Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 290

Full-Text Articles in Management Information Systems

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Sep 2012

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

MIS/OM/DS Faculty Publications

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston Sep 2012

A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Online auction markets play increasingly important roles for resource allocations in distributed systems. This paper builds upon a market-based framework presented by Guo et al. (Guo, Z., G. J. Koehler, A. B. Whinston. 2007. A market-based optimization algorithm for distributed systems. Management Sci. 53(8) 1345–1458), where a distributed system optimization problem is solved by self-interested agents iteratively trading bundled resources in a double auction market run by a dealer. We extend this approach to a dynamic, asynchronous Internet market environment and investigate how various market design factors including dealer inventory policies, market communication patterns, and agent learning strategies affect the …


Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard Aug 2012

Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard

C. Jason Woodard

Social media was a topic that had entered into the daily vocabulary of teenagers and business executives alike. With this surge in popularity and influence worldwide the open question was what this new way of interacting would mean for businesses and whether or not social media could really be a driver of company profitability or just a nice way to share photos with friends? Circos, a Singapore-based company, developed a business that it hoped would help to answer those questions. By using a proprietary sentiment analysis tool, Circos had mined the vast world of online reviews available on various social …


Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard Aug 2012

Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard

C. Jason Woodard

After a successful presentation in the (A) case, Frederic Langlois, Circos.com general manager in Singapore, headed back to the company headquarters. He brought back not only the possibility of a new client, but also a specific request. The Raffles Hotel had asked him to provide new functionality beyond the existing social media analytics dashboard Circos had become known for. The Raffles Hotel manager had asked, “It would be great to have a simple and meaningful analysis of what people are saying about our property online. What would be really great, though, would be to know who is saying what. I …


Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari Aug 2012

Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari

Suneel K. Maheshwari

The objective of our paper is to identify factors and develop constructs that could be used to develop a conceptual Total Quality Management (TQM) model that is applicable to small and medium scale manufacturers in the United States. The data for this study was collected from a mail survey targeted to managers in the manufacturing plants. Responses were analyzed and factor analysis was used to develop measurement instruments.


Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari Aug 2012

Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari

Uday S. Tate

The objective of our paper is to identify factors and develop constructs that could be used to develop a conceptual Total Quality Management (TQM) model that is applicable to small and medium scale manufacturers in the United States. The data for this study was collected from a mail survey targeted to managers in the manufacturing plants. Responses were analyzed and factor analysis was used to develop measurement instruments.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim Aug 2012

The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim

Chong W. Kim

Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.


Korean Value Systems And Managerial Practices, Dong Ki Kim, Chong W. Kim Aug 2012

Korean Value Systems And Managerial Practices, Dong Ki Kim, Chong W. Kim

Chong W. Kim

Human beings are by nature sociocultural creatures. Our behavior is influenced not only by traditional value systems but also by contemporary education and training. In the same manner, the managerial practices of Korean managers are strongly influenced by the norms and value systems of the traditional Korean society. But, as the society changes from an agrarian society to an industrialized one, so does the behavior of Korean managers. This chapter focuses on the process of this change. More specifically, it will look at the effects of traditional value systems and those of industrialization on Korean managerial practices.


A Survey Of Schema Matching Research, Roger Blake Aug 2012

A Survey Of Schema Matching Research, Roger Blake

Roger H. Blake

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad Aug 2012

Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

Information technology (IT) services are often subject to downward price pressures due to improvements in technology and business processes in a competitive market. When clients enter into IT services contracts, they are faced with the future risk that their services will be overpriced relative to the broader IT services market. To mitigate this risk, clients often add benchmark provisions, whereby a neutral third party assesses the prevailing market price for services. It will support fair price adjustments if the market prices are lower than the current prices. We model the decision to benchmark in order to provide managerial information on …


Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin Aug 2012

Development And Implementation Of It-Enabled Business Processes: A Knowledge Structure View, Rick Brattin

Graduate Theses and Dissertations

As competitive pressures mount, organizations must continue to evolve their business processes in order to survive. Increasingly, firms are developing new IT-enabled business processes in response to rising competition, greater customer expectations, and challenging economic conditions. The success rate of these projects remains low despite much industry experience and extensive academic study. Managerial and organizational cognition represents a potentially fruitful lens for studying the design and implementation of IT-enabled business processes. This view assumes that individuals are information workers who spend their days absorbing, processing, and disseminating information as they pursue their goals and objectives. Individuals develop cognitive representations, called …


From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman Aug 2012

From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Consumers in e-commerce acquire information through search engines, yet to date there has been little empirical study on how users interact with the results produced by search engines. This is analogous to, but different from, the ever-expanding research on clickstreams, where users interact with static web pages. We propose a new network approach to analyzing search engine server log data. We call this searchstream data. We create graph representations based on the web pages that users traverse as they explore the search results that their use of search engines generates. We then analyze the graph-level properties of these search network …


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Aug 2012

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Journal Articles

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and …


Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo Aug 2012

Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo

Research Collection School Of Computing and Information Systems

We use hedonic valuation to establish a basis for valuing the time a user participates in an online gaming community. We distinguish between utilitarian and hedonic value. Our application involves elements of both utilitarian and hedonic value, however, the latter is much more important. We use an extensive data set involving a massive multi-player online role-playing game (MMORPG) from Korea. We specify and test econometric models that reflect the appropriate empirical structure for the setting, based on information about the players and the activities they engage in. The results permit us to estimate the hedonic value in monetary terms for …


Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway Aug 2012

Time Waits For No One: Using Time As A Lens In Information Systems Research, Christopher M. Conway

Graduate Theses and Dissertations

Despite considerable research interest, IT projects still fail at a higher rate than other projects. Primary causes for these failures are relational, motivational, and scheduling issues on the team. Using the concept of time as a lens, the four essays in this dissertation examine how the ways that individuals and teams structure time can help explain these failures. The essays formulate the concept of temporal dissonance at the individual and team level, and explore how temporal dissonance causes negative consequences for IT workers and IT teams.

Essay one synthesizes temporal dissonance from concepts of temporal congruity and cognitive dissonance. It …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


An Integrated Vendor-Buyer Cooperative Inventory Model For Items With Imperfect Quality And Shortage Backordering, Jia-Tzer Hsu, Lie-Fern Hsu Jul 2012

An Integrated Vendor-Buyer Cooperative Inventory Model For Items With Imperfect Quality And Shortage Backordering, Jia-Tzer Hsu, Lie-Fern Hsu

Publications and Research

We develop a model to determine an integrated vendor-buyer inventory policy for items with imperfect quality and planned back orders. The production process is imperfect and produces a certain number of defective items with a known probability density function. The vendor delivers the items to the buyer in small lots of equally sized shipments. Upon receipt of the items, the buyer will conduct a 100% inspection. Since each lot contains a variable number of defective items, shortages may occur at the buyer. We assume that shortages are permitted and are completely back ordered. The objective is to minimize the total …


Portfolio Management: The Australian Experience, Aileen Koh Jul 2012

Portfolio Management: The Australian Experience, Aileen Koh

Aileen Koh

The increasing use of project and programs by organizations to achieve business strategy and goals have led to the need to understand project portfolio management. Along with the increasing diffusion of portfolio management, a new managerial role evolves: the portfolio manager. This new role is pivotal in planning and controlling complex project landscapes more effectively and efficiently. This study is to investigate the governance structures and the roles, responsibilities and practices of portfolio managers. A sequential mixed method approach under a realism paradigm is used. This paper presents the first stage qualitative study, using an inductive interview based approach with …


Zoho For Ticketing: Project Management & Reporting Using A Custom-Built Zoho Application, M Ryan Hess Jul 2012

Zoho For Ticketing: Project Management & Reporting Using A Custom-Built Zoho Application, M Ryan Hess

M Ryan Hess

This ticketing application was developed by the DePaul University Libraries Web Services Team for project management. It uses the Zoho Creator application building platform and is available for use for free on the Zoho Marketplace. The application manages projects, keeps stakeholders up to date on project statuses and generates reports.


Exploring The Roles Of People, Governance And Technology In Organizational Readiness For Emerging Technologies, Abiodun A. Ogunyemi, Kevin A. Johnston Jul 2012

Exploring The Roles Of People, Governance And Technology In Organizational Readiness For Emerging Technologies, Abiodun A. Ogunyemi, Kevin A. Johnston

The African Journal of Information Systems

The rapid development and release of emerging technologies have made their adoption challenging. Most often there are failing issues in organizational adoption of emerging technologies. It is yet unclear which component(s) of organization play the prominent role(s) in organizational readiness to adopt emerging technologies. Using a mixed method, this study conducted an online survey of 83 South African organizations for server virtualization adoption. Server virtualization is an emerging technology being widely adopted in most organizations in developed countries. IT executives rated server virtualization as the second-most important technology to help achieve cost reductions and optimize productivity in recent surveys. Very …


International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan Jul 2012

International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan

Arcot Desai NARASIMHALU

This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …


Customer Dissatisfaction And Complaining Responses Towards Mobile Telephony Services, Simon Gyasi Nimako Mr Jul 2012

Customer Dissatisfaction And Complaining Responses Towards Mobile Telephony Services, Simon Gyasi Nimako Mr

The African Journal of Information Systems

The paper examines customer satisfaction and complaint responses towards Mobile telephony services. The study was a cross-sectional survey involving customers from two mobile telephony companies. Data were collected using a self-administered structured questionnaire and analyzed using SPSS (version 16.0). The study found that customer satisfaction rating differed according to the mobile networks, and previous dissatisfaction significantly influences complaining response. Again, dissatisfied customers tend to complain more than satisfied ones. Moreover, dissatisfaction may not necessarily induce complaining and some satisfied customers may still complain. Furthermore, previous dissatisfaction may not always negatively affect overall satisfaction if it is effectively managed. Finally, the …


The Role Of Interactivity In Interent Business On Customer Experiential Values And Behavioral Intentions, So Ra Park Jul 2012

The Role Of Interactivity In Interent Business On Customer Experiential Values And Behavioral Intentions, So Ra Park

College of Business: Dissertations, Theses, and Student Research

Customers’ experiential value is based on holistic experience customers would have when they interact with a product/service. Experiential value is defined as “relativistic preference characterizing a subject’s experience with some object” (Holbrook, 1994). Internet is characterized for interactivity and it should have a role in customers’ experiential value. Therefore, this research investigates the role of interactivity (e-store interaction, C2C interaction, and content interaction) and web store utility on intrinsic and extrinsic customer experiential value. The final dependent variable is behavioral intentions. To test the research model, a survey was designed to capture online consumers’ perception of interactivity within e-stores, experiential …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko Jul 2012

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung S. Ko

Humayun Zafar

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


The Economic Ramifications Of Strategic It Security Information Sharing In The Financial Services Industry, Humayun Zafar, Yoris A. Au Jul 2012

The Economic Ramifications Of Strategic It Security Information Sharing In The Financial Services Industry, Humayun Zafar, Yoris A. Au

Humayun Zafar

We investigate the economic ramifications of strategic IT security information sharing among firms in the financial services industry. An IT security information sharing system can potentially minimize security breaches. However, although the Presidential Decision Directive/NSC-63 encouraged the establishment of such a system in the form of industry based information sharing and analysis centers (ISACs), it is injudicious to assume that firms will be willing to naively share their security information with their strategic competitors. We argue that without a proper mechanism some firms will try to put in minimum effort, potentially reducing the system’s reliability, and aim to answer the …


An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology, Xiong Zhang, Zhiling Guo, Wei Thoo Yue Jul 2012

An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology, Xiong Zhang, Zhiling Guo, Wei Thoo Yue

Research Collection School Of Computing and Information Systems

Counterfeiting causes hundreds of billions dollars of losses around the world every year. Due to the growing prominence of online commerce, the seriousness of the situation could soon become much worse. Hence, reaching a clear understanding of the fundamental economic incentives behind this practice is of vital importance. In this paper, we investigate a problem within which a firm selling a counterfeit product engages in price competition with a firm that sells an authentic product to a population of heterogeneous consumers. An online intermediary acts as the facilitator of both firms’ transactions and may consequently be liable for any counterfeit …


Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen Jun 2012

Nursing Identity And The Computer: The Impact Of Care Realities On Information Systems Use, Hannah S. Rasmussen

Electronic Thesis and Dissertation Repository

Driven by developments in technology and communication, and by social, political and economic issues, the introduction of different information systems in nursing has risen significantly in recent years. However, little is known about the understanding of these systems by the nurses who are intended to use them.

Informed by a Symbolic Interactionist approach, this research explored the experience of nurses interacting with information systems. Using grounded theory methods, the main sources of data were interviews, textual analysis and observation with nurses in three Canadian cities.

The key findings of this research are fourfold. First, the core category developed in this …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Transformative Community Service Learning: Beyond The "Poor," The "Rich," And The Helping Dynamic, Nancy E. Bertaux, Kathleen R. Smythe, Elaine Crable Jun 2012

Transformative Community Service Learning: Beyond The "Poor," The "Rich," And The Helping Dynamic, Nancy E. Bertaux, Kathleen R. Smythe, Elaine Crable

Faculty Scholarship

No abstract provided.