Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Databases and Information Systems

Predictive Analytics Of Organizational Decisions And The Role Of Rationality, Arash Barfar Nov 2015

Predictive Analytics Of Organizational Decisions And The Role Of Rationality, Arash Barfar

USF Tampa Graduate Theses and Dissertations

How can we predict key decisions made by organizations in the presence of big data and on-demand information? In this dissertation we exploit a large repository of B2B real-time transactional data with service quality indicators and present evidence that organizational decision analytics apply both rational and boundedly-rational (i.e. behavioral) economic models. The dissertation’s findings demonstrate that both utility and heuristic models, respectively, play significant roles in predicting organizational decisions on churn, a key decision in this context. In the presence of a large data set the assumed rationality of organizations appears to provide accurate predictions in uncontrolled experiences and selected …


Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally Nov 2015

Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally

Shubhashree Thekahally 7340504

Web applications provide the information technology (IT) implementation of business and align IT with business. Retirement of IT applications should ensure stability of business and IT alignment. The current study investigated the alignment gaps created between business and IT resulting from retiring IT software applications. The purpose of this study was to identify IT integration points with business and provide a process-based solution that sustained IT alignment with business after retiring IT applications. The theoretical framework strategic alignment model aided in identifying 3 IT domains as the IT integration points with business: enterprise architecture, configuration management database, and service-level agreement. …


Enhancing Manufacturing Planning And Control Systems Through Artificial Intelligence Techniques, Ronald S. Dattero, John J. Kanet, Edna M. White Sep 2015

Enhancing Manufacturing Planning And Control Systems Through Artificial Intelligence Techniques, Ronald S. Dattero, John J. Kanet, Edna M. White

John J. Kanet

Manufacturing planning and control systems are currently dominated by systems based upon Material Requirements Planning (MRP). MRP systems have a number of fundamental flaws. A potential alternative to MRP systems is suggested after research into the economic batch scheduling problem. Based on the ideas of economic batch scheduling, and enhanced through artificial intelligence techniques, an alternative approach to manufacturing planning and control is developed. A framework for future research on this alternative to MRP is presented.


Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet Sep 2015

Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet

John J. Kanet

This chapter begins with a description of the role of production planning and control (PPC) within the manufacturing function. After discussing the impact of the operating environment on the choice a system for PPC, we describe some recent empirical evidence regarding the use and performance results of various PPC systems. This is followed by a brief overview of the two most widely used systems for production planning and control. We then describe a recent development in the area of short-term detailed scheduling exploiting the latest developments in computing technology. The chapter concludes with a discussion of an emerging paradigm for …


Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman Sep 2015

Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman

Michael F. Gorman

This article describes the service design activities that plan and implement the rail freight operating plan. Elements of strategic service design include the setting of train frequency, the routing of cars among trains, and the consolidation of cars, called blocking. At the operational level, trains are dispatched either according to train paths configured in advance, called timetables, or according to priority rules. We describe the North American and European practice along with selected modeling and problem solving methodologies appropriate for each of the operating conditions described.


Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod Sep 2015

Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod

Michael F. Gorman

This article describes operations research methodologies as they apply to asset management in freight rail. We describe state-of-the-art methods for locomotive, crew, rail-car, line and yard planning and management. We conclude with emerging areas of research in rail.


Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang Sep 2015

Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang

Lance (Lijian) Chen

The authors of this paper outline a capacity planning problem in which a risk-averse firm reserves capacities with potential suppliers that are located in multiple low-cost countries. While demand is uncertain, the firm also faces multi-country foreign currency exposures. This study develops a mean-variance model that maximizes the firm’s optimal utility and derives optimal utility and optimal decisions in capacity and financial hedging size. The authors show that when demand and exchange rate risks are perfectly correlated, a risk- averse firm, by using financial hedging, will achieve the same optimal utility as a risk-neutral firm. In this paper as well, …


A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan Sep 2015

A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan

Lance (Lijian) Chen

We solve the chance constrained optimization with convex feasible set through approximating the chance constraint by another convex smooth function. The approximation is based on the numerical properties of the Bernstein polynomial that is capable of effectively controlling the approximation error for both function value and gradient. Thus, we adopt a first-order algorithm to reach a satisfactory solution which is expected to be optimal. When the explicit expression of joint distribution is not available, we then use Monte Carlo approach to numerically evaluate the chance constraint to obtain an optimal solution by probability. Numerical results for known problem instances are …


Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello Sep 2015

Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello

Lance (Lijian) Chen

We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model proposed in the literature. The approach we study consists of solving a sequence of two-stage stochastic programs with simple recourse, which can be viewed as an approximation to a multi-stage stochastic programming formulation to the seat allocation problem. Our theoretical results show that the proposed approximation is robust, in the sense that solving more successive two-stage programs can never worsen the expected revenue obtained with the corresponding allocation policy. Although intuitive, such a property is known not …


Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li Sep 2015

Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li

Lance (Lijian) Chen

Ancillary Services (AS) in electric power industry are critical to support the transmission of energy from generators to load demands while maintaining reliable operation of transmission systems in accordance with good utility practice. The ancillary services are procured by the independent system operator (ISO) through a process called the market clearing process which can be modeled by the partial equilibrium from the ends of ISO. There are two capacity optimization problems for both Market participants (MP) and Independent System Operator (ISO). For a market participant, the firm needs to determine the capacity allocation plan for various AS to pursue operating …


Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander Sep 2015

Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander

Lance (Lijian) Chen

We propose a capacity driven pricing mechanism for several service industries in which the customer behavior, the price demand relationship, and the competition are significantly distinct from other industries. According our observation, we found that the price demand relationship in these industries cannot be modeled by fitted curves; the customers would neither plan in advance nor purchase the service strategically; and the competition would be largely local. We analyze both risk neutral and risk aversion pricing models and conclude the proposed capacity driven model would be the optimal solution under mild assumptions. The resulting pricing mechanism has been implemented at …


Information Technology & Sustainability: An Empirical Study Of The Value Of The Building Automation System, Daphne Marie Simmonds Sep 2015

Information Technology & Sustainability: An Empirical Study Of The Value Of The Building Automation System, Daphne Marie Simmonds

USF Tampa Graduate Theses and Dissertations

This study examines the environmental and economic effects of green information technology (IT). Green IT describes two sets of IT innovations: one set includes innovations that are implemented to reduce the environmental impact of IT services in organizations; and the other IT to reduce the environmental impact of other organizational processes. The two sets respond to the call for more environmentally friendly or “greener” organizational processes.

I developed and tested a preliminary model. The model applied the resource based view (RBV) of the firm (Wernerfelt 1984) the stakeholder theory (Freeman 1984) and included four constructs: (1) BAS implementation; environmental …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Mar 2015

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

MIS/OM/DS Faculty Publications

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan Feb 2015

A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan

MIS/OM/DS Faculty Publications

We solve the chance constrained optimization with convex feasible set through approximating the chance constraint by another convex smooth function. The approximation is based on the numerical properties of the Bernstein polynomial that is capable of effectively controlling the approximation error for both function value and gradient. Thus, we adopt a first-order algorithm to reach a satisfactory solution which is expected to be optimal. When the explicit expression of joint distribution is not available, we then use Monte Carlo approach to numerically evaluate the chance constraint to obtain an optimal solution by probability. Numerical results for known problem instances are …


Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole Jan 2015

Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole

Walden Dissertations and Doctoral Studies

Information assurance (IA) projects are essential components of the information technology industry and often fail due to budget overruns, missed deadlines, and lack of performance by the project teams. The purpose of this phenomenological study was to explore the strategies necessary to improve IA project team performance. Lewin's situational leadership theory was used as the conceptual framework for this study. Interviews were conducted with 20 IA professionals located in the Washington, DC Metropolitan area. The data were transcribed, coded, and clustered for the identification of common patterns based on the Moustakas' modified van Kaam analysis. The major themes that emerged …


An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden Jan 2015

An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden

CCE Theses and Dissertations

Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …


The Value Of Diagnostic Software And Doctors' Decision Making, Babatunde Ayodele Alaofin Jan 2015

The Value Of Diagnostic Software And Doctors' Decision Making, Babatunde Ayodele Alaofin

Walden Dissertations and Doctoral Studies

The prevalence of medical misdiagnosis has remained high despite the adoption of diagnostic software. This ongoing controversy about the role of technology in mitigating the problem of misdiagnosis centers on the question of whether diagnostic software does reduce the incidence of misdiagnosis if properly relied upon by physicians. The purpose of this quantitative, cross-sectional study based on planned behavior theory was to measure doctors' opinions of diagnostic technology's medical utility. Recruitment e-mails were sent to 3,100 AMA-accredited physicians through their database that yielded a sample of 99 physicians for the study. One-sample t tests and, where appropriate because of non-normal …


The Relationship Between Information Technology And Organizational Effectiveness As Perceived By Health Care Providers, Christian Chikwem Ukaga Jan 2015

The Relationship Between Information Technology And Organizational Effectiveness As Perceived By Health Care Providers, Christian Chikwem Ukaga

Walden Dissertations and Doctoral Studies

The U.S. Congress has made health information technology a central component of the national quest to improve health care delivery. The problem addressed in this study was the uncertainty among healthcare providers regarding the benefits of health care information technology adoption relative to healthcare delivery processes and outcomes. The purpose of the study was to understand the effectiveness of information technology as perceived by healthcare providers. The research questions were designed to investigate the relationship between health information technology and organizational effectiveness, exchange of information, organizational process, organizational productivity, and direct personal care. Sociotechnical systems theory and Donabedian's framework for …


Financial Performance Outcomes Following System Replacement In The Insurance Industry, Trevor James Owen Jan 2015

Financial Performance Outcomes Following System Replacement In The Insurance Industry, Trevor James Owen

Walden Dissertations and Doctoral Studies

Enterprise system replacement projects within the property and casualty insurance industry are costly, high-risk undertakings that carry a significant risk of project failure. The decision to replace policy administration systems for companies with over $250 million in direct written premium is a multimillion dollar investment for corporate strategic decision makers. This study examined the financial impact of enterprise policy administration system replacement in the property and casualty insurance industry by comparing financial performance results for companies that performed policy administration system replacements with those that did not. Insurance industry financial results for the years 2009 through 2014 were used for …


Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou Jan 2015

Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou

CCE Theses and Dissertations

An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …


Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles Jan 2015

Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles

Walden Dissertations and Doctoral Studies

The problem addressed in this study was the lack of understanding about failures of government leadership in accomplishing complex information technology (IT) projects and the ways such failures can negatively affect organizational performance. The purpose was to query subject matter experts and leaders with the intent to identify methods to reduce complex IT project failure rates in government organizations. This qualitative study drew on the technology acceptance model and the capability maturity model integration framework to evaluate organizations' abilities to manage complex IT projects. The research questions focused on exploring senior managers' experiences, the tacit knowledge of project management methodologies, …


Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones Jan 2015

Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones

Walden Dissertations and Doctoral Studies

Management professionals at many colleges are transitioning to new learning management systems (LMS), such as Moodle, for reasons such as lower costs, greater outreach, and student preference. Transitioning to a new LMS may result in faculty problems with learning a new technology platform in addition to teaching. The purpose of this study was to explore the impact that an LMS transition had on faculty attitudes, experiences, and workload. The conceptual framework of the study was the unified theory of acceptance and use of technology and the diffusion of innovation theory. A phenomenological design was employed with a purposeful sample of …


Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin Jan 2015

Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin

Walden Dissertations and Doctoral Studies

The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …


An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins Jan 2015

An Exploration Of Wireless Networking And The Management Of Associated Security Risk, Helen Loretta Collins

Walden Dissertations and Doctoral Studies

The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded …


A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire Jan 2015

A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire

Walden Dissertations and Doctoral Studies

Cross-border information technology (IT) outsourcing continues to rise due to the demand for business process outsourcing. Issues such as miscommunication and management problems have emerged because of cross-cultural disparities between clients and vendors across national borders. The theoretical framework of this study was based on the organizational culture model studies of Meek, Spradley, Smith, and Draft for examining and understanding complex organizational practices. The purpose of this mixed-methods explanatory sequential case study was to qualitatively identify and quantitatively determine the management approaches that are effective in managing cross-cultural differences and the constitution of the elements of global adjustment, motivation, mindset, …


Impact Of Eu Medical Device Directive On Medical Device Software, Guy Foe Owono Jan 2015

Impact Of Eu Medical Device Directive On Medical Device Software, Guy Foe Owono

Walden Dissertations and Doctoral Studies

Directive 2007/47/EC of the European Parliament amending Medical Device Directive (MDD) provides medical device manufacturers with a compliance framework. However, the effects of the amendments to the MDD on competition in the U.S. medical device software industry are unknown. This study examined the impact of this directive on the competitiveness of U.S. medical device software companies, the safety and efficacy of medical device software, employee training, and recruitment. The conceptual framework for this study included 3 dimensions of medical device regulations: safety, performance, and reliability. The overall research design was a concurrent mixed method study using both quantitative and qualitative …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …


Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel Jan 2015

Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel

Walden Dissertations and Doctoral Studies

Reports from academic, commercial, and government organizations have documented software-intensive system cost and schedule overruns for decades. These reports have identified lack of management insight into the software development process as one of many contributing factors. Multiple management mechanisms exist. However, these mechanisms do not support the assessment, and subsequent reporting, of software completion status. Additionally, the conceptual framework, based on industry standards, is limited in its relevance to this study due to an emphasis on what is needed while deferring implementation details. The purpose of this phenomenological study was to explore U.S. government contractors' lived experiences of assessing and …


Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas Jan 2015

Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas

Walden Dissertations and Doctoral Studies

In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …