Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Management Information Systems

Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter Dec 2015

Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter

Shahriar Akter

No abstract provided.


Trustworthiness In Mhealth Information Services: An Assessment Of A Hierarchical Model With Mediating And Moderating Effects Using Partial Least Squares (Pls), Shahriar Akter Dec 2015

Trustworthiness In Mhealth Information Services: An Assessment Of A Hierarchical Model With Mediating And Moderating Effects Using Partial Least Squares (Pls), Shahriar Akter

Shahriar Akter

The aim of this research is to advance both the theoretical conceptualization and the empirical validation of trustworthiness in mHealth (mobile health) information services research. Conceptually, it extends this line of research by reframing trustworthiness as a hierarchical, reflective construct, incorporating ability, benevolence, integrity, and predictability. Empirically, it confirms that partial least squares path modeling can be used to estimate the parameters of a hierarchical, reflective model with moderating and mediating effects in a nomological network. The model shows that trustworthiness is a second-order, reflective construct that has a significant direct and indirect impact on continuance intentions in the context …


Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter Dec 2015

Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter

Shahriar Akter

No abstract provided.


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Status Von Hybrid Mail, Jacob Johnsen Nov 2011

Status Von Hybrid Mail, Jacob Johnsen

Jacob Johnsen, MSc

Einführung im Hybrid Mail status und wie Hybrid Mail ist die logische Antwort auf viele der Herausforderungen denen sich Unternehmen stellen müssen.


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Environmental Impact Of Hybrid Mail, Jacob Johnsen Sep 2011

Environmental Impact Of Hybrid Mail, Jacob Johnsen

Jacob Johnsen, MSc

A review of hybrid mail with emphasis on the environmental aspects


Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan Sep 2011

Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan

Gary PAN

This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …


Playing Leapfrog, Jacob Johnsen May 2011

Playing Leapfrog, Jacob Johnsen

Jacob Johnsen, MSc

Several developing countries have used the introduction of hybrid mail to leapfrog evolution and are using the service to improve speed, quality, security and postal offering. Jacob Johnsen looks at this extraordinary phenomenon.


A Method For Monetizing Technology Innovations, Arcot Desai Narasimhalu Jan 2011

A Method For Monetizing Technology Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Technology innovations from most universities and research institutes are generally created with no clear path to commercialization in mind. This is largely due to the culture in academic institutions and research institutes whose mission it is to explore the creation of innovations that promise long term benefits. This culture of academic freedom leads to a stockpile of technology innovations at their technology transfer offices (TTOs). These offices are often in a dilemma on how best to monetize the technology innovations that are in their custody. While there have been many social science research methodology based studies on this subject under …


Achieving Supply Chain Integration Using Rfid Technology: The Case Of Emerging Intelligent B-To-B E-Commerce Processes In A Living Laboratory, S. Fosso Wamba Dec 2010

Achieving Supply Chain Integration Using Rfid Technology: The Case Of Emerging Intelligent B-To-B E-Commerce Processes In A Living Laboratory, S. Fosso Wamba

Dr Samuel Fosso Wamba

Purpose: Despite the high operational and strategic potentials of RFID technology, very little studies have been conducted about its role as enabler of supply chain integration to achieve high-level operational efficiency. Therefore, this study is an initial effort towards bridging the existing knowledge gap in the literature. Design/methodology: This exploratory research was conducted in one retail supply chain. A multi-method approach combining a longitudinal real-life case study and a methodology integrating several steps, including a “Living Laboratory” strategy was used and involved all members of a product line to analyze in terms of their contributing activities and their interface with …


Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson Dec 2010

Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson

Associate Professor Linda Dawson

This paper presents a background in cognitive processes such as problem solving and analogical reasoning for considering modeling from an object-oriented perspective within the domain of requirements engineering. The paper then describes a research project and the findings from a set of four cases which examine professional practice from perspective of cognitive modeling for object-oriented requirements engineering. In these studies, it was found that the analysts routinely built models in their minds and refined them before committing them to paper or communicating these models to others. The studies also showed that objectoriented analysts depend on analogical reasoning where they use …