Al-Gharaibeh, William Acar, Andrew G. Kotulic, Thomas J. Froehlich Dec 2014

Discussing Issues Of Information Technology In Country Development, Rami Al-Gharaibeh, William Acar, Andrew G. Kotulic, Thomas J. Froehlich

Communications of the IIMA

The development of countries with laggard economies is becoming a global concern. The harmful complications of poverty and illiteracy are beginning to show up outside those countries in violent forms. The precautions against this migration of harm are splitting the world apart at the same time as technology may become able to bring it together. Over the last few years, information technology (IT) has grown very fast and is still spreading into all aspects of life in developed countries. The recent research in those countries is bringing more evidence that IT is a leveraging tool for business and not a …


A Tribute On The 25 Th Anniversary To The International Information Management Association (Iima) And Its Co-Founders: C. E. Tapie Rohm Jr., Patrick J. Mcinturff Jr. And Walter T. Stewart Jr., Warren Adis, Joseph O. Chan, Xin James He, Tanya Goette, Frank Lin, Emmanuel Uzoma Opara, Trevor Rohm, Gerhard Steinke, Jake Zhu Jan 2014

A Tribute On The 25 Th Anniversary To The International Information Management Association (Iima) And Its Co-Founders: C. E. Tapie Rohm Jr., Patrick J. Mcinturff Jr. And Walter T. Stewart Jr., Warren Adis, Joseph O. Chan, Xin James He, Tanya Goette, Frank Lin, Emmanuel Uzoma Opara, Trevor Rohm, Gerhard Steinke, Jake Zhu

Journal of International Technology and Information Management

IIMA is a special place for all of us. For twenty-five years, it has served as a forum for all of us to gather together to engage in intellectual conversations, to disseminate knowledge, and to renew our profession. Over the many years, IIMA has helped many us with our tenure and promotion, and has made our manuscripts available worldwide through our publication outlets, the three IIMA journals and the seasonal conference proceedings. Also for many of us, IIMA is not only a forum for academics, but also a place for friendship, family and fun. Many of us have become life-long …


Technology Adoption: Issues And Challenges In Information Technology Adoption In Emerging Economies, Samuel A. Ejiaku Jan 2014

Technology Adoption: Issues And Challenges In Information Technology Adoption In Emerging Economies, Samuel A. Ejiaku

Journal of International Technology and Information Management

Recognizing the need, effect and importance of Information Technology (IT) in any society, this study explored some of the challenges in the transfer and adoption of IT in developing countries. In Advanced countries, IT has generally revolutionized all facets of life, including technology, business, education and the global economy. Developing countries have not fully participated in this global revolution. This paper discusses some of the challenges that developing countries and donor countries encounter in the transfer and adoption of IT in developing countries. Some of these challenges include government policies, infrastructure, training, and culture of the recipient countries. The study …


The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon Jan 2014

The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon

Journal of International Technology and Information Management

Competitive priorities are the critical operational dimensions a process or supply chain must possess to satisfy its internal or external customers. The concept of competitive priorities is very important to organizations because it helps them set up achievable goals and it has long been known to be associated with organizational performance. This research introduces an alternative theory to explain the mechanism by which the buying firms and suppliers adopt different competitive priorities as they enter into buyer-supplier relationships and to explore further how technology choices influence the competitive priority adaptation. Using empirical data collected from the Society of Manufacturing Engineer’s …


Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long Jan 2014

Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long

Journal of International Technology and Information Management

Efficient information retrieval is essential to enrich user experience when searching for documents in dataspaces. With the continued growth in the volume and complexity of documents, the efficient information retrieval for searches has become increasingly challenging. To improve users’ search experience, faceted search combines direct keyword search methods with faceted browsing using a predefined set of categories (facets). This paper studies a faceted search approach that integrates dynamic facets generation with search. To further enhance the faceted search, alternative indexers based on pre-defined ontology for data repositories within dataspaces are evaluated in terms of execution time and data size. Experimental …


Seniors And Information Technology: A Mis-Fit?, Mark E. Mcmurtrey, James P. Downey, Steven M. Zeltmann, Ronald E. Mcgaughey Jan 2012

Seniors And Information Technology: A Mis-Fit?, Mark E. Mcmurtrey, James P. Downey, Steven M. Zeltmann, Ronald E. Mcgaughey

Journal of International Technology and Information Management

The “digital divide” between the haves and have-nots in society continues to draw attention in traditional media outlets as well as academic research. Those yearning to join the computer revolution comprise several groups defined by wealth, ethnicity, country (even regions of countries), and age. While there has been research into the digital divide in all of these areas, the focus of this paper is Information Technology (IT) use by the elderly, or our senior citizens. Our interest in this group stems from the dynamic interaction of two forces: 1) senior populations are growing in percentage and sheer number both in …