Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Series

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 48

Full-Text Articles in Management Information Systems

Designing Motorcycles Via The Web: Improved Aesthetics And Consumer Preference, Michael Gene Hilgers, Hong Sheng, Richard H. Hall Dec 2009

Designing Motorcycles Via The Web: Improved Aesthetics And Consumer Preference, Michael Gene Hilgers, Hong Sheng, Richard H. Hall

Business and Information Technology Faculty Research & Creative Works

The Purpose of This Research Was to Examine How Manipulation of the Aesthetic Appeal of a Motorcycle's Image on a Web Page Might Elucidate Trends in Consumer Preference. to This End, Website Visitors Were Encouraged to Reconfigure a Blueprint of Motorcycle to Make It More Appealing. These Alterations to its Confirmation Were Analyzed to Identify Patterns of Preference that Were Then Compared to the Marketplace in General. It Was Observed that Aesthetic Preferences Recognized by the Design Method Were Similar to Trends within the Motorcycle Building/buying Public.


Developing An Assessment Model For Evaluating Software Tools In Education, Vedant Jain, Hong Sheng, Richard H. Hall, Mike (Michael) Gene Hilgers Dec 2009

Developing An Assessment Model For Evaluating Software Tools In Education, Vedant Jain, Hong Sheng, Richard H. Hall, Mike (Michael) Gene Hilgers

Business and Information Technology Faculty Research & Creative Works

This Paper Presents a Research Model to Evaluate the Usability of Computer-Mediated Learning Technology, User Acceptance of the Technology, and the Effect of the Technology on Learning Outcomes. We Also Introduce the Use of Innovative Research Techniques for the Evaluation, Including Eye Tracking and Think-Aloud Protocol. Think-Aloud Protocol Allows Us to Understand a User's State of Mind While He/she is Interacting with the System. Eye Tracking Also Provides Additional Insights into a User's Cognitive State While using the System. Both Qualitative and Quantitative Data Can Be Collected Following the Research Model, Thus Providing More In-Depth Understanding on the Effect of …


The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim Dec 2009

The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim

CMP Research

Research in Critical Success Factors (CSFs) of Enterprise Systems (ES) projects has identified numerous practitioner governance mechanisms for ensuring project success. However, such research has not developed a theory of why certain critical success factors encourage project success. Our research develops such theory on a case study where even though the levels of several critical success factors were weak, the project nevertheless succeeded. Specifically, the logistics ES project succeeded even though there was (1) only marginal top management support, (2) low key user commitment, and (3) change management, training and other critical aspects of user management and communication were not …


Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau Nov 2009

Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau

Management Faculty Research

The present research investigates the effects of personality traits, self-efficacy and locus of control, on job satisfaction. It also examines the mediating impact of goal commitment on relationships between personality and job satisfaction. The results indicate that self-efficacy and locus of control are positively related to goal commitment. Goal commitment is positively associated with job satisfaction. In addition, locus of control is fund positively related to job satisfaction while self-efficacy does not have such relationship with job satisfaction.


Hospitality Marketing Mix And Service Marketing Principles, David Bojanic Nov 2009

Hospitality Marketing Mix And Service Marketing Principles, David Bojanic

Business and Information Technology Faculty Research & Creative Works

The Concept of Marketing is based on the Premise that Firms Should Determine Consumer Wants and Needs Before Designing Products and Services. This Consumer-Orientation Results in Greater Demand for a Firm's Products and Services and Higher Levels of Customer Satisfaction after the Purchase. Marriott International Followed This Approach in Developing their Courtyard and Residence Inns Hotels. for Example, the Courtyard Concept is Supposed to Attract Business Travelers and Transient Customers Who Do Not Really Like Staying at Hotels (Wind Et Al, 1992; Hart, 1986). the Researchers Recruited Individuals for Focus Groups Representing These Two Market Segments to Determine the Hotel …


An Empirical Study On The Benefit Of Split Loads With The Pickup And Delivery Problem, Maciek Nowak, Chelsea C. White, Ozlem Ergun Nov 2009

An Empirical Study On The Benefit Of Split Loads With The Pickup And Delivery Problem, Maciek Nowak, Chelsea C. White, Ozlem Ergun

Information Systems and Operations Management: Faculty Publications & Other Works

Splitting loads such that the delivery of certain loads is completed in multiple trips rather than one trip has show to have benefit for both the classic Vehicle Routing Problem and the Pickup and Delivery Problem. However, the magnitude of the benefit may be affected by various problem characteristics. In this paper, we characterize those real world environments in which split loads are most likely to be beneficial. Based on practitioner interest, we determine how the benefit is affected by the mean load size and variance, number of origins relative to the number of destinations, the percentage of origin-destination pairs …


Optimal Reserve Prices In Name-Your-Own-Price Auctions With Bidding And Channel Options, Gangshu (George) Cai, Xiuli Chao, Jianbin Li Nov 2009

Optimal Reserve Prices In Name-Your-Own-Price Auctions With Bidding And Channel Options, Gangshu (George) Cai, Xiuli Chao, Jianbin Li

Information Systems and Analytics

Few papers have explored the optimal reserve prices in the name-your-own-price (NYOP) channel with bidding options in a multiple channel environment. In this paper, we investigate a double-bid business model in which the consumers can bid twice in the NYOP channel, and compare it with the single-bid case. We also study the impact of adding a retailer-own list-price channel on the optimal reserve prices. This paper focuses on achieving some basic understanding on the potential gain of adding a second bid option to a single-bid system and on the potential benefits of adding a list-price channel by the NYOP retailer. …


Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao Nov 2009

Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao

Faculty and Research Publications

Despite positive expectations, cyber-insurance products have failed to take center stage in the management of IT security risk. Market inexperience, leading to conservatism in pricing cyber-insurance instruments, is often cited as the primary reason for the limited growth of the cyber-insurance market. In contrast, here we provide a demand-side explanation for why cyber-insurance products have not lived up to their initial expectations. We highlight the presence of information asymmetry between customers and providers, showing how it leads to overpricing cyber-insurance contracts and helps explain why cyber insurance might have failed to deliver its promise as a cornerstone of IT security-management …


Using Decision Analysis To Value R&D Projects, Bert De Reyck Oct 2009

Using Decision Analysis To Value R&D Projects, Bert De Reyck

Research Collection Lee Kong Chian School Of Business

Project portfolio management, the equivalent of financial portfolio management but focused on R&D projects rather than financial assets, often relies on decision analysis methods to value projects rather than traditional financial valuation methods such as net present value (NPV). In finance, the idea of managing portfolios of assets goes back a long time, with the first formal methods being developed in the 1950s. Simply put, assembling a portfolio of stocks, bonds, and other financial instruments balances the risk a manager is taking with any one of the investments. Over time, this same idea has also taken hold for managing a …


Implementing An Enterprise Information System To Reengineer And Streamline Administrative Processes In A Distance Learning Unit, M'Hammed Abdous, Wu He Aug 2009

Implementing An Enterprise Information System To Reengineer And Streamline Administrative Processes In A Distance Learning Unit, M'Hammed Abdous, Wu He

Distance Learning Faculty & Staff Publications

During the past three years, we have developed and implemented an enterprise information system (EIS) to reengineer and facilitate the administrative process for preparing and teaching distance learning courses in a midsized-to-large university (with 23,000 students). The outcome of the implementation has been a streamlined and efficient process which has delivered higher faculty satisfaction at a substantial cost reduction. In this paper, we propose a new conceptual and operational framework for process reengineering (PR) in higher education institutions. We also share our practical experience gained while designing, developing, and integrating three subsystems into an EIS. We hope that our experience, …


Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma Aug 2009

Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma

Research Collection School Of Computing and Information Systems

Most container terminals in the world today are operating up to their capacities. In this paper, we have developed a decision support system to optimise yard operations by considering all container flows (import, export and transshipment) through the yard with the view to improving the terminal performance and efficiency. In another paper, we proposed an optimisation model that determines optimal container locations and straddle carrier (SC) movements with the objective of minimising the overall storage and handling cost of containers. In this paper, a discrete event simulation tool for container terminal operations has been developed with three objectives: (i) to …


Workplace Management And Employee Misuse: Does Punishment Matter? Journal Of Computer Information Systems, Qinyu Liao, Xin Luo, Anil Gurung, Long Li Jul 2009

Workplace Management And Employee Misuse: Does Punishment Matter? Journal Of Computer Information Systems, Qinyu Liao, Xin Luo, Anil Gurung, Long Li

Management Information Systems Faculty Research

With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern for organizations. Research has demonstrated employee reactions to monitoring systems and how they are implemented. However, little is known about the impact of punishment-related policies on employee intention to misuse Internet. To extend this line of research beyond prior studies, this paper proposes an integrated research model applying Theory of Planned Behavior, Deterrence Theory, and Theory of Ethics to examine the impact of punishment-related policy on employees’ Internet misuse intentions. The results indicate that perceived importance, perceived behavioral control and subjective norms have significant influence on employee …


Mis 799 Capstone: 2009 Summer Cohort List, Raj Soin College Of Business, Wright State University Jul 2009

Mis 799 Capstone: 2009 Summer Cohort List, Raj Soin College Of Business, Wright State University

Master of Information Systems Capstone Executive Summary

Available for download is a list of the 2009 Summer Cohorts, complete with student names, project titles, and faculty advisor names.


Ktr: An Efficient Key Management Scheme For Secure Data Access Control In Wireless Broadcast Services Recovery, Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu Jul 2009

Ktr: An Efficient Key Management Scheme For Secure Data Access Control In Wireless Broadcast Services Recovery, Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Wireless broadcast is an effective approach for disseminating data to a number of users. To provide secure access to data in wireless broadcast services, symmetric-key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. With regard to various subscriptions, an efficient key management for distributing and changing keys is in great demand for access control in broadcast services. In this paper, we propose an efficient key management scheme, namely, key tree reuse (KTR), to handle key distribution with regard to complex subscription options and user activities. KTR has the following advantages. First, …


A Case Of Voip Implementation Using Open Source, Russell J. Roysden Jun 2009

A Case Of Voip Implementation Using Open Source, Russell J. Roysden

ISSCM Faculty Publications

Voice over Internet Protocol (VoIP) has progressed from a limited, untested technology to a feature-rich service that continues to find a place in all types of businesses. Companies such as Vonage and Skype have built successful business models based on VoIP services, and major telecommunications companies such as AT&T and Time Warner have followed suit with bundled offerings of phone, cable, and Internet services. Research has suggested that the Small-to-Medium Business (SMB) marketplace is quickly moving towards VoIP for productivity and efficiency benefits, convenience, and cost savings (Frost & Sullivan Company, 2006).


The Data-Information-Knowledge-Wisdom Hierarchy And Its Antithesis, Jay H. Bernstein Jun 2009

The Data-Information-Knowledge-Wisdom Hierarchy And Its Antithesis, Jay H. Bernstein

Publications and Research

The now taken-for-granted notion that data lead to information, which leads to knowledge, which in turnleads to wisdom was first specified in detail by R. L. Ackoff in 1988. The Data-Information-Knowledge-Wisdom hierarchy is based on filtration, reduction, and transformation. Besides being causal and hierarchical,the scheme is pyramidal, in that data are plentiful while wisdom is almost nonexistent. Ackoff’s formulalinking these terms together this way permits us to ask what the opposite of knowledge is and whether analogous principles of hierarchy, process, and pyramiding apply to it. The inversion of the Data-Information-Knowledge-Wisdom hierarchy produces a series of opposing terms (including misinformation,error, …


Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West Jun 2009

Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …


Lost In Translation: Emotion And Expression Through Technology, Shaylyn Joy May 2009

Lost In Translation: Emotion And Expression Through Technology, Shaylyn Joy

Honors Scholar Theses

My Thesis study was designed to bring to topic certain issues involved with CMC (computer-mediated communication.) Often we are presented with confusing or misleading situations when it comes to expressing our emotions through technological means. It is important that we are aware of certain issues such as the use of emoticons, expressing sarcasm, and the ongoing trend of Internet slang. These various aspects can create confusion in CMC, leading to a loss in translation. My survey study was designed to probe deeper into these issues by asking general questions and by analyzing sample CMC scenarios.


Oracle E-Business Suite In The Enterprise Systems Course At The Raj Soin College Of Business, Anand Jeyaraj May 2009

Oracle E-Business Suite In The Enterprise Systems Course At The Raj Soin College Of Business, Anand Jeyaraj

ISSCM Faculty Publications

Enterprise Resource Planning (ERP) systems, or simply enterprise systems, are enterprise-wide information systems that enable core activities underlying business processes in organizations. Enterprise systems incorporate several standalone information systems ranging from marketing, purchasing, sales, distribution, scheduling, human resources, customer relationship, financials and decision support through a single integrated central database that captures data relating to the various activities and business processes in organizations.


Introduction: Can We Bridge The Rigour-Relevance Gap?, Robin Fincham, Timothy Adrian Robert Clark May 2009

Introduction: Can We Bridge The Rigour-Relevance Gap?, Robin Fincham, Timothy Adrian Robert Clark

Research Collection Lee Kong Chian School Of Business

The following series of articles emanate from a session held at the first Journal of Management Studies Conference on the theme of ‘Beyond knowledge management: advancing the organizational knowledge research agenda’. The conference was concerned to advance academic understanding of this broad topic and in addition to reflect on the role of management scholars as creators, commodifiers and disseminators of management and organizational knowledge. The latter theme arose from debates in relation to the apparent marginality of business school academics in the production of management knowledge (Barley et al., 1988; Gibson and Tesone, 2001; Spell, 2001) and their consequent (in)ability …


Implementing Cms: Academic, Jonathan M. Smith, David Bietila Apr 2009

Implementing Cms: Academic, Jonathan M. Smith, David Bietila

Library Faculty Publications & Presentations

This session presents two case studies of the use of open source content management systems (CMSs) in academic libraries. It includes an overview of the benefits and features of CMSs, demonstrates implementations of CMSs at both public sites and staff intranets, and provides a comparison of the two CMS software platforms used (Joomla and Plone) and deployment processes, detailing experiences in such areas as selecting a CMS, identifying resources for support and training, and encouraging staff adoption.


The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim Apr 2009

The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim

Management Faculty Research

Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.


Undergraduate Course On Business Intelligence At The Wright State University Raj Soin College Of Business, Anand Jeyaraj Apr 2009

Undergraduate Course On Business Intelligence At The Wright State University Raj Soin College Of Business, Anand Jeyaraj

ISSCM Faculty Publications

Business intelligence (BI) tools enable senior, middle, and line managers to better understand their current operations and determine future strategies. There is a growing recognition among business professionals that the practices relating to BI are crucial for evaluating organizational performance, charting new directions, and everyday decision-making. According to Ziff Davis Enterprise, BI experts are ranked as the #1 job in the information technology sector for 2009.


Optimal Digital Content Distribution Strategy In The Presence Of Consumer-To-Consumer Channel, Yunfang Feng, Zhiling Guo, Wei-Yu Kevin Chiang Apr 2009

Optimal Digital Content Distribution Strategy In The Presence Of Consumer-To-Consumer Channel, Yunfang Feng, Zhiling Guo, Wei-Yu Kevin Chiang

Research Collection School Of Computing and Information Systems

Although the online business-to-consumer (B2C) channel is the primary selling channel for digital content (e.g., videos, images, and music), modern digital technology has made possible the legal dissemination of such content over the consumer-to-consumer (C2C) channel through personal computing devices, such as PCs, mobile phones, and portable media players. This paper investigates the optimal channel structure and the corresponding pricing and service strategies for digital content distribution in order to understand the business value of introducing the C2C channel alongside the prevailing B2C channel. We identify conditions under which it is more profitable to use both B2C and C2C channels …


Pricing Software Upgrades: The Role Of Product Improvement & User Costs, Ram Bala, Scott Carr Mar 2009

Pricing Software Upgrades: The Role Of Product Improvement & User Costs, Ram Bala, Scott Carr

Information Systems and Analytics

The computer software industry is an extreme example of rapid new product introduction. However, many consumers are sophisticated enough to anticipate the availability of upgrades in the future. This creates the possibility that consumers might either postpone purchase or buy early on and never upgrade. In response, many software producers offer special upgrade pricing to old customers in order to mitigate the effects of strategic consumer behavior. We analyze the optimality of upgrade pricing by characterizing the relationship between magnitude of product improvement and the equilibrium pricing structure, particularly in the context of user upgrade costs. This upgrade cost (such …


Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta Mar 2009

Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta

ISSCM Faculty Publications

This article presents a declarative query language, Document SQL (DSQL) that has the same look and feel as SQL and was designed by updating the semantics of SQL operations in the structured document domain. At the same time, DSQL was designed such that all queries written in it have equivalent counterparts in XQuery. Thus, by using such a language, users can take advantage of their existing SQL knowledge when writing ad-hoc queries without losing the expressive power of XQuery.


A Life Cycle Perspective On Online Community Success, Alicia Iriberri '06, Gondy Leroy Feb 2009

A Life Cycle Perspective On Online Community Success, Alicia Iriberri '06, Gondy Leroy

CGU Faculty Publications and Research

Using the information systems lifecycle as a unifying framework, we review online communities research and propose a sequence for incorporating success conditions during initiation and development to increase their chances of becoming a successful community, one in which members participate actively and develop lasting relationships. Online communities evolve following distinctive lifecycle stages and recommendations for success are more or less relevant depending on the developmental stage of the online community. In addition, the goal of the online community under study determines the components to include in the development of a successful online community. Online community builders and researchers will benefit …


An Automation Algorithm For Harvesting Capital Market Information From The Web, Pankaj Agrrawal Jan 2009

An Automation Algorithm For Harvesting Capital Market Information From The Web, Pankaj Agrrawal

Finance Faculty Scholarship

The purpose of this paper is to develop an algorithm to harvest user specified information on finance portals and compile it into machine‐readable datasets for quantitative analysis. The Visual Basic macro language in Microsoft Excel is applied to develop code that is not constrained by the single‐query function of Excel. The core of the algorithm is built around the splitting of the URL connector line and the placement of a continuously updating variable into which are looped as many tickers as there are in the input list. The output is then written to non‐overlapping cells. Numerical information placed on major …


A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling Jan 2009

A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling

Scholarship and Professional Work - Business

One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and network implementation exercise that can be completed in one or two class periods in any classroom with Internet access. The objective of the exercise is for students to solve a business problem by applying concepts related to basic network configuration, local area networks …


The Impact Of A Computer Proficiency Exam On Business Students' Admission To And Performance In A Higher-Level It Course, Patrick Rondeau, Li Xiaolin Jan 2009

The Impact Of A Computer Proficiency Exam On Business Students' Admission To And Performance In A Higher-Level It Course, Patrick Rondeau, Li Xiaolin

Scholarship and Professional Work - Business

Many colleges of business now assume incoming freshmen arrive on campus possessing high levels of computer skill and ability. Students are frequently offered the opportunity to take and pass a computer proficiency exam (CPE) in lieu of a freshman information technology (IT) course. While promoted as an efficient alternative, our analysis of the implementation of a CPE as a replacement for the freshman IT course at a small, Midwestern university revealed mixed results. As expected, we found those students who took and passed the CPE generally scored higher in their follow-on, sophomore IT course than those who passed the prerequisite, …