Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Databases and Information Systems

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Dec 2012

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

MIS/OM/DS Faculty Publications

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali Oct 2012

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali

Engineering Management & Systems Engineering Theses & Dissertations

This research explores the role that budget for Information System (IS) and technical expertise of healthcare service provider staff play on the successful leap from a partial to exhaustive implementation of Electronic Health Records (EHR) Systems. Technical expertise in Information Systems might not be easily measurable directly, but there are a number of indicators that could be used as a proxy, such as: Information System (IS) Department Budget, number of IS staff and the extent of technical trainings provided by the IS department to the clinical staff. This research study hypothesizes that quality technical trainings conducted by an IS department …


Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Sep 2012

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

MIS/OM/DS Faculty Publications

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


A Survey Of Schema Matching Research, Roger Blake Aug 2012

A Survey Of Schema Matching Research, Roger Blake

Roger H. Blake

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi May 2012

Effects Of Information Importance And Distribution On Information Exchange In Team Decision Making, Babajide James Osatuyi

Dissertations

Teams in organizations are strategically built with members from domains and experiences so that a wider range of information and options can be pooled. This strategic team structure is based on the assumption that when team members share the information they have, the team as a whole can access a larger pool of information than any one member acting alone, potentially enabling them to make better decisions. However, studies have shown that teams, unlike individuals, sometimes do not effectively share and use the unique information available to them, leading to poorer decisions. Research on information sharing in team decision making …


Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss May 2012

Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss

The African Journal of Information Systems

In this paper, the author contends that if the outsider-researcher involved in Information and Communication Technology for Development really wants to make a difference and honestly address the emancipatory interests of the developing community, social transformation will have to occur on both sides of the “development divide.” This statement implies both an understanding of the researcher’s own ethnocentrism, prejudice, assumptions and inabilities as well as local concerns, needs, expectations and realities. Using critical social theory as a position of inquiry and learning from the enculturation phases of critical ethnographic fieldwork in a deep rural part of South Africa, the paper …


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …


An Examination Of Coordination Among Friends And Strangers From A Coordination Theory Perspective, Christopher D. Wamble Jan 2012

An Examination Of Coordination Among Friends And Strangers From A Coordination Theory Perspective, Christopher D. Wamble

Theses

Within mobile social coordination, there is a field of study known as outeraction, the communicative processes used by people to manage future interactions. It is an important area of research because it identifies how informal interactions support complex collaboration between individuals and groups. Outeraction is primarily conducted through the interpersonal communication channels of texting, instant messaging (IM), face-to-face, and mobile phone or Skype conversations. Currently this area of research in mobile outeraction support systems is weak. It lacks a firm foundation in system building, has very few if any conceptual frameworks, and little empirical knowledge of user requirements and attitudes …


The Information Technology Workforce: A Comparision Of Critical Skills Of Clients And Service Providers, Stephen Hawk, Kate M. Kaiser, Tim Goles, Christine V. Bullen Jan 2012

The Information Technology Workforce: A Comparision Of Critical Skills Of Clients And Service Providers, Stephen Hawk, Kate M. Kaiser, Tim Goles, Christine V. Bullen

Business Faculty Publications

In this article the authors explore similarities and differences in skill needs of IT service providers and the firms that providers service (clients). The results show that providers and clients are more similar than different with regard to desired skills. Client firms emphasize technical skills for new hires more than providers do despite saying that these are the skills they would outsource to providers. The results have implications for organizations’ recruiting and retention, for individuals’ career development, and for educational programs.


Cycles Of Electronic Health Records Adaptation By Physicians: How Do The Positive And Negative Experience With The Ehr System Affect Physicians' Ehr Adaptation Process?, Cherie Noteboom, Dhundy Bastola, Sajda Qureshi Jan 2012

Cycles Of Electronic Health Records Adaptation By Physicians: How Do The Positive And Negative Experience With The Ehr System Affect Physicians' Ehr Adaptation Process?, Cherie Noteboom, Dhundy Bastola, Sajda Qureshi

Faculty Research & Publications

The integration of EHR in IT infrastructures supporting organizations enable improved access and recording of patient data, enhanced ability to make improved decisions, improved quality and reduced errors in patient care. Despite these benefits, there are mixed results as to the use of EHR. The literature suggests that the reasons for the limited use relate to policy, financial and usability considerations, but it does not provide an understanding of reasons for physicians’ limited interaction and adaptation of EHR.

Following an analysis of qualitative data, collected in a case study at a hospital using interviews, this research explains how physicians interact …


Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li Jan 2012

Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li

MIS/OM/DS Faculty Publications

Ancillary Services (AS) in electric power industry are critical to support the transmission of energy from generators to load demands while maintaining reliable operation of transmission systems in accordance with good utility practice. The ancillary services are procured by the independent system operator (ISO) through a process called the market clearing process which can be modeled by the partial equilibrium from the ends of ISO. There are two capacity optimization problems for both Market participants (MP) and Independent System Operator (ISO). For a market participant, the firm needs to determine the capacity allocation plan for various AS to pursue operating …


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh Jan 2012

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

MIS/OM/DS Faculty Publications

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations.

Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …