Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Management Information Systems

Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter Dec 2015

Mobile Dm Coupon Promotion In Japan: A Case Study On Response Behavior Changes In Services Consumption, Shahriar Akter

Shahriar Akter

This chapter investigates the changes in customers’ responses to mobile direct mail (DM) coupons on the shop visit probability (SVP) of a beauty parlor. Two experiments were carried out to examine the promotional effects of mobile DM coupons. The first experiment, conducted in 2004, compared mobile DM coupons with postcard DM coupons. The mobile DM coupons were found to have no effect on SVP, although positive effects were observed for postcard DM coupons. The second experiment, conducted in 2005 with three types of mobile DM coupons, compared the responses of new customers with those of repeat customers. The results varied …


Interactive Print - The Application Of Synergy To Restore And Enhance The Value Of Print, Amy Mcgiven, Jeanne Ngo Dec 2009

Interactive Print - The Application Of Synergy To Restore And Enhance The Value Of Print, Amy Mcgiven, Jeanne Ngo

Graphic Communication

With the emergence and increasing role of technology in today’s society, many questions are raised about what is the future of print. This study set out to research the term “interactive print,” which, for the purposes of this study, includes Personalized Uniform Resource Locator (PURL), GossRSVP, Radio Frequency Identification (RFID), and other sources of technology that refer an end consumer to online sources via print.

This report was written in order to research the current trends and knowledge in the industry as it relates to interactive print technologies, as well as to foresee the role of interactive print in the …


Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao Nov 2009

Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao

Faculty and Research Publications

Despite positive expectations, cyber-insurance products have failed to take center stage in the management of IT security risk. Market inexperience, leading to conservatism in pricing cyber-insurance instruments, is often cited as the primary reason for the limited growth of the cyber-insurance market. In contrast, here we provide a demand-side explanation for why cyber-insurance products have not lived up to their initial expectations. We highlight the presence of information asymmetry between customers and providers, showing how it leads to overpricing cyber-insurance contracts and helps explain why cyber insurance might have failed to deliver its promise as a cornerstone of IT security-management …


Stammdatenqualität: Erfolgsfaktor Für Unternehmen, Boris Otto, Hubert Oesterle Oct 2009

Stammdatenqualität: Erfolgsfaktor Für Unternehmen, Boris Otto, Hubert Oesterle

Hubert Oesterle

Man sollte meinen, die konsistente Pflege von Stammdaten wäre für moderne Unternehmen eine Selbstverständlichkeit. Ist sie aber nicht. Wirtschaftswissenschaftler der Universität St. Gallen erklären, wo das Problem liegt und wie man es löst.


Data Governance: Organisationskonzept Für Das Konzernweite Datenqualitätsmanagement, Kristin Weber, Boris Otto, Hubert Oesterle Aug 2009

Data Governance: Organisationskonzept Für Das Konzernweite Datenqualitätsmanagement, Kristin Weber, Boris Otto, Hubert Oesterle

Hubert Oesterle

Unternehmen die Datenqualität konzernweit organisieren wollen, stehen vor der Herausforderung, eine geeignete Form zu finden. Spezielle Anforderungen sind die Berücksichtigung unterschiedlicher Interessen und die Koordination aller Anspruchsgruppen. Bisher fehlen sowohl praktische Erfahrungen als auch wissenschaftliche Auseinandersetzungen, so dass Fragen nach der aufbauorganisatorischen Einordnung, der Abstimmung mit anderen Unternehmensbereichen und die Abhängigkeit vom Unternehmenskontext unbeantwortet bleiben. Der vorliegende Beitrag zeigt Möglichkeiten für die Organisation des Datenqualitätsmanagements auf und versucht Antworten auf die Fragen zu finden. Er schlägt die Einrichtung eines Shared Service Centers vor, stellt ein Data-Governance-Modell zur Definition konzernweiter Verantwortlichkeiten für Datenqualitätsmanagement vor und zeigt einen situativen Ansatz für die …


Cv July 2009, Byron W. Keating Jun 2009

Cv July 2009, Byron W. Keating

Dr Byron W. Keating

No abstract provided.


A Method For Consortial Research, Hubert Oesterle, Boris Otto Jun 2009

A Method For Consortial Research, Hubert Oesterle, Boris Otto

Hubert Oesterle

Design oriented research in information systems faces two major challenges: the effort to capture practitioners’ knowledge on one hand (relevance) and the evidence to fulfill scientific requirements (rigor). In practice, businesses employ at least a centuple of the resources which are available in research for the design and implementation of innovative solutions based on information technology. For the researcher, it is almost impossible just to oversee the state of practice, in addition to the scientific body of knowledge. Since based on a single case, the engagement of an individual company in a collaborative research environment, e.g. in action research, is …


An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael Apr 2009

An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael

Professor Katina Michael

RFID technology is defined as a wireless automatic identification and data capture (AIDC) technology and is considered as “the next big thing” in the management and “the next revolution in supply chain”. Recently, the topic has attracted the interest of the industrial community as well as the scientific community. Following this tendency, this paper applies an Information Systems Design Theory (ISDT) for an RFID-based University Laboratory. For practitioners, the paper provides some insights into the set-up and use of RFID laboratory in university settings, and at the same time, it offers a set of hypotheses that can be empirically tested.


Cv March 2009, Byron W. Keating Feb 2009

Cv March 2009, Byron W. Keating

Dr Byron W. Keating

No abstract provided.


Special Edition Of Journal Of Business Ethics, Marilynn P. Fleckenstein Ph.D., Patrick Flanagan, Victoria Shoaf Ph.D., Patricia Werhane Ph.D. Feb 2009

Special Edition Of Journal Of Business Ethics, Marilynn P. Fleckenstein Ph.D., Patrick Flanagan, Victoria Shoaf Ph.D., Patricia Werhane Ph.D.

Patrick Flanagan

DePaul University hosted the 14th Annual International Conference Promoting Business Ethics, at The Standard Club in Chicago, November 1–3, 2007. Academic and business leaders came together to explore the important ethical issues facing the business community in the twenty-first century. The articles in this special volume of The Journal of Business Ethics have been selected from the many presentations at this conference. Sponsored annually by the Vincentian Universities in the United States (DePaul University, in Chicago, Illinois; Niagara University in Niagara Falls, NY; and St. John’s University in Queens, NY) this conference promotes the mission of St. Vincent DePaul, the …


Erfolgreiche Telemedizinlösungen Und Kundenakzeptanz Zukünftiger Weiterentwicklungen: Das Geschäftsmodell Des Schweizer Zentrums Für Telemedizin Medgate, Philipp Osl, Ernst Sassen, Hubert Oesterle, Andy Fischer Feb 2009

Erfolgreiche Telemedizinlösungen Und Kundenakzeptanz Zukünftiger Weiterentwicklungen: Das Geschäftsmodell Des Schweizer Zentrums Für Telemedizin Medgate, Philipp Osl, Ernst Sassen, Hubert Oesterle, Andy Fischer

Hubert Oesterle

Die rechtlichen Rahmenbedingungen, insbesondere im Bereich der Telediagnostik, erlauben in der Schweiz umfassendere telemedizinische Angebote als in Deutschland und den meisten Ländern Europas. Der Beitrag präsentiert das Geschäftsmodell des Schweizer Zentrums für Telemedizin MEDGATE, eines europaweit führenden Telemedizin-Anbieters mit 2,6 Mio. Mitgliedern (Endkunden, denen die Leistungen von Medgate zur Verfügung stehen) und bis zu 1.600 Telekonsultationen täglich. Wichtiger Erfolgsfaktor des vorgestellten Geschäftsmodells ist die intensive Vernetzung mit anderen Unternehmen, insbesondere mit Versicherungen als Absatzmittler. Anhand eines Zukunftsszenarios untersucht der Beitrag weiterhin die Kundenakzeptanz möglicher Weiterentwicklungen der Telemedizin in den Bereichen Vitalwert- und Medikations-Überwachung sowie Videokonsultation. Während Senioren den Mehrwert für …


Special Edition Of Journal Of Business Ethics, Patrick Flanagan, Marilynn P. Fleckenstein Ph.D., Victoria Shoaf Ph.D., Patricia Werhane Ph.D. Jan 2009

Special Edition Of Journal Of Business Ethics, Patrick Flanagan, Marilynn P. Fleckenstein Ph.D., Victoria Shoaf Ph.D., Patricia Werhane Ph.D.

Patrick Flanagan

The articles in this special volume of Journal of Business Ethics have been selected from the many presentations at this conference and represent a cross section of the topics and issues covered at the Vincentian Business Ethics Conference at the Manhattan campus of St. John's University in the fall of 2009. Sponsored annually by the Vincentian universities in the United States (DePaul University, in Chicago, Illinois; Niagara University in Niagara Falls, NY; and St. John’s University in Queens, NY), this conference promotes the mission of St. Vincent DePaul, the seventeenth-century Roman Catholic saint who serves as the patron of these …


Ontoeng:A Design Method For Ontology Engineering In Information Systems, Mutaz M. Al-Debei, Guy Fitzgerald Jan 2009

Ontoeng:A Design Method For Ontology Engineering In Information Systems, Mutaz M. Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

This paper addresses the design problem relating to ontology engineering in the discipline of information systems. Ontology engineering is a realm that covers issues related to ontology development and use throughout its life span. Nowadays, ontology as a new innovation promises to improve the design, semantic integration, and utilization of information systems. Ontologies are the backbone of knowledge-based systems. In addition, they establish sharable and reusable common understanding of specific domains amongst people, information systems, and software agents. Notwithstanding, the ontology engineering literature does not provide adequate guidance on how to build, evaluate, and maintain ontologies. On the basis of …


One Size Does Not Fit All – A Contingency Approach To Data Governance, Kristin Weber, Boris Otto, Hubert Oesterle Jan 2009

One Size Does Not Fit All – A Contingency Approach To Data Governance, Kristin Weber, Boris Otto, Hubert Oesterle

Hubert Oesterle

Enterprizes need Data Quality Management (DQM) to respond to strategic and operational challenges demanding high-quality corporate data. Hitherto, companies have mostly assigned accountabilities for DQM to Information Technology (IT) departments. They have thereby neglected the organizational issues critical to successful DQM. With data governance, however, companies may implement corporate-wide accountabilities for DQM that encompass professionals from business and IT departments. This research aims at starting a scientific discussion on data governance by transferring concepts from IT governance and organizational theory to the previously largely ignored field of data governance. The article presents the first results of a community action research …


Time As Symbolic Currency In Knowledge Work, Dariusz Jemielniak Jan 2009

Time As Symbolic Currency In Knowledge Work, Dariusz Jemielniak

Dariusz Jemielniak

The paper discusses the issue of time slips in software development. Increasing time sacrifices toward work constitutes an important part of modern organizational environment. In fact, the reign over time is a crucial element in controlling the labor process. Yet a lack of cultural studies covering different approaches to this issue remains—particularly those focusing on high-skilled salaried workers. This article is a small attempt to fill this gap, based on an analysis of unstructured qualitative interviews with high-tech professionals from a B2B software company. It focuses on the issue of timing in IT projects, as perceived by software engineers. The …


Knowledge Management: Fad Or Enduring Organizational Concept?, Dariusz Jemielniak, Jerzy Kociatkiewicz Jan 2009

Knowledge Management: Fad Or Enduring Organizational Concept?, Dariusz Jemielniak, Jerzy Kociatkiewicz

Dariusz Jemielniak

Knowledge management and knowledge-intensive work are two of today’s hot buzzwords, though both already have a history of managerial usage. While some authors claim that knowledge is the most important organizational asset in contemporary society, others retort that much of knowledge management literature and practical solutions are just perfunctory and propagandist and many, if not most, managerial polices rely on manipulation of emotions and identity creation. This chapter aims to capitalize on this fascinating and timely research area. We want to present the current business fad of knowledge-management in terms of excess and forgetful repetition of ideas. We look at …


Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi Jan 2009

Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi

Journal of International Technology and Information Management

Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman Jan 2009

Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman

Journal of International Technology and Information Management

Usability on Web sites is critical because almost no training is provided for users on commercial sites. Instead, Web design relies on standards and consistency across sites. Traditional usability results indicated that computer forms should follow paper-based forms. Yet, Web paradigms have evolved that are quite different from paper-based forms. Specifically, this study reveals that users commit fewer errors and prefer simple forms limited to a single concept per screen. This conclusion significantly alters the recommendations for designing business forms.


Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom Jan 2009

Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom

Journal of International Technology and Information Management

Knowledge libraries hold the promise of widespread access to information available anywhere, anytime, freeing patrons from the geographical and temporal boundaries that currently exist. The classification of materials and subsequent searching of knowledge library content is an overall problem with many complex parts. Relevant classification is important for optimal information retrieval. This is especially important for the virtual communities that exist with extended organizations. Rooted in the virtual community and digital library literature, this paper develops a theory for improving the information classification and retrieval process of knowledge libraries that support virtual communities by applying social bookmarking techniques.


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih Jan 2009

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih

Journal of International Technology and Information Management

Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Principles Of On Demand Systems: Studies In Systems Oriented Architecture, Sascha Vitzthum Dec 2008

Principles Of On Demand Systems: Studies In Systems Oriented Architecture, Sascha Vitzthum

Sascha Vitzthum

No abstract provided.