Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Case study

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 31

Full-Text Articles in Management Information Systems

An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello Jun 2021

An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello

Electronic Theses and Dissertations

The problem addressed in this study was the literature gap regarding how internal organizational knowledge can be increased effectively within outsourcing projects. The study was a qualitative social constructionist case study composed of senior technology leaders. The purpose this study addressed was to understand the current structure of technical outsourcing contracts and how future contracts could be structured to address the problem of this study. The research incorporated how a reconceptualized absorptive capacity model, sociocognitive theory, and digital leadership mindsets could improve knowledge transfer outcomes between a vendor and client. Research shows that increasing an organization’s knowledge during an outsourcing …


The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof Apr 2021

The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof

The African Journal of Information Systems

This study investigates the use of computers by People with Disabilities (PWDs) and whether it improves capability and human development in sub-Saharan Africa. Based on a case study’s findings and interviews with PWDs, we build on the Technology-Augment Capability Approach to show how computers as technical objects and caregivers as non-technical objects facilitate four key capabilities for PWDs, namely (1) Capability to education, (2) Capability to socio-economic activities, (3) Capability to social relations, (4) Informational capabilities and capability to employment. However, PWDs’ ability to convert the use of computers into capabilities is influenced by conversion factors, such as personal, social, …


Embedding Robotic Process Automation Into Process Management: Case Study Of Using Taskt, Anand Jeyaraj, Vikram Sethi Jul 2020

Embedding Robotic Process Automation Into Process Management: Case Study Of Using Taskt, Anand Jeyaraj, Vikram Sethi

ISSCM Faculty Publications

XYZ Company routinely faced penalties imposed by the United States Internal Revenue Service (IRS) for non-compliance in depositing federal withholding taxes related to the managed benefits plans for its clients. Since the rules for depositing the federal taxes were complex and differed between the benefits plans, it was common for XYZ Company to accrue penalties imposed by the IRS. Desiring to eliminate penalties by complying 100% with the IRS guidelines, XYZ Company considered various solutions. Finally, XYZ Company implemented a Robotic Process Automation (RPA) solution using the open source tool—taskt—to achieve 100% compliance in depositing federal withholding taxes and eliminate …


Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim Dec 2018

Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim

CMP Research

This case chronicles specific background, challenges, and actions taken by an Indonesian microfinancing institution (MFI) as it was implementing a digital mobile system to replace its current manual processes used in its field office operations. From a high level perspective, it describes the challenges faced by an organization that was attempting to implement a new digital initiative but constrained by its resource-scarce, institutionally, and culturally bound environment. At the same time, it highlights that this digital initiative was a critical part of its overall plan for addressing industry demands, increasing competitive pressures, and internal process issues. The case study thus …


Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid Jun 2015

Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid

Priscilla Arling

Social networking technologies have commanded a lot of recent attention because they have changed the manner in which individuals have traditionally and historically accessed and shared knowledge. Although these technologies provide individuals with the opportunity to access and to utilize a plethora of knowledge created by others, the knowledge still needs to be organized, interpreted, and incorporated by the user in order for it to be useful. This research sought to better understand how social networking technologies can aid a firm's efforts to establish a knowledge management and a generative learning environment. The study closely followed one of the United …


Examining How Firms Leverage It To Achieve Firm Productivity: Rbv And Dynamic Capabilities Perspectives, Gary Pan, Shan Ling Pan, Chu Yeong Lim Jun 2015

Examining How Firms Leverage It To Achieve Firm Productivity: Rbv And Dynamic Capabilities Perspectives, Gary Pan, Shan Ling Pan, Chu Yeong Lim

Research Collection School Of Accountancy

Firm productivity is one of the major drivers of firm's growth. Information Technology (IT) has the potential to be a key enabler of firm productivity. IS researchers have suggested strong association between investments in IT and firm productivity. Yet, uncertainty and concern about the actual impact of IT on firm productivity remain. This calls for an urgent need for research on how firms can leverage IT for productivity gains. Through a case study, this research aims to answer the above question by developing a process model that explicates the roles of firm capabilities in driving IT-enabled productivity.


Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman Dec 2014

Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman

Magno Queiroz

Business scholars and practitioners are becoming increasingly aware of the opportunities that exist when service is added to traditional product offerings. However, the literature has not previously explored the question of how the IS function is responding to greater emphasis on service. In this paper, we employ a multi-case research design to investigate the role of the IS function in supporting increasing levels of service. Our study contributes to the literature by showing that differences in IS service orientation and collaborative capabilities affect the ability of firms to support service. The implications for IS and managerial practice are discussed by …


The Cost Of Mindfulness: A Case Study, Douglas Hales, James Kroes, Yuwen Chen, Kyung Kang Mar 2014

The Cost Of Mindfulness: A Case Study, Douglas Hales, James Kroes, Yuwen Chen, Kyung Kang

Yuwen Chen

Mindfulness is a concept that refers to the attentiveness and alertness of people to detail. When applied properly, mindfulness improves the reliability of organizational processes, an important dimension to process quality. However, no study measures the cost of implementing mindfulness, which is necessary for managers when allocating scarce resources among competing improvement initiatives. Using the popular P-A-F framework, this study measures the cost of mindfulness in a healthcare context, and suggests consideration of several activities when implementing it in real-world firms.


Intellectual Capital Statement (Ics) As A Method Of Measurement And Management Of Knowledge Assets, Anna Ujwary-Gil Dec 2011

Intellectual Capital Statement (Ics) As A Method Of Measurement And Management Of Knowledge Assets, Anna Ujwary-Gil

Anna Ujwary-Gil

The article describes empirical verification of an interesting model – Intellectual Capital Statement (ICS). ICS is an example of a method which emphasizes the European contribution into the developing trend of intellectual capital (IC) measure and evaluation, with particular attention paid to the SME sector (a strong presence of Scandinavian countries and the USA is noticeable here). ICS is presented here as a tool enabling us to manage and evaluate IC of a company and to demonstrate the dynamics of its changes. The article contains a case study of a company operating in the construction sector in Poland. It also …


A Business Model Perspective For Icts In Public Engagement, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman Dec 2011

A Business Model Perspective For Icts In Public Engagement, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman

Dr. Mutaz M. Al-Debei

Public institutions, in their efforts to promote meaningful citizen engagement, are increasingly looking at the democratic potential of Information and Communication Technologies (ICTs). Previous studies suggest that such initiatives seem to be impeded by socio-technical integration barriers such as low sustainability, poor citizen acceptance, coordination difficulties, lack of understanding and failure to assess their impact. Motivated by these shortcomings, the paper develops and applies a business model perspective as an interceding framework foranalysisandevaluation. The underlying principlebehind thisapproachisthatit isnottechnology per se which determines success, but rather the way in which the business model of the technological artifact is configured and employed …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan Sep 2011

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan

Gary PAN

We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …


Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan Sep 2011

Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan

Gary PAN

This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn Sep 2011

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn

Gary PAN

This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …


Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal Jan 2011

Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal

Faculty Publications

Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and …


Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Pan, Shan Ling Pan Jan 2011

Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Pan, Shan Ling Pan

Research Collection School Of Accountancy

This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …


Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson Dec 2010

Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson

Associate Professor Linda Dawson

This paper presents a background in cognitive processes such as problem solving and analogical reasoning for considering modeling from an object-oriented perspective within the domain of requirements engineering. The paper then describes a research project and the findings from a set of four cases which examine professional practice from perspective of cognitive modeling for object-oriented requirements engineering. In these studies, it was found that the analysts routinely built models in their minds and refined them before committing them to paper or communicating these models to others. The studies also showed that objectoriented analysts depend on analogical reasoning where they use …


A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers Jun 2010

A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers

Priscilla Arling

Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.


A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers Jun 2010

A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers

Priscilla Arling

Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.


A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers Jan 2010

A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers

Scholarship and Professional Work - Business

Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.


Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid Jan 2010

Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid

Scholarship and Professional Work - Business

Social networking technologies have commanded a lot of recent attention because they have changed the manner in which individuals have traditionally and historically accessed and shared knowledge. Although these technologies provide individuals with the opportunity to access and to utilize a plethora of knowledge created by others, the knowledge still needs to be organized, interpreted, and incorporated by the user in order for it to be useful. This research sought to better understand how social networking technologies can aid a firm's efforts to establish a knowledge management and a generative learning environment. The study closely followed one of the United …


Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma Aug 2009

Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma

Research Collection School Of Computing and Information Systems

Most container terminals in the world today are operating up to their capacities. In this paper, we have developed a decision support system to optimise yard operations by considering all container flows (import, export and transshipment) through the yard with the view to improving the terminal performance and efficiency. In another paper, we proposed an optimisation model that determines optimal container locations and straddle carrier (SC) movements with the objective of minimising the overall storage and handling cost of containers. In this paper, a discrete event simulation tool for container terminal operations has been developed with three objectives: (i) to …


Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger Apr 2009

Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger

Theses and Dissertations

This research builds on the literature about power and performance, offering new theory that extends the literature by accounting for the transformational effects of information technology. The role of information technology in the relationship between organizational power and performance is unclear in the literature. Management literature offers theories describing the relationship between power and performance. IS literature investigates the relationship between information technology (IT) and power and between information systems technology and performance, but is silent on the impact of IT on the relationship between power and performance. The nature of this relationship – direct, moderating, or indirect – is …


Defining Value Based Information Security Governance Objectives, Sushma Mishra Dec 2008

Defining Value Based Information Security Governance Objectives, Sushma Mishra

Theses and Dissertations

This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …


Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis Aug 2008

Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis

Computer Information Systems Dissertations

The outsourcing literature has offered a plethora of perspectives and models for understanding decision determinants and outcomes of outsourcing of business processes. While past studies have contributed significantly to scholarly research in this area, there are an insufficient number of studies that are provider centric. Consequently, there is a need to understand how service providers address a core challenge: to achieve scalable growth by developing standardized offerings that can be sufficiently customized to meet the unique demands of individual customers. This study explores how patterns of collective action within and between a provider and two of their largest customers relate …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan Dec 2006

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan

Research Collection School Of Accountancy

We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn Sep 2006

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn

Research Collection School Of Accountancy

This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …


The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo Jan 2006

Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo

Computer Information Systems Dissertations

Packaged software is widely adopted and has become an integral part of most organizations’ IT portfolios. Once packaged software is adopted, upgrades to subsequent versions appear to be inevitable. To date, research on packaged software upgrade has not received the attention that it warrants, as academic research continues to focus on initial technology adoption. To explore this understudied yet important area, three research questions were proposed: (1) What influences the decision to upgrade packaged software? (2) How do stakeholders cope with software upgrade? (3) How does a packaged software upgrade affect stakeholders? A qualitative research method was used to study …


Antecedents Of Information Systems Backsourcing, Natalia Veltri Jan 2005

Antecedents Of Information Systems Backsourcing, Natalia Veltri

Electronic Theses and Dissertations

This dissertation examines backsourcing of corporate IS activities, and why IS outsourcing clients decide to backsource. Information Systems (IS) backsourcing is a business practice in which a company takes back in-house assets, activities, and skills that are part of its IS operations and were previously outsourced to one or more outside information service suppliers. Focusing on economic, strategic and relationship motives, a number of theoretical backsourcing factors is derived from transaction cost theory, agency theory, core competency perspective, IOR theory and marketing channels literature. To identify factors salient in IS backsourcing and to examine the process of backsourcing this dissertation …


Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins Dec 2004

Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins

Computer Information Systems Dissertations

With the increasing pervasiveness of mobile technologies such as cellular phones, personal digital assistants and hand held computers, mobile technologies promise the next major technological and cultural shift. Like the Internet, it is predicted that the greatest impact will not come from hardware devices or software programs, but from emerging social practices, which were not possible before. To capitalize on the benefits of mobile technologies, organizations have begun to implement nomadic computing environments. Nomadic computing environments make available the systems support needed to provide computing and communication capabilities and services to the mobile work force as they move from place …