Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 977

Full-Text Articles in Management Information Systems

The Sustainability Imperative In Information Systems Research, Stefan Siedel, Pratyush Bharati Dec 2016

The Sustainability Imperative In Information Systems Research, Stefan Siedel, Pratyush Bharati

Pratyush Bharati

This paper reports on a panel discussion at the Pre-ICIS 2015 Workshop on Green Information Systems on the current state and future perspectives of SIGGreen—the special interest group of the Association of Information Systems on green information systems—as well as of green information systems (IS) research in general. Over the past years, IS scholars have made important contributions advancing our knowledge about how information systems can contribute to solving problems associated with the degradation of the natural environment. However, it would appear that green IS is viewed by many as just another research topic in IS field, and not a …


Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh Dec 2016

Healthcare It: Current Research And Future Trends, Vishal Midha, Madison N. Ngafeeson, Kaushik Ghosh

Madison Ngafeeson

No abstract provided.


Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott Nov 2016

Automated Feedback As A Convergence Tool, Tim Chenoweth, Karen Corral, Kit Scott

Christopher L. "Kit" Scott

This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used asynchronously. We conducted an experiment with 49 students from three classes of a web development class at an American university. Our results suggest that an asynchronous tutorial can achieve the same learning outcomes as a traditional lecture format by using automated feedback for convergence. Somewhat surprisingly, we found that performance did …


Information Technology Ethics: A Research Framework, Richard V. Mccarthy, Leila Halawi, Jay E. Aronson Oct 2016

Information Technology Ethics: A Research Framework, Richard V. Mccarthy, Leila Halawi, Jay E. Aronson

Leila A. Halawi

Information technology has become so pervasive that opportunities for abuses abound. IT Ethics has taken on increasing importance as the size and complexity of IT issues continues to grow. This paper outlines a research framework to analyze: Do significant ethical differences exist amongst undergraduate and graduate MIS students?


Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy Oct 2016

Resource-Based View Of Knowledge Management For Competitive Advantage, Leila A. Halawi, Jay E. Aronson, Richard V. Mccarthy

Leila A. Halawi

We are not only in a new millennium, but also in a new era: the knowledge era. Sustainable competitive advantage is dependent on building and exploiting core competencies. The resource-based view (RBV) of the firm defines a strategic asset as one that is rare, valuable, imperfectly imitiable and non-substitutable. Knowledge is seen as a strategic asset with the potential to be a source of competitive advantage for an organization. In this paper, we provide a model that examines how and why knowledge management (KM) can be sued to create competitive advantage from the RBV of the firm.


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy Oct 2016

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Leila A. Halawi

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian Oct 2016

Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian

Leila A. Halawi

This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios.


Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. Mccarthy Oct 2016

Evaluation Of Ethical Issues In The Knowledge Age: An Exploratory Study, Leila Halawi, Richard V. Mccarthy

Leila A. Halawi

Unethical information technology (IT) conduct is estimated to cost billions of dollars in deficits for enterprises. Included in this unethical behavior are issues associated with the knowledge age. Many IT ethics concerns do not have guidelines that are well recognized or broadly accepted. This study will explore the ethical perception of a diverse group of knowledge workers. It will also examine the effects of deterrents, individual factors and external variables to determine if there are noted differences in ethical perceptions that can be explained by these variables.


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Oct 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Leila A. Halawi

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs Sep 2016

Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs

Mark A. Jacobs

The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …


Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs Sep 2016

Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs

Mark A. Jacobs

Business leaders are concerned about the impacts of increasing levels of product portfolio complexity since many sense that complexity related costs such as order management, procurement, and inventory threaten to undermine operational efficiencies and consume profits. Even so, managers do not fully understand the extent and breadth of the impacts of product portfolio complexity. A more complete understanding of the operational effects of product portfolio complexity is lacking partially because researchers have not yet offered a robust theoretical perspective or studied it in a focused controlled way; until now. Herein, measures of product portfolio complexity are developed and related to …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Paul B. Sweeney

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman Aug 2016

Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman

Michael F. Gorman

We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function. Our results from test cases show with high confidence that current prices are not optimal, as indicated by a …


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman Aug 2016

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

Michael F. Gorman

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt Aug 2016

The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt

Donald Wynn

In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Donald Wynn

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Aug 2016

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

Donald Wynn

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Donald Wynn

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh Aug 2016

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

Harvey Enns

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Harvey Enns

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Harvey Enns

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

William D Salisbury PhD

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Thomas Ferratt

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Thomas Ferratt

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul May 2016

A Business Case For Tele-Intensive Care Units, Alberto Coustasse, Stacie Deslich, Deanna Bailey, Alesia Hairston, David Paul

Alberto Coustasse, DrPH, MD, MBA, MPH

Objectives: A tele-intensive care unit (tele-ICU) uses telemedicine in an intensive care unit (ICU) setting, applying technology to provide care to critically ill patients by off-site clinical resources. The purpose of this review was to examine the implementation, adoption, and utilization of tele-ICU systems by hospitals to determine their efficiency and efficacy as identified by cost savings and patient outcomes. Methods: This literature review examined a large number of studies of implementa­tion of tele-ICU systems in hospitals. Results: The evidence supporting cost savings was mixed. Implementation of a tele- ICU system was associated with cost savings, shorter lengths of stay, …


The Qualitative And Quantitative Effects Of Patient Centered Medical Home In The Veterans Health Administration, Samuel N. Lovejoy, Eric Stalnaker, William K. Willis, Alberto Coustasse May 2016

The Qualitative And Quantitative Effects Of Patient Centered Medical Home In The Veterans Health Administration, Samuel N. Lovejoy, Eric Stalnaker, William K. Willis, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Since the 1990’s, the Veteran’s Health Administration (VHA) has implemented a system of primary care that has been considered some of the best care that can be offered (Klein, 2011). The Patient Center Medical Home (PCMH) Model, also called “Patient Aligned Care Team” (PACT) in the VHA, has been coordinating and integrating services which ensure optimal health outcomes at an acceptable value (Bidassie, Davies, Stark, & Boushon, 2014).

PACT was created in 2010, building on 20 years of the VHA transforming from a loosely based system of inpatient services to a provider of outpatient primary care for veterans. From 2010 …


Digital Counterfeiting: States Regulation Of Federal, Foreign & Digital, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Dale C. Rosenblieb Jr. Apr 2016

Digital Counterfeiting: States Regulation Of Federal, Foreign & Digital, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Dale C. Rosenblieb Jr.

Ralph E. McKinney

The relatively recent appearance of Internet-based transactions necessitated the develop of digital forms of payment. These payments have evolved into various forms, including digital currency. This paper discusses the regulatory authority and/or lack of authority, of the sovereign States of the United States to regulate the counterfeiting of financial instruments used as currency, including digital currency. Federal and Foreign (non-U.S.) currencies are explicitly examined. Some digital currencies are not regulated or authorized specifically by a government. Can a currency without formal codification from a government be regulated by a State? As financial transactions have shifted historically from various governments' legal …


Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr. Apr 2016

Forensic Disciplines For Objective Global Strategic Analysis, Dale H. Shao, Lawrence P. Shao, Ralph E. Mckinney Jr.

Ralph E. McKinney

The global nature of investing requires a thorough analysis of the firm to determine the strategic viability of the firm for investment purposes. In addition, businesses are being held more accountable for the statements they make and the actions they take concerning their business. Several forensic disciplines have recently emerged that may supply subjective and objective data that can assist investors in making their final investment decisions and determining if ongoing businesses are truly doing what is in the best interest of their shareholders. Another factor influencing the increase forensic analyses of national and multinational corporations is the increase in …


The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr. Apr 2016

The Evolution Of Financial Instruments And The Legal Protection Against Counterfeiting: A Look At Coin, Paper, And Virtual Currencies, Ralph E. Mckinney, Lawrence P. Shao, Dale H. Shao, Duane C. Rosenblieb Jr.

Ralph E. McKinney

This essay discusses the requirements for the long-term acceptance of virtual currency as a financial medium of exchange by examination of fundamental criteria associated with the historical development of common tender and selected virtual currencies. The relatively recent appearance of Internet-based transactions have necessitated developing virtual forms of payment such as virtual currencies. According to the Financial Crimes Enforcement Network (“FinCEN”) of the United States Treasury,5 virtual currencies are subject to regulation if that virtual currency has a substitutive purpose for facilitating the exchange of goods and services. Although governments can place stipulations on currencies, users of common tender, including …