Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Sciences and Quantitative Methods

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 142

Full-Text Articles in Databases and Information Systems

Strategies To Support Survivors Of Corporate Downsizing, Joseph Linton Jan 2017

Strategies To Support Survivors Of Corporate Downsizing, Joseph Linton

Walden Dissertations and Doctoral Studies

Between 2003 and 2011, 1.2 million U.S. workers were laid off every year. Some organizational leaders of information technology/telecommunications organizations lack strategies to improve affective commitment to the organization after downsizing events. The strains of overwork, organizational changes, anxiety over job insecurity, and lack of choice often result in physical illness, emotional trauma, and extreme disengagement termed survivor syndrome. The purpose of this single case study was to explore strategies organizational leaders in the Midwest United States in information technology/telecommunications organizations used to improve affective commitment to the organization after downsizing. The conceptual framework was Herzberg's 2-factor theory. Data were …


The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh Jan 2017

The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh

Walden Dissertations and Doctoral Studies

Global information technology (IT) project management organizations can create more value in their operations by presenting the core competencies possessed by global IT project managers (PMs) who are successful in their respective projects. The purpose of this multiple case study was to explore the core competencies and business strategies that IT PMs use to meet global IT project deadlines and budgets. This study involved 5 IT PMs from the Pacific Northwest (United States and Canada) who increased the quality of outsourced IT projects from 4 different companies. The data collection method included in-person semistructured interviews of participants and review of …


Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo Jan 2017

Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo

Walden Dissertations and Doctoral Studies

According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …


A Complex Systems Simulation Study For Increasing Adaptive-Capacity, Kadambari Ram Jan 2017

A Complex Systems Simulation Study For Increasing Adaptive-Capacity, Kadambari Ram

Walden Dissertations and Doctoral Studies

Examination of empirical research confirmed that climate change is a complex problem of anthropological origin and revealed the need for a management framework to facilitate strategic decisions aimed at mitigating a rise in global temperatures of 2-°C linked to irresponsible and unsustainable business practices. The purpose of this simulation study was to develop a management framework of resilience, robustness, sustainability, and adaptive-capacity (RRSA) for organizations viewed as complex systems to address the current unsustainable state. As such, the evolutionary-RRSA prisoner's dilemma (PD) simulation was developed using an evolutionary game theory approach to agent based modeling and simulation, to generate data. …


The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr Jan 2017

The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr

Walden Dissertations and Doctoral Studies

Most leaders of healthcare delivery organizations have increased their rate of technological innovation, but some still struggle to keep pace with other industries. The problem addressed in this study was that senior leaders in some rural ambulatory healthcare facilities failed to innovate, even with recent healthcare technological innovations, which could lead to increased medical errors and a loss of efficiency. The purpose of the study was to examine if a relationship exists between the avoidance of technology threats by senior leaders in ambulatory healthcare organizations and the innovation propensity of the organization. Technology threat avoidance theory served as the theoretical …


Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier Jan 2017

Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier

Walden Dissertations and Doctoral Studies

The need for clear and organizationally effective communications is necessary to maintain sustainability as competition increases. Current research has not addressed problems associated with senior managers' clarity and intent and the misinterpretation by midlevel managers of that intent, causing division managers to misinterpret the company plans. Unresolved miscommunications may lead to destructive subculture development. This mixed methods design focused on how to minimize the confusion that manifests between senior and midlevel management within diverse and decentralized decision support structures. The secondary purpose was to advocate for the identification of divisional misalignment and provide information for a tool to help senior …


Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain Jan 2017

Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain

Walden Dissertations and Doctoral Studies

Project managers must ensure risk management and business justification for their projects. Approximately, 53% of IT projects failed due to project managers not identifying risks early in the projects' lifecycle. The purpose of this single case study was to explore strategies IT project managers utilize to identify risks early in the project's lifecycle. The study population consisted of 5 lead IT project managers from a telecom company located in the Midwest region of the United States who had managed IT projects. The conceptual framework that grounded this study was the general systems theory. The data collection process involved semistructured interviews, …


Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas Jan 2017

Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas

Walden Dissertations and Doctoral Studies

Millions of dollars have been spent to acquire educational computing tools, and many education, government, and business leaders believe that investing in these computing tools will improve teaching and learning. The purpose of this quantitative study was to determine whether charter school educators face technological barriers hindering them from incorporating technology into their classrooms. If they experienced self-efficacy issues integrating technology in their classrooms and if they believed their students were technologically prepared as 21st century professionals. A 5-point Likert scale survey, validated by a pilot study, was completed by 61 charter high school teachers. Their responses were analyzed, scores …


Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal Jan 2017

Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal

Walden Dissertations and Doctoral Studies

Provisioning Internet services remains an area of concern for Internet service providers. Despite investments to improve resources and technology, the understanding of sociotechnical factors that influence the service-provisioning life cycle remains limited. The purpose of this case study was to evaluate the influence of sociotechnical factors associated with telecom service provisioning and to explore the critical success and failure factors, specifically in the telecommunication industry of Kuwait. Guided by sociotechnical systems theory, this qualitative exploratory case study approach examined a purposeful sample of 19 participants comprising of managers, engineers, and technicians who had the knowledge and experience of the service-provisioning …


Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye Jan 2017

Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye

Walden Dissertations and Doctoral Studies

Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …


The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates Jan 2017

The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates

Walden Dissertations and Doctoral Studies

The international knowledge management field has different ways of investigating, developing, believing, and studying knowledge management. Knowledge management (KM) is distinguished deductively by know-how, and its intangible nature establishes different approaches to KM concepts, practices, and developments. Exploratory research and theoretical principles have formed functional intelligences from 1896 to 2013, leading to a knowledge management knowledge science (KMKS) concept that derived a grounded theory of knowledge activity (KAT). This study addressed the impact of knowledge production problems on KM practice. The purpose of this qualitative meta-analysis study was to fit KM practice within the framework of knowledge science (KS) study. …


Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs Sep 2016

Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs

Mark A. Jacobs

The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …


Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs Sep 2016

Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs

Mark A. Jacobs

Business leaders are concerned about the impacts of increasing levels of product portfolio complexity since many sense that complexity related costs such as order management, procurement, and inventory threaten to undermine operational efficiencies and consume profits. Even so, managers do not fully understand the extent and breadth of the impacts of product portfolio complexity. A more complete understanding of the operational effects of product portfolio complexity is lacking partially because researchers have not yet offered a robust theoretical perspective or studied it in a focused controlled way; until now. Herein, measures of product portfolio complexity are developed and related to …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Paul B. Sweeney

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman Aug 2016

Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman

Michael F. Gorman

We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function. Our results from test cases show with high confidence that current prices are not optimal, as indicated by a …


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman Aug 2016

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

Michael F. Gorman

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt Aug 2016

The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt

Donald Wynn

In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Donald Wynn

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Aug 2016

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

Donald Wynn

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Donald Wynn

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh Aug 2016

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

Harvey Enns

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Harvey Enns

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Harvey Enns

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

William D Salisbury PhD

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Thomas Ferratt

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Thomas Ferratt

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


Effects Of An Integrated Electronic Health Record On An Academic Medical Center, Kenneth E. Koppenhaver Ii Jan 2016

Effects Of An Integrated Electronic Health Record On An Academic Medical Center, Kenneth E. Koppenhaver Ii

Walden Dissertations and Doctoral Studies

The debate about healthcare reform revolves around a triple aim of improving the health of populations, improving the patient experience, and reducing the cost of care. A major tool discussed in this debate has been the adoption of electronic health record (EHR) systems to record and guide care delivery. Due to low adoption rates and limited examples of success, the problem was a lack of understanding by healthcare organizations of how the EHR fundamentally changes an organization through the interactions of people, processes, and technology over time. The purpose of this case study was to explore the people, processes, and …


Evaluating Federal Information Technology Program Success Based On Earned Value Management, Mae Moy Jan 2016

Evaluating Federal Information Technology Program Success Based On Earned Value Management, Mae Moy

Walden Dissertations and Doctoral Studies

Despite the use of earned value management (EVM) techniques to track development progress, federal information (IT) software programs continue to fail by not meeting identified business requirements. The purpose of this logistic regression study was to examine, using IT software data from federal agencies from 2011 to 2014, whether a relationship between schedule variance (SV), cost variance (CV), and actual cost (AC) could predict the success of IT software program, as operationalized by meeting the identified business requirements. The population of interest was 132 IT software programs developed between 2011 and 2014 for federal agencies. The sample source was an …


The Impact Of Transformational Leadership Style On The Success Of Global Virtual Teams, Shery Wojtara-Perry Jan 2016

The Impact Of Transformational Leadership Style On The Success Of Global Virtual Teams, Shery Wojtara-Perry

Walden Dissertations and Doctoral Studies

Organizations in the age of modern technology have a diverse workforce, who are spread around the globe, and the business leaders of the 21st century need to understand how best to manage, overcome new challenges, and know the various skills of team members to capitalize on their differences and unique skills. To allow those geographically dispersed workers to reach their full potential and facilitate team success. Global virtual teams (GVTs) operate in complex environments characterized by diverse cultural and organizational elements. The primary purpose of this correlational and nonexperimental quantitative research was to examine the impact of transformational leadership on …