Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

Editor's Note, Padraig O'Malley Oct 2006

Editor's Note, Padraig O'Malley

New England Journal of Public Policy

The editor's note at the beginning of this journal briefly speaks about each article within. The author touches upon learning, the challenges to an education, the effects of the growth of technology, how world politics interfere with economy, and how employment is affected by technology.


Techonology Usage In The Supply Chain: The Case Of Small 3pls, Pietro Evangelista, Edward Sweeney Jan 2006

Techonology Usage In The Supply Chain: The Case Of Small 3pls, Pietro Evangelista, Edward Sweeney

Articles

Purpose - In today’s supply chain management (SCM) practices, a successful strategy depends
increasingly on the performance of Third Party Logistics (3PL) providers as they play a key
integrative role linking the different supply chain elements more effectively. Information and
Communications Technology (ICT) has become an important element of 3PL competitive
capability as it enables higher levels of supply chain integration. Recent industry developments
have widened the technological gap between large and small 3PLs. This is critical particularly for
those markets populated by a large number of small 3PLs such as the Italian logistics industry. The
purpose of this paper …


Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar Jan 2006

Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar

Journal of International Technology and Information Management

Rapid and effective internationalization has increasingly become important for high-tech companies. Establishing a foreign subsidiary can facilitate effective internationalization for a high-tech company. This study investigates how IT can provide cross-border support to manage international subsidiary operations and makes important theoretical contributions. The research results exhibit how companies can use cross-border IT-support to effectively share and utilize information from the target country environment for international subsidiary operations. This paper also introduces the diffusion of innovations-based conceptual model which deals with various factors that should be taken into account while operating a foreign subsidiary through IT support. The findings are useful …


Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek Jan 2006

Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek

Journal of International Technology and Information Management

The use of various forms of advanced technologies and information solutions are in common place to manage industrial assets today. This is widely seen as the way forward in various industrial sectors owing to range of commercial benefits offered by new technologies and its importance to gain competitive advantage. The objective of this paper is to describe such an ongoing major technology-dependent re- engineering process termed Integrated eOperations in oil and gas exploration and production business in North Sea since 2004-2005, and to highlight the nature of ambitious techno-managerial changes and its critical socio-technical dimensions. The change process focuses on …


Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach Jan 2006

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach

Journal of International Technology and Information Management

Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate …


The Kiosk Culture: Reconciling The Performance Support Paradox In The Postmodern Age Of Machines, Thomas Cavanagh Jan 2006

The Kiosk Culture: Reconciling The Performance Support Paradox In The Postmodern Age Of Machines, Thomas Cavanagh

Electronic Theses and Dissertations

Do you remember the first time you used an Automatic Teller Machine (ATM)? Or a pay-at-the-pump gas station? Or an airline e-ticket kiosk? How did you know what to do? Although you never received any formal instruction in how to interact with the self-service technology, you were likely able to accomplish your task (e.g., withdrawing or depositing money) as successfully as an experienced user. However, not so long ago, to accomplish that same task, you needed the direct mediation of a service professional who had been trained how to use the required complex technology. What has changed? In short, the …


Overcoming Organisational Resistance To Using Wiki Technology For Knowledge Management, Charmaine C. Pfaff, Helen M. Hasan Jan 2006

Overcoming Organisational Resistance To Using Wiki Technology For Knowledge Management, Charmaine C. Pfaff, Helen M. Hasan

Faculty of Commerce - Papers (Archive)

Although Wikis emerged in the public domain more than a decade ago, a number of business organisations are now discovering the advantages of using Wiki technology to manage knowledge. However, there are many who are not convinced about the merits of this relatively new Wiki technology and are not yet prepared to risk its adoption because it exhibits many ideas that have yet to be tested and many issues that have yet to be resolved. This paper studies the merits of using a Wiki for knowledge management. While some cases of corporate adoption of Wiki technology have been reported, cases …


A Collaborative Project Management Approach And A Framework For Its Supporting Systems, Fang Chen, Nicholas C. Romano Jr, Jay F. Nunamaker Jr Jan 2006

A Collaborative Project Management Approach And A Framework For Its Supporting Systems, Fang Chen, Nicholas C. Romano Jr, Jay F. Nunamaker Jr

Journal of International Technology and Information Management

The project management (PM) paradigm has changed during the past decade due to the globalization of business and advancement of information technology (IT). Increasingly, projects involve members from different geographical locations more than at any other time in history. Traditional PM methods may be inadequate to manage distributed projects, and new information systems are needed to support distributed PM. This article provides the rationale for a collaborative PM approach to manage distributed projects and proposes a conceptual framework for the collaborative PM software development. The objective is to present a collaborative PM framework that can guide further research and development …


The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang Jan 2006

Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang

Journal of International Technology and Information Management

The slicing of Silicon wafer is a complex manufacturing process in producing the raw materials for electronic chips and requires the efforts to effectively monitor the stability in production line and ensure the quality for the products composed of different shapes and materials. Human decision failure and other analytical errors are the most common source of management problems in such manufacturing stage. This paper presents a case regarding the silicon wafer manufacturing to examine the response to quality errors. The study has adopted the approach of grey situation decision-making algorithm for problem detection that suggests a technique to attain the …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures