Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- RFID (9)
- E-business and e-government (7)
- Präsentation (7)
- Health Informatics (6)
- Open Source Software and Virtualization (6)
-
- Wissenschaftliche Zeitschriften (6)
- Local government (5)
- Articles (4)
- Computer science (4)
- Electronic health records (4)
- Health information technology (4)
- Information systems (4)
- Business process (3)
- ERP (3)
- Geschäftsmodell (3)
- Hybrid Mail (3)
- Hybrid post (3)
- Information Systems (3)
- Information Systems Development (3)
- Internet (3)
- Lab (3)
- Linux (3)
- Mobile devices (3)
- Municipal Councils (3)
- Open Source Software (3)
- Open source software (3)
- Postal (3)
- Project Management (3)
- Published Articles (3)
- Strategy (3)
- Publication Year
- Publication
-
- Hubert Oesterle (19)
- Associate Professor Linda Dawson (18)
- Shahriar Akter (12)
- Dr Samuel Fosso Wamba (8)
- Maurice Dawson (8)
-
- Madison Ngafeeson (7)
- Jacob Johnsen, MSc (4)
- C. Jason Woodard (3)
- Dr Deogratias Harorimana (3)
- Steven Alter (3)
- Dr Akemi Chatfield (2)
- Leila A. Halawi (2)
- Arcot Desai NARASIMHALU (1)
- Craig Napier (1)
- Dariusz Jemielniak (1)
- David A. Bray (1)
- Eric A. Kowalik (1)
- Francesca Cabiddu (1)
- Gary PAN (1)
- Humayun Zafar (1)
- Jared A. Harshbarger (1)
- Jeffrey Barker (1)
- Karthikeyan Umapathy (1)
- Peter Ralston (1)
- Professor Katina Michael (1)
- Robert L Nunez II (1)
- Sascha Vitzthum (1)
- Saurabh Gupta (1)
- Tucker Marion (1)
- Vlad Krotov (1)
- File Type
Articles 1 - 30 of 107
Full-Text Articles in Management Information Systems
Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston
Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston
Peter Ralston
Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.
Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.
Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that …
Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik
Problems And Promises Of Using Lms Learner Analytics For Assessment, Valerie Beech, Eric A. Kowalik
Eric A. Kowalik
2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy
2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy
Karthikeyan Umapathy
Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh
Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh
Madison Ngafeeson
No abstract provided.
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy
Leila A. Halawi
We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy
Leila A. Halawi
Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.
Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter
Perceived Service Quality Of Health Services Employing Virtual Channels, Shahriar Akter
Shahriar Akter
No abstract provided.
Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz
Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz
Shahriar Akter
mHealth (healthcare using mobile wireless technologies) has the potential to improve healthcare and the quality of life for elderly and chronic patients. Many studies from all over the world have addressed this issue in view of the aging population in many countries. However, there has been a lack of any consolidated evidence-based study to classify mHealth from the dual perspectives of healthcare and technology. This paper reports the results of an evidence-based study of mHealth solutions for chronic care amongst the elderly population and proposes a taxonomy of a broad range of mHealth solutions from the perspective of technological complexity. …
Service Quality Of Mhealth: Development And Validation Of A Hierarchical Model Using Pls, Shahriar Akter, John D'Ambra, Pradeep Ray
Service Quality Of Mhealth: Development And Validation Of A Hierarchical Model Using Pls, Shahriar Akter, John D'Ambra, Pradeep Ray
Shahriar Akter
Advancing research on service quality requires clarifying the theoretical conceptualizations and validating an integrated service quality model. The purpose of this study is to facilitate and elucidate practical issues and decisions related to the development of a hierarchical service quality model in mobile health (mHealth) services research. Conceptually, it extends theory by reframing service quality as a reflective, hierarchical construct and modeling its impact on satisfaction, intention to continue using and quality of life. Empirically, it confirms that PLS path modeling can be used to estimate the parameters of a higher order construct and its association with subsequent consequential latent …
Trustworthiness In Mhealth Information Services: An Assessment Of A Hierarchical Model With Mediating And Moderating Effects Using Partial Least Squares (Pls), Shahriar Akter
Shahriar Akter
The aim of this research is to advance both the theoretical conceptualization and the empirical validation of trustworthiness in mHealth (mobile health) information services research. Conceptually, it extends this line of research by reframing trustworthiness as a hierarchical, reflective construct, incorporating ability, benevolence, integrity, and predictability. Empirically, it confirms that partial least squares path modeling can be used to estimate the parameters of a hierarchical, reflective model with moderating and mediating effects in a nomological network. The model shows that trustworthiness is a second-order, reflective construct that has a significant direct and indirect impact on continuance intentions in the context …
Gradual Changes In Repeat Customers' Adoption Behavior Toward Responses To Mobile Direct Mail Coupon Promotions, Shahriar Akter
Gradual Changes In Repeat Customers' Adoption Behavior Toward Responses To Mobile Direct Mail Coupon Promotions, Shahriar Akter
Shahriar Akter
Service businesses record the number of visitors as a measure of the performance of their business. However, summarized observations such as the total number of visits per month provide little insight on individual-level visiting behavior. In addition, behavior may change over time, especially in a swiftly changing environment induced by mobile promotions. This paper presents an individual level model for shop visiting behavior based on data of a beauty salon. The model focuses on gradual changes toward responses to mobile direct mail (DM) coupons based on the shop visit interval (SVI) of the beauty salon. This means that as someone …
Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter
Quality Modeling In Healthcare: A Study Of Mhealth Service, Shahriar Akter
Shahriar Akter
No abstract provided.
Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter
Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter
Shahriar Akter
This chapter investigates the changes in customers’ responses to mobile direct mail (DM) coupons on the shop visit probability (SVP) of a beauty parlor. Two experiments were carried out to examine the promotional effects of mobile DM coupons. The first experiment, conducted in 2004, compared mobile DM coupons with postcard DM coupons. The mobile DM coupons were found to have no effect on SVP, although positive effects were observed for postcard DM coupons. The second experiment, conducted in 2005 with three types of mobile DM coupons, compared the responses of new customers with those of repeat customers. The results varied …
Exploring Loyalty In Mobile Information Services: The Role Of Sound Amusements, Shahriar Akter
Exploring Loyalty In Mobile Information Services: The Role Of Sound Amusements, Shahriar Akter
Shahriar Akter
The aim of this research is to explore consumer loyalty in mobile amusement information services, using a behaviors-atisfaction‐ loyalty framework. Among many different frameworks of satisfaction‐loyalty, we investigated the impact of ‘use behavior’ on ‘satisfaction’ and that of ‘satisfaction’ on ‘loyalty,’ which results in a strong support of the existing model. It confirms that, on both paths, there are significant associations between a latent variable and a measurement variable of stronger amusement element than that of weaker ones. The results show that amusement contains seven types of measurement variables (i.e., E‐mail, SMS, MMS, Music, Ringtones, Video Streaming, Games) which have …
Serving The Poor By Marketing Information, Developing A Sustainable Village Phone Model In Bangladesh, Shahriar Akter, Jay Rajasekera, Mahfuzur Rahman
Serving The Poor By Marketing Information, Developing A Sustainable Village Phone Model In Bangladesh, Shahriar Akter, Jay Rajasekera, Mahfuzur Rahman
Shahriar Akter
Wireless technologies have created an unprecedented opportunity for rural customers in the developing world to solve their communication and information problems in an instantaneous, interactive and customised way. The framework of the study focuses on existing mobile village phone model in Bangladesh and suggests ways to make it sustainable through mobile information services marketing. The study has treated ‘village phone’ as a cost effective and interactive channel through which various information services can be marketed to serve customers in the rural settings.
Mhealth- An Ultimate Platform To Serve The Unserved, Shahriar Akter
Mhealth- An Ultimate Platform To Serve The Unserved, Shahriar Akter
Shahriar Akter
Objectives: To summarize major current developments and research in the field of mobile health (mHealth) services. Methods: Reports on the unique characteristics of mHealth platform and its role in delivering health services to the resource poor settings. Also, it evaluates different mHealth applications and identifies key success factors and challenges. Results and Conclusion: mHealth, based on the most ubiquitous and widely accepted technology, offers an unprecedented opportunity to serve the unserved by right time medical information services. There is growing evidence that it has already transformed healthcare delivery in many resource poor settings through its low cost, high reach and …
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Shahriar Akter
Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …
Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson
Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson
Madison Ngafeeson
No abstract provided.
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall
Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall
Robert L Nunez II
After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.
Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson
Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson
Madison Ngafeeson
Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …
E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi
E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi
Madison Ngafeeson
The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …
Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson
Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson
Madison Ngafeeson
The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.
Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui
Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui
Madison Ngafeeson
The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …
An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha
An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha
Madison Ngafeeson
The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …