Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 76

Full-Text Articles in Management Information Systems

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston Aug 2019

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston

Peter Ralston

Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.

Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.

Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that …


Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik Jul 2018

Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik

Eric A. Kowalik

Learning management systems (LMS) are widely used in education. They offer the potential for assessing student learning, but the reality of using them for this is problematic. This case study chronicles efforts by librarians at Marquette University to use LMS data to assess students’ information literacy knowledge in Marquette’s first-year English program.


2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy Jan 2018

2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy

Karthikeyan Umapathy

The Florida Data Science for Social Good (FL-DSSG) Program is a summer internship program that matches data science expertise with real-world problems. The FL-DSSG program works with community organizations who are trying to affect change in their communities and who have data management, analysis, and data visualization projects that have the potential to shift understanding around a community issue, influence planning, revise practices, or see efforts in supporting community initiatives more focused or renewed. The mission of the FL-DSSG is to promote data-informed approaches and partners and the partners who use these approaches solve wicked social problems while creating educational …


Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh Dec 2016

Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh

Madison Ngafeeson

No abstract provided.


Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy Oct 2016

Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy

Leila A. Halawi

We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy Oct 2016

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Leila A. Halawi

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra Dec 2015

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra

Shahriar Akter

Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …


Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson Sep 2015

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson

Madison Ngafeeson

No abstract provided.


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2014

Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier Jun 2013

Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier

Craig Napier

The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …


Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter Feb 2013

Twitter Adoption And Use By Smes: An Empirical Study, S. F. Wamba, Lemuria D. Carter

Dr Samuel Fosso Wamba

Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States, the United Kingdom, Australia and India. The results of logistic hierarchical regression indicate that firm innovativeness, age and geographic location have a significant impact on Twitter adoption by SMEs. Implications for research and practice are discussed.


Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Dec 2012

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Dr Akemi Chatfield

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


External Knowledge, Territorial Inertia And Local Development: An Exploratory Case Study, Francesca Cabiddu, Daniela Pettinao Sep 2012

External Knowledge, Territorial Inertia And Local Development: An Exploratory Case Study, Francesca Cabiddu, Daniela Pettinao

Francesca Cabiddu

This study examines the relationship between an entrepreneur’s absorptive capacity, the spiral of knowledge and local development. Although a great number of theoretical and empirical studies have pointed out the importance of local networking and informal contacts when spreading knowledge locally, very few of them provide robust evidence on the role of the entrepreneur’s absorptive capacity and external knowledge in local development. This paper tries to explain the reasons why this problem can no longer be ignored and provides a preliminary examination, through an exploratory case study, of the role that the entrepreneur’s absorptive capacity and external knowledge play in …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko Jul 2012

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko

Humayun Zafar

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John Gaetano D'Ambra May 2012

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John Gaetano D'Ambra

Shahriar Akter

Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …


Back-Loading: A Potential Side Effect Of Employing Digital Design Tools In New Product Development, Sebastian K. Fixson, Tucker J. Marion Apr 2012

Back-Loading: A Potential Side Effect Of Employing Digital Design Tools In New Product Development, Sebastian K. Fixson, Tucker J. Marion

Tucker Marion

Over the past twenty years, the use of digital design tools such as Computer-Aided-Design (CAD) has increased dramatically. Today, almost no product development project is conducted without the use of CAD models. Major advantages typically ascribed to using CAD include better solutions through broader exploration of the solution space as well as faster and less expensive projects through faster and earlier iterations. This latter effect, the shifting of simulation and testing traditionally accomplished with help of physical prototypes late in the process–a slow and expensive activity–to doing similar activities with virtual prototypes faster and earlier in the process, has been …


Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West Apr 2012

Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West

C. Jason Woodard

Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …