Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Management Information Systems

The Impact Of Team Member Familiarity On Communication Media Use And Subsequent Project Performance, Priscilla Arling, Hongjiang Xu Jan 2016

The Impact Of Team Member Familiarity On Communication Media Use And Subsequent Project Performance, Priscilla Arling, Hongjiang Xu

Priscilla Arling

This study explores how team member familiarity is related to the communication media used in the completion of projects and how that use impacts project performance. We surveyed 148 university undergraduate students who were enrolled in information systems courses. The students worked on projects in teams of 3 to 4 students. The results suggest that prior collaboration with current te am members, as well as a stude nt’s class year, are related to what communication media are used. The influen ce of team member familiarity and class year varies by the type of media used. We also find that higher …


Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione Dec 2015

Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione

Scott T. Allison

In this chapter, we discuss the basic elements of heroic leadership, showing how heroism and exemplary leadership are deeply intertwined. We then describe six paradoxical truths about heroic leadership that are often unrecognized and unappreciated. We believe that ignorance of these counterintuitive truths and paradoxes about heroic leadership can lead to misunderstandings about leaders, leadership, and leadership development. Most of these paradoxes are a central part of the hero’s journey as described by comparative mythologist Joseph Campbell (1949). We will discuss the genesis of these paradoxical truths, and we will suggest ways that an awareness of these principles can engender …


A State-Sponsored Approach To Quality Improvement In Nursing Homes: Insights From Providers, Kathleen Abrahamson, Priscilla Arling, Greg Arling Jun 2015

A State-Sponsored Approach To Quality Improvement In Nursing Homes: Insights From Providers, Kathleen Abrahamson, Priscilla Arling, Greg Arling

Priscilla Arling

In 2006, the Minnesota Performance-based Incentive Payment Program (PIPP) was launched to fund provider-initiated quality improvement (QI) projects addressing a wide range of persistent quality issues in nursing homes (eg, falls, pain, mobility, psychotropic medication reduction, care transitions). In this article, the authors describe the perceptions of nursing home providers who participated in a PIPP-funded QI project and completed a survey addressing a variety of QI-related concerns. Respondents noted the importance of support from top leadership, reported being challenged by resource constraints, and generally thought that their project positively impacted quality within their facility. These findings highlight the importance of …


An Application Of The Socio-Technical Systems Approach To Implementation Of Electronic Evidence Into Practice: The Clinical Practice Model Framework, Kathleen Abrahamson, Priscilla Arling, Bonnie Wesorick, James Anderson Jun 2015

An Application Of The Socio-Technical Systems Approach To Implementation Of Electronic Evidence Into Practice: The Clinical Practice Model Framework, Kathleen Abrahamson, Priscilla Arling, Bonnie Wesorick, James Anderson

Priscilla Arling

Implementation of electronic evidence into the practice environments of clinical staff is an ongoing challenge in health care organizations. Despite localized efforts to integrate point-of-care technology with clinical practice, system-wide transformation across multiple clinical settings has not commonly occurred. This paper examines a framework designed to guide the implementation of evidence-based practice using technology in health care settings from the theoretical lens of the Socio-Technical Systems (STS) approach. The framework under study is called the CPM Framework™, developed by the Clinical Practice Model Resource Center (CPMRC). The CPMRC is a collaborative consortium of health care providers representing over 300 rural, …


Comparing Electronic And Face-To-Face Communication In The Success Of A Long-Term Care Quality Improvement Collaborative, Priscilla Arling, Edward Miech, Greg Arling Jun 2015

Comparing Electronic And Face-To-Face Communication In The Success Of A Long-Term Care Quality Improvement Collaborative, Priscilla Arling, Edward Miech, Greg Arling

Priscilla Arling

Researchers have long debated the effectiveness of electronic communication for getting work done in organizations, with many arguing that face-to-face interaction is key to high quality work and desired outcomes. Yet in healthcare quality improvement (QI) collaboratives, membership is frequently comprised of individuals from different, geographically dispersed organizations. This study examines the relationship between electronic and face-to-face interaction and the outcomes of a specific QI collaborative, the Empira Fall Prevention project in Minnesota. Outside of regularly scheduled meetings, the level of electronic communication reported by participants was associated with better outcomes in terms of reducing the percentage of new falls …


Communication And Effectiveness In A Us Nursing Home Quality-Improvement Collaborative, Priscilla Arling, Kathleen Abrahamson, Edward J. Miech, Thomas S. Inui, Greg Arling Jun 2015

Communication And Effectiveness In A Us Nursing Home Quality-Improvement Collaborative, Priscilla Arling, Kathleen Abrahamson, Edward J. Miech, Thomas S. Inui, Greg Arling

Priscilla Arling

In this study, we explored the relationship between changes in resident health outcomes, practitioner communication patterns, and practitioner perceptions of group effectiveness within a quality-improvement collaborative of nursing home clinicians. Survey and interview data were collected from nursing home clinicians participating in a quality-improvement collaborative. Quality-improvement outcomes were evaluated using US Federal and State minimum dataset measures. Models were specified evaluating the relationships between resident outcomes, staff perceptions of communication patterns, and staff perceptions of collaborative effectiveness. Interview data provided deeper understanding of the quantitative findings. Reductions in fall rates were highest in facilities where respondents experienced the highest levels …


Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling Jun 2015

Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling

Priscilla Arling

Knowledge sharing is a difficult task for most organizations, and there are many reasons for this. In this article, we propose that the nature of the knowledge shared and an individual's social network influence employees to find more value in person-to-person knowledge sharing, which could lead them to bypass the codified knowledge provided by a knowledge management system (KMS). We surveyed employees of a workman's compensation board in Canada and used social network analysis and hierarchical linear modeling to analyze the data. The results show that knowledge complexity and knowledge teachability increased the likelihood of finding value in person-to-person knowledge …


The Effect Of Employee Engagement On Continuance And Normative Commitment To The Organization, Wai Kwan (Elaine) Lau Jun 2014

The Effect Of Employee Engagement On Continuance And Normative Commitment To The Organization, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

A positive relationship between employee engagement and affective commitment is already documented in the literature. However, we do not adequately know how engagement is associated with continuance and normative commitment. Using survey methodology we find that while engagement has a non-significant positive association with continuance commitment, it has a positive association with normative commitment. No negative association was found between engagement and continuance commitment. This study’s results support recent critiques to Allen and Meyer’s three-dimensional model of organizational commitment.


The Roles Of Positive And Negative Exemplars In Information Security Strategy, Richard Taylor Dec 2013

The Roles Of Positive And Negative Exemplars In Information Security Strategy, Richard Taylor

Richard Taylor

The strategic approach used to manage organizational security is strongly influenced by
management’s perception of risk. These perceptions often lead executives to focus on the use of
technology based solutions. Such solutions, aimed primarily at keeping data safe from outsiders,
overlook the potential that more severe security breaches may be perpetrated by trusted insiders.
Behavioral concepts such as ethnocentrism, group membership and intergroup bias, form the
basis of an investigation that is aimed at developing our understanding of information security as
a social issue. This paper considers the influence of in-group trust and out-group distrust, and the
potential impact that …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim Sep 2012

The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim

Jennifer Y Mak

Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim Aug 2012

The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim

Chong W. Kim

Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko Jul 2012

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko

Humayun Zafar

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


The Role Of Organizational Reality In Implementing Technology, Sakthi Mahenthiran, M. D’Itri, R. Donn May 2010

The Role Of Organizational Reality In Implementing Technology, Sakthi Mahenthiran, M. D’Itri, R. Donn

Sakthi Mahenthiran

Reports on the structurational model of technology which shows how workers who had the power to make the implementation successful affected the data that was collected and the extent to which management was able to use the technology to influence their work. Systems for recording job-related data; Analyzing organizational processes; Application of the structurational theory.


Being There Versus Being Wired: The Effect Of Colocation On Social Capital In Distributed Teams, Priscilla Arling, Mani Subramani May 2010

Being There Versus Being Wired: The Effect Of Colocation On Social Capital In Distributed Teams, Priscilla Arling, Mani Subramani

Priscilla Arling

Advancement in communication technologies continues to fuel the growth of geographically distributed teams. Managers and team members have expressed concerns about negative impacts when individuals work at a distance from each other since such changes in work structure can affect social interactions among individuals in teams. The social relationships, shared experiences, and ongoing interpersonal interactions that often arise from colocation are recognized as contributing to the social capital of individuals. In this paper, we examine how working in a distributed team, a feature that influences the extent to which team members are colocated, affects the level of individual social capital. …


Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …