Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2014

Institution
Keyword
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Technology and Innovation

How The Usage Of It Is Effecting Academic Libraries, Mohammed J. Sarwar Dec 2014

How The Usage Of It Is Effecting Academic Libraries, Mohammed J. Sarwar

Mohammed J Sarwar

The purpose of this treatise is to determine how information technology is affecting the usage of services in the academic library. Various studies suggest that there has been a decline in usage of traditional face-to-face reference services. The majority of the college students prefer to use the Web instead of frequenting the library. Librarians and educators are concerned that these students are developing poor research skills if they only use the internet for research. Many of them are not familiar with the best electronic resources. Librarians may have less reference work but they will need to offer instruction on using …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Nov 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Conference Presentations

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Absorptive Capacity And Ict Adoption Strategies For Smes: A Case Study In Kenya, Joshua R A Ndiege, Marlien E. Herselman, Stephen V. Flowerday Oct 2014

Absorptive Capacity And Ict Adoption Strategies For Smes: A Case Study In Kenya, Joshua R A Ndiege, Marlien E. Herselman, Stephen V. Flowerday

The African Journal of Information Systems

Many small and medium enterprises (SMEs) in developing countries continue to be challenged by their information technology (IT) adoption process, which is often characterized by a number of deficiencies. The purpose of this study was to examine the role of absorptive capacity (AC) in SMEs’ performance, as well as establish the correlation between SMEs’ AC and their IT adoption process. The findings of this study, obtained by measuring different dimensions of AC using Jimenez-Barrionuevo, Garcia-Morales, and Molina’s scale of 18 items, suggest that AC plays a critical role in the performance of SMEs in Kenya and that SMEs with strong …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Sep 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Journal Articles

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter Jul 2014

Potentially Valuable Overlaps Between Work System Theory, Demo, And Enterprise Engineering, Steven Alter

Steven Alter

This paper explores how work system theory (WST) and related core ideas in various versions of the work system method (WSM) overlap with enterprise engineering and with the DEMO methodology. Based on the definition of work system, an enterprise can be viewed as a set of interacting work systems. A work system can be summarized at various levels of detail. The simplest level is basically a verb phrase. The next level is a “work system snapshot.” More detailed descriptions are based on a work system metamodel. This paper’s contribution is in two areas, 1) establishing links between WST/WSM and enterprise …


Components Of The Brand Equity Of Internet Service Providers (Isps) In Pakistan, Kashif Farhat Jul 2014

Components Of The Brand Equity Of Internet Service Providers (Isps) In Pakistan, Kashif Farhat

Business Review

This study assesses the determinants of customer-based-brand equity of Internet Service Providing brands in Pakistan. A Likert scale questionnaire was served to 251 respondents, selected through convenience sampling, to assess correlational relationship between the dependent variable: brand equity and independent variables: brand loyalty, brand awareness, perceived quality and brand association. Brand loyalty, brand awareness and perceived quality were found to have a positive significant impact on building brand equity. It’s recommended that marketers and brand managers allocate maximum resources to brand loyalty and brand awareness to gain higher brand equity of ISPs brands.


Information Security As A Determinant Of Nation’S Networked Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong Jun 2014

Information Security As A Determinant Of Nation’S Networked Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong

Conference Papers in Published Proceedings

No abstract provided.


Knowledge-Supported Design Thinking About Systems In Organizations: An Application Of Work System Theory, Steven Alter Jun 2014

Knowledge-Supported Design Thinking About Systems In Organizations: An Application Of Work System Theory, Steven Alter

Steven Alter

This paper explains a type of knowledge-supported design thinking related to systems in organizations. It shows how work system theory (WST) provides the basis for the work system method (WSM), various versions of which have been used by many hundreds of MBA and Executive MBA students. Design thinking occurs throughout WSM and is especially prominent at the point where WST/WSM users apply their analysis and develop recommendations for improving an existing work system or creating a new work system. Knowledge support for that design thinking has been provided through the knowledge built into WSM, and can be provided in a …


Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp Jun 2014

Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp

All Faculty Scholarship

When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.

My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …


Designing Emotion Awareness Interface For Group Recommender Systems, Yu Chen, Pearl Pu May 2014

Designing Emotion Awareness Interface For Group Recommender Systems, Yu Chen, Pearl Pu

Faculty Publications, Information Systems & Technology

Group recommender systems help users to find items of interest collaboratively. Support for such collaboration has been mainly provided by interfaces that visualize membership awareness, preference awareness and decision awareness. In this paper, we are interested in investigating the roles of emotion awareness interfaces and how they may enable positive group influence. We first describe the design process behind an emotion annotation tool, which we call CoFeel. We then show that it allows users to annotate and visualize group members' emotions in GroupFun, a group music recommender.


Building Change Readiness Practices For Information Technology Support Staff, Dianna Joseph Perkins May 2014

Building Change Readiness Practices For Information Technology Support Staff, Dianna Joseph Perkins

Dissertations

With the turbulent economic conditions of the healthcare market, organizational leaders are faced with significant factors driving unprecedented change. Healthcare organizations are challenged with reimbursement reductions, high costs, modification of government regulations, and demanding healthcare consumers. Survival for healthcare organizations in this volatile climate requires successful implementation of rapid change. Healthcare leaders recognize a correlation between competitive advantage and the implementation of advanced information technology. Unfortunately, despite the efforts of healthcare leaders, many change initiatives fail. This study explores the effects communication, leadership, and culture strategies have on individual change readiness as perceived by IT support staff in a not-for-profit …


Technology Acceptance In A Mandatory Environment: A Test Of An Integrative Pre-Implementation Model., Mohanned Al-Arabiat Apr 2014

Technology Acceptance In A Mandatory Environment: A Test Of An Integrative Pre-Implementation Model., Mohanned Al-Arabiat

College of Computing and Digital Media Dissertations

Technology acceptance has been studied extensively within the IS discipline. The introduction of the technology acceptance model (TAM) has given researchers the opportunity to produce a vast body of knowledge; however, existing gaps within the technology acceptance literature warrant further investigation of these understudied areas. Namely, few if any have studied end users’ acceptance of newly implemented technologies within organizational contexts before end-users start using the technology. Additionally, leadership is one of the areas that has not yet been sufficiently integrated with the technology acceptance literature. The Leader-Member Exchange (LMX) theory with its roots in the social exchange theory offers …


The Story As A Cultural Transmitter: Applications For Business Education, Carol Blaszczynski, Ph.D. Apr 2014

The Story As A Cultural Transmitter: Applications For Business Education, Carol Blaszczynski, Ph.D.

International Journal for Business Education

Stories assist in transmitting cultural wisdom, including wisdom about the business community. The role of stories in various contexts such as education (including international management), management, and marketing, as well as the job search is explained. The article concludes by presenting instructional activities for business education that develop cultural competence through stories.


2014 Ijbe Front Matter, Tamra Connor Apr 2014

2014 Ijbe Front Matter, Tamra Connor

International Journal for Business Education

  1. Editorial Board
  2. President's Letter
  3. SIEC-ISBE International


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Mar 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Conference Presentations

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


The Adoption And Diffusion Of It Management Innovations: Adaptation, Reinvention, Alternative Designs, And Rhetorical Persuasion, Quang N. Bui Jan 2014

The Adoption And Diffusion Of It Management Innovations: Adaptation, Reinvention, Alternative Designs, And Rhetorical Persuasion, Quang N. Bui

2014

This research examines the adoption and diffusion process of Information Technology (IT) management innovations—ones that focus on the organizing logics and governance of IT activities. IT management innovations are inherently important to organizations as they can dramatically transform the way businesses are organized and operated. However, because those innovations are tacit and composed mostly of abstract ideas, their adoption and diffusion are often plagued by ambiguity and fads, at times best described as "a solution in search of a problem." Against this backdrop, using theories from communication, sociology, Information Systems, and organizational studies, this research focuses on three underexplored aspects …


Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson Jan 2014

Healthcare Information Systems: Opportunities And Challenges, Madison Ngafeeson

Book Sections/Chapters

No abstract provided.


A Quality Approach To Tacit Knowledge Capture: Effective Practice To Achieving Operational Excellence, William G. Dzekashu, Walter R. Mccollum Phd Jan 2014

A Quality Approach To Tacit Knowledge Capture: Effective Practice To Achieving Operational Excellence, William G. Dzekashu, Walter R. Mccollum Phd

International Journal of Applied Management and Technology

Knowledge loss resulting from an aging workforce continues to be a management nightmare that has obliged many organizational leaders to develop strategies aimed at documenting mission-critical knowledge. Yet knowledge captured and stored in repositories continues to lack quality. The purpose of this study was to explore the impact of integrating quality management into the tacit knowledge capture process. Further studies on the effects of personality in the knowledge capture processes could lead to insights on reasons for diminished knowledge quality. From a social perspective, the implementation of a model that encompasses personality and quality management could improve decision-making processes.


Two Stage Procurement Processes With Competitive Suppliers And Uncertain Supplier Quality, Yue Jin, Jennifer K. Ryan, Walter Yund Jan 2014

Two Stage Procurement Processes With Competitive Suppliers And Uncertain Supplier Quality, Yue Jin, Jennifer K. Ryan, Walter Yund

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

This paper considers a sourcing problem faced by a manufacturer who outsources the manufacturing of a product to one of several competing suppliers, whose cost and quality capabilities are unknown. We consider a two-stage sourcing process in which the first stage is the qualification stage, while the second stage is the supplier selection stage. In the first stage, the manufacturer exerts effort to learn about the quality level of each of the suppliers and then must determine the set of qualified suppliers, subject to some tolerance for error. In the second stage, the manufacturer runs a price-only procurement auction, in …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Owner-Manager Separation And The Structure Of It Governance In Small Business, Jeffrey S. Saffer Jan 2014

Owner-Manager Separation And The Structure Of It Governance In Small Business, Jeffrey S. Saffer

Walden Dissertations and Doctoral Studies

Small business owners and small business managers tend to favor different information technology (IT) governance structures. Such differences can lead to ineffective management and control of IT in small businesses. The purpose of this correlational study was to examine the extent and nature of the association between owner-manager separation in small businesses and the structure of IT governance in the businesses. Agency theory formed the theoretical framework of this study. Data were collected using a web-based survey and randomly sampled 3,697 small business owners and managers located in New Jersey and Pennsylvania. Chi-square statistics indicated no significant association between owner-manager …


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …