Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Technology and Innovation

Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 107

Full-Text Articles in Management Information Systems

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston Aug 2019

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston

Peter Ralston

Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.

Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.

Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that …


Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik Jul 2018

Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik

Eric A. Kowalik

Learning management systems (LMS) are widely used in education. They offer the potential for assessing student learning, but the reality of using them for this is problematic. This case study chronicles efforts by librarians at Marquette University to use LMS data to assess students’ information literacy knowledge in Marquette’s first-year English program.


2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy Jan 2018

2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy

Karthikeyan Umapathy

The Florida Data Science for Social Good (FL-DSSG) Program is a summer internship program that matches data science expertise with real-world problems. The FL-DSSG program works with community organizations who are trying to affect change in their communities and who have data management, analysis, and data visualization projects that have the potential to shift understanding around a community issue, influence planning, revise practices, or see efforts in supporting community initiatives more focused or renewed. The mission of the FL-DSSG is to promote data-informed approaches and partners and the partners who use these approaches solve wicked social problems while creating educational …


Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh Dec 2016

Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh

Madison Ngafeeson

No abstract provided.


Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy Oct 2016

Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy

Leila A. Halawi

We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy Oct 2016

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Leila A. Halawi

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter Dec 2015

Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter

Shahriar Akter

No abstract provided.


Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz Dec 2015

Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz

Shahriar Akter

mHealth (healthcare using mobile wireless technologies) has the potential to improve healthcare and the quality of life for elderly and chronic patients. Many studies from all over the world have addressed this issue in view of the aging population in many countries. However, there has been a lack of any consolidated evidence-based study to classify mHealth from the dual perspectives of healthcare and technology. This paper reports the results of an evidence-based study of mHealth solutions for chronic care amongst the elderly population and proposes a taxonomy of a broad range of mHealth solutions from the perspective of technological complexity. …


Service Quality Of Mhealth: Development And Validation Of A Hierarchical Model Using Pls, Shahriar Akter, John D'Ambra, Pradeep Ray Dec 2015

Service Quality Of Mhealth: Development And Validation Of A Hierarchical Model Using Pls, Shahriar Akter, John D'Ambra, Pradeep Ray

Shahriar Akter

Advancing research on service quality requires clarifying the theoretical conceptualizations and validating an integrated service quality model. The purpose of this study is to facilitate and elucidate practical issues and decisions related to the development of a hierarchical service quality model in mobile health (mHealth) services research. Conceptually, it extends theory by reframing service quality as a reflective, hierarchical construct and modeling its impact on satisfaction, intention to continue using and quality of life. Empirically, it confirms that PLS path modeling can be used to estimate the parameters of a higher order construct and its association with subsequent consequential latent …


Trustworthiness In Mhealth Information Services: An Assessment Of A Hierarchical Model With Mediating And Moderating Effects Using Partial Least Squares (Pls), Shahriar Akter Dec 2015

Trustworthiness In Mhealth Information Services: An Assessment Of A Hierarchical Model With Mediating And Moderating Effects Using Partial Least Squares (Pls), Shahriar Akter

Shahriar Akter

The aim of this research is to advance both the theoretical conceptualization and the empirical validation of trustworthiness in mHealth (mobile health) information services research. Conceptually, it extends this line of research by reframing trustworthiness as a hierarchical, reflective construct, incorporating ability, benevolence, integrity, and predictability. Empirically, it confirms that partial least squares path modeling can be used to estimate the parameters of a hierarchical, reflective model with moderating and mediating effects in a nomological network. The model shows that trustworthiness is a second-order, reflective construct that has a significant direct and indirect impact on continuance intentions in the context …


Gradual Changes In Repeat Customers' Adoption Behavior Toward Responses To Mobile Direct Mail Coupon Promotions, Shahriar Akter Dec 2015

Gradual Changes In Repeat Customers' Adoption Behavior Toward Responses To Mobile Direct Mail Coupon Promotions, Shahriar Akter

Shahriar Akter

Service businesses record the number of visitors as a measure of the performance of their business. However, summarized observations such as the total number of visits per month provide little insight on individual-level visiting behavior. In addition, behavior may change over time, especially in a swiftly changing environment induced by mobile promotions. This paper presents an individual level model for shop visiting behavior based on data of a beauty salon. The model focuses on gradual changes toward responses to mobile direct mail (DM) coupons based on the shop visit interval (SVI) of the beauty salon. This means that as someone …


Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter Dec 2015

Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter

Shahriar Akter

No abstract provided.


Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter Dec 2015

Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter

Shahriar Akter

This chapter investigates the changes in customers’ responses to mobile direct mail (DM) coupons on the shop visit probability (SVP) of a beauty parlor. Two experiments were carried out to examine the promotional effects of mobile DM coupons. The first experiment, conducted in 2004, compared mobile DM coupons with postcard DM coupons. The mobile DM coupons were found to have no effect on SVP, although positive effects were observed for postcard DM coupons. The second experiment, conducted in 2005 with three types of mobile DM coupons, compared the responses of new customers with those of repeat customers. The results varied …


Exploring Loyalty In Mobile Information Services: The Role Of Sound Amusements, Shahriar Akter Dec 2015

Exploring Loyalty In Mobile Information Services: The Role Of Sound Amusements, Shahriar Akter

Shahriar Akter

The aim of this research is to explore consumer loyalty in mobile amusement information services, using a behaviors-atisfaction‐ loyalty framework. Among many different frameworks of satisfaction‐loyalty, we investigated the impact of ‘use behavior’ on ‘satisfaction’ and that of ‘satisfaction’ on ‘loyalty,’ which results in a strong support of the existing model. It confirms that, on both paths, there are significant associations between a latent variable and a measurement variable of stronger amusement element than that of weaker ones. The results show that amusement contains seven types of measurement variables (i.e., E‐mail, SMS, MMS, Music, Ringtones, Video Streaming, Games) which have …


Serving The Poor By Marketing Information, Developing A Sustainable Village Phone Model In Bangladesh, Shahriar Akter, Jay Rajasekera, Mahfuzur Rahman Dec 2015

Serving The Poor By Marketing Information, Developing A Sustainable Village Phone Model In Bangladesh, Shahriar Akter, Jay Rajasekera, Mahfuzur Rahman

Shahriar Akter

Wireless technologies have created an unprecedented opportunity for rural customers in the developing world to solve their communication and information problems in an instantaneous, interactive and customised way. The framework of the study focuses on existing mobile village phone model in Bangladesh and suggests ways to make it sustainable through mobile information services marketing. The study has treated ‘village phone’ as a cost effective and interactive channel through which various information services can be marketed to serve customers in the rural settings.


Mhealth- An Ultimate Platform To Serve The Unserved, Shahriar Akter Dec 2015

Mhealth- An Ultimate Platform To Serve The Unserved, Shahriar Akter

Shahriar Akter

Objectives: To summarize major current developments and research in the field of mobile health (mHealth) services. Methods: Reports on the unique characteristics of mHealth platform and its role in delivering health services to the resource poor settings. Also, it evaluates different mHealth applications and identifies key success factors and challenges. Results and Conclusion: mHealth, based on the most ubiquitous and widely accepted technology, offers an unprecedented opportunity to serve the unserved by right time medical information services. There is growing evidence that it has already transformed healthcare delivery in many resource poor settings through its low cost, high reach and …


Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra Dec 2015

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra

Shahriar Akter

Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …


Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson Sep 2015

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson

Madison Ngafeeson

No abstract provided.


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2014

Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …