Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Accounting (7)
- Technology and Innovation (5)
- Education (4)
- Social and Behavioral Sciences (4)
- Higher Education (3)
-
- Business Administration, Management, and Operations (2)
- Computer Sciences (2)
- Library and Information Science (2)
- Physical Sciences and Mathematics (2)
- Adult and Continuing Education (1)
- Asian Studies (1)
- Business and Corporate Communications (1)
- Computer Engineering (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Engineering (1)
- Finance and Financial Management (1)
- Health Services Administration (1)
- Human Resources Management (1)
- International and Area Studies (1)
- Management Sciences and Quantitative Methods (1)
- Medicine and Health Sciences (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Operations and Supply Chain Management (1)
- Organizational Behavior and Theory (1)
- Other Business (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Health (1)
- Institution
- Publication Year
- Publication
-
- Research Collection School Of Accountancy (4)
- Computer Information Systems Dissertations (3)
- Gary PAN (3)
- Priscilla Arling (3)
- Electronic Theses and Dissertations (2)
-
- Scholarship and Professional Work - Business (2)
- Theses and Dissertations (2)
- Anna Ujwary-Gil (1)
- Associate Professor Linda Dawson (1)
- CMP Research (1)
- Dissertations (1)
- Dr. Mutaz M. Al-Debei (1)
- Faculty Publications (1)
- ISSCM Faculty Publications (1)
- Magno Queiroz (1)
- Research Collection School Of Computing and Information Systems (1)
- Research outputs pre 2011 (1)
- The African Journal of Information Systems (1)
- Yuwen Chen (1)
- Publication Type
- File Type
Articles 1 - 30 of 31
Full-Text Articles in Management Information Systems
An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello
An Organization’S Ability To Improve Outsourcing Outcomes In Information Technology Outsourcing Initiatives By Increasing Organizational Knowledge: A Case Study, John Michael Mello
Electronic Theses and Dissertations
The problem addressed in this study was the literature gap regarding how internal organizational knowledge can be increased effectively within outsourcing projects. The study was a qualitative social constructionist case study composed of senior technology leaders. The purpose this study addressed was to understand the current structure of technical outsourcing contracts and how future contracts could be structured to address the problem of this study. The research incorporated how a reconceptualized absorptive capacity model, sociocognitive theory, and digital leadership mindsets could improve knowledge transfer outcomes between a vendor and client. Research shows that increasing an organization’s knowledge during an outsourcing …
The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof
The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof
The African Journal of Information Systems
This study investigates the use of computers by People with Disabilities (PWDs) and whether it improves capability and human development in sub-Saharan Africa. Based on a case study’s findings and interviews with PWDs, we build on the Technology-Augment Capability Approach to show how computers as technical objects and caregivers as non-technical objects facilitate four key capabilities for PWDs, namely (1) Capability to education, (2) Capability to socio-economic activities, (3) Capability to social relations, (4) Informational capabilities and capability to employment. However, PWDs’ ability to convert the use of computers into capabilities is influenced by conversion factors, such as personal, social, …
Embedding Robotic Process Automation Into Process Management: Case Study Of Using Taskt, Anand Jeyaraj, Vikram Sethi
Embedding Robotic Process Automation Into Process Management: Case Study Of Using Taskt, Anand Jeyaraj, Vikram Sethi
ISSCM Faculty Publications
XYZ Company routinely faced penalties imposed by the United States Internal Revenue Service (IRS) for non-compliance in depositing federal withholding taxes related to the managed benefits plans for its clients. Since the rules for depositing the federal taxes were complex and differed between the benefits plans, it was common for XYZ Company to accrue penalties imposed by the IRS. Desiring to eliminate penalties by complying 100% with the IRS guidelines, XYZ Company considered various solutions. Finally, XYZ Company implemented a Robotic Process Automation (RPA) solution using the open source tool—taskt—to achieve 100% compliance in depositing federal withholding taxes and eliminate …
Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim
Komida: Making Microfinance Digital In Indonesia, Adrian Yeow, Wee Kiat Lim
CMP Research
This case chronicles specific background, challenges, and actions taken by an Indonesian microfinancing institution (MFI) as it was implementing a digital mobile system to replace its current manual processes used in its field office operations. From a high level perspective, it describes the challenges faced by an organization that was attempting to implement a new digital initiative but constrained by its resource-scarce, institutionally, and culturally bound environment. At the same time, it highlights that this digital initiative was a critical part of its overall plan for addressing industry demands, increasing competitive pressures, and internal process issues. The case study thus …
Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid
Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid
Priscilla Arling
Social networking technologies have commanded a lot of recent attention because they have changed the manner in which individuals have traditionally and historically accessed and shared knowledge. Although these technologies provide individuals with the opportunity to access and to utilize a plethora of knowledge created by others, the knowledge still needs to be organized, interpreted, and incorporated by the user in order for it to be useful. This research sought to better understand how social networking technologies can aid a firm's efforts to establish a knowledge management and a generative learning environment. The study closely followed one of the United …
Examining How Firms Leverage It To Achieve Firm Productivity: Rbv And Dynamic Capabilities Perspectives, Gary Pan, Shan Ling Pan, Chu Yeong Lim
Examining How Firms Leverage It To Achieve Firm Productivity: Rbv And Dynamic Capabilities Perspectives, Gary Pan, Shan Ling Pan, Chu Yeong Lim
Research Collection School Of Accountancy
Firm productivity is one of the major drivers of firm's growth. Information Technology (IT) has the potential to be a key enabler of firm productivity. IS researchers have suggested strong association between investments in IT and firm productivity. Yet, uncertainty and concern about the actual impact of IT on firm productivity remain. This calls for an urgent need for research on how firms can leverage IT for productivity gains. Through a case study, this research aims to answer the above question by developing a process model that explicates the roles of firm capabilities in driving IT-enabled productivity.
Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman
Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman
Magno Queiroz
Business scholars and practitioners are becoming increasingly aware of the opportunities that exist when service is added to traditional product offerings. However, the literature has not previously explored the question of how the IS function is responding to greater emphasis on service. In this paper, we employ a multi-case research design to investigate the role of the IS function in supporting increasing levels of service. Our study contributes to the literature by showing that differences in IS service orientation and collaborative capabilities affect the ability of firms to support service. The implications for IS and managerial practice are discussed by …
The Cost Of Mindfulness: A Case Study, Douglas Hales, James Kroes, Yuwen Chen, Kyung Kang
The Cost Of Mindfulness: A Case Study, Douglas Hales, James Kroes, Yuwen Chen, Kyung Kang
Yuwen Chen
Mindfulness is a concept that refers to the attentiveness and alertness of people to detail. When applied properly, mindfulness improves the reliability of organizational processes, an important dimension to process quality. However, no study measures the cost of implementing mindfulness, which is necessary for managers when allocating scarce resources among competing improvement initiatives. Using the popular P-A-F framework, this study measures the cost of mindfulness in a healthcare context, and suggests consideration of several activities when implementing it in real-world firms.
Intellectual Capital Statement (Ics) As A Method Of Measurement And Management Of Knowledge Assets, Anna Ujwary-Gil
Intellectual Capital Statement (Ics) As A Method Of Measurement And Management Of Knowledge Assets, Anna Ujwary-Gil
Anna Ujwary-Gil
The article describes empirical verification of an interesting model – Intellectual Capital Statement (ICS). ICS is an example of a method which emphasizes the European contribution into the developing trend of intellectual capital (IC) measure and evaluation, with particular attention paid to the SME sector (a strong presence of Scandinavian countries and the USA is noticeable here). ICS is presented here as a tool enabling us to manage and evaluate IC of a company and to demonstrate the dynamics of its changes. The article contains a case study of a company operating in the construction sector in Poland. It also …
A Business Model Perspective For Icts In Public Engagement, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman
A Business Model Perspective For Icts In Public Engagement, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman
Dr. Mutaz M. Al-Debei
Public institutions, in their efforts to promote meaningful citizen engagement, are increasingly looking at the democratic potential of Information and Communication Technologies (ICTs). Previous studies suggest that such initiatives seem to be impeded by socio-technical integration barriers such as low sustainability, poor citizen acceptance, coordination difficulties, lack of understanding and failure to assess their impact. Motivated by these shortcomings, the paper develops and applies a business model perspective as an interceding framework foranalysisandevaluation. The underlying principlebehind thisapproachisthatit isnottechnology per se which determines success, but rather the way in which the business model of the technological artifact is configured and employed …
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan
Gary PAN
We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …
Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan
Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan
Gary PAN
This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn
Gary PAN
This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …
Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal
Alignment Within The Corporate It Unit: An Analysis Of Software Testing And Development, Colin Onita, Jasbir Dhaliwal
Faculty Publications
Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and …
Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Pan, Shan Ling Pan
Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Pan, Shan Ling Pan
Research Collection School Of Accountancy
This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …
Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson
Cognitive Processes In Object-Oriented Requirements Engineering Practice: Analogical Reasoning And Mental Modelling, Linda Dawson
Associate Professor Linda Dawson
This paper presents a background in cognitive processes such as problem solving and analogical reasoning for considering modeling from an object-oriented perspective within the domain of requirements engineering. The paper then describes a research project and the findings from a set of four cases which examine professional practice from perspective of cognitive modeling for object-oriented requirements engineering. In these studies, it was found that the analysts routinely built models in their minds and refined them before committing them to paper or communicating these models to others. The studies also showed that objectoriented analysts depend on analogical reasoning where they use …
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
Priscilla Arling
Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
Priscilla Arling
Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers
Scholarship and Professional Work - Business
Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.
Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid
Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid
Scholarship and Professional Work - Business
Social networking technologies have commanded a lot of recent attention because they have changed the manner in which individuals have traditionally and historically accessed and shared knowledge. Although these technologies provide individuals with the opportunity to access and to utilize a plethora of knowledge created by others, the knowledge still needs to be organized, interpreted, and incorporated by the user in order for it to be useful. This research sought to better understand how social networking technologies can aid a firm's efforts to establish a knowledge management and a generative learning environment. The study closely followed one of the United …
Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma
Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma
Research Collection School Of Computing and Information Systems
Most container terminals in the world today are operating up to their capacities. In this paper, we have developed a decision support system to optimise yard operations by considering all container flows (import, export and transshipment) through the yard with the view to improving the terminal performance and efficiency. In another paper, we proposed an optimisation model that determines optimal container locations and straddle carrier (SC) movements with the objective of minimising the overall storage and handling cost of containers. In this paper, a discrete event simulation tool for container terminal operations has been developed with three objectives: (i) to …
Building And Testing Theory On The Role Of It In The Relationship Between Power And Performance: Implementing Enterprise Performance Management In The Organization, Mitchell Wenger
Theses and Dissertations
This research builds on the literature about power and performance, offering new theory that extends the literature by accounting for the transformational effects of information technology. The role of information technology in the relationship between organizational power and performance is unclear in the literature. Management literature offers theories describing the relationship between power and performance. IS literature investigates the relationship between information technology (IT) and power and between information systems technology and performance, but is silent on the impact of IT on the relationship between power and performance. The nature of this relationship – direct, moderating, or indirect – is …
Defining Value Based Information Security Governance Objectives, Sushma Mishra
Defining Value Based Information Security Governance Objectives, Sushma Mishra
Theses and Dissertations
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three …
Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis
Managing The Tension Between Standardization And Customization In It-Enabled Service Provisioning: A Sensemaking Perspective, Mark O. Lewis
Computer Information Systems Dissertations
The outsourcing literature has offered a plethora of perspectives and models for understanding decision determinants and outcomes of outsourcing of business processes. While past studies have contributed significantly to scholarly research in this area, there are an insufficient number of studies that are provider centric. Consequently, there is a need to understand how service providers address a core challenge: to achieve scalable growth by developing standardized offerings that can be sufficiently customized to meet the unique demands of individual customers. This study explores how patterns of collective action within and between a provider and two of their largest customers relate …
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan
Research Collection School Of Accountancy
We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn
Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn
Research Collection School Of Accountancy
This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …
The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet
The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet
Dissertations
Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …
Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo
Upgrading Packaged Software: An Exploratory Study Of Decisions, Impacts, And Coping Strategies From The Perspectives Of Stakeholders, Huoy Min Khoo
Computer Information Systems Dissertations
Packaged software is widely adopted and has become an integral part of most organizations’ IT portfolios. Once packaged software is adopted, upgrades to subsequent versions appear to be inevitable. To date, research on packaged software upgrade has not received the attention that it warrants, as academic research continues to focus on initial technology adoption. To explore this understudied yet important area, three research questions were proposed: (1) What influences the decision to upgrade packaged software? (2) How do stakeholders cope with software upgrade? (3) How does a packaged software upgrade affect stakeholders? A qualitative research method was used to study …
Antecedents Of Information Systems Backsourcing, Natalia Veltri
Antecedents Of Information Systems Backsourcing, Natalia Veltri
Electronic Theses and Dissertations
This dissertation examines backsourcing of corporate IS activities, and why IS outsourcing clients decide to backsource. Information Systems (IS) backsourcing is a business practice in which a company takes back in-house assets, activities, and skills that are part of its IS operations and were previously outsourced to one or more outside information service suppliers. Focusing on economic, strategic and relationship motives, a number of theoretical backsourcing factors is derived from transaction cost theory, agency theory, core competency perspective, IOR theory and marketing channels literature. To identify factors salient in IS backsourcing and to examine the process of backsourcing this dissertation …
Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins
Access Anytime Anyplace: An Empircal Investigation Of Patterns Of Technology Use In Nomadic Computing Environments, Karlene C. Cousins
Computer Information Systems Dissertations
With the increasing pervasiveness of mobile technologies such as cellular phones, personal digital assistants and hand held computers, mobile technologies promise the next major technological and cultural shift. Like the Internet, it is predicted that the greatest impact will not come from hardware devices or software programs, but from emerging social practices, which were not possible before. To capitalize on the benefits of mobile technologies, organizations have begun to implement nomadic computing environments. Nomadic computing environments make available the systems support needed to provide computing and communication capabilities and services to the mobile work force as they move from place …