Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

Design And Evaluation Of A List Gathering Tool In A Web-Based Collaborative Environment, Yuanqiong Wang Aug 2003

Design And Evaluation Of A List Gathering Tool In A Web-Based Collaborative Environment, Yuanqiong Wang

Dissertations

This research focuses on how to build a "list" structure to combine individual items of information into some sort of structure that converts the individual items of information into a structure of knowledge relative to the problem. Software was designed to provide relationships among and comparisons of the contributions in a "list" structure, so that individual members of a group process will be able to understand the contributions of information made by the group as a whole.

A List Gathering Tool was designed and implemented, which is one component in a Web-based Social Decision Support System (SDSS) Toolkit. Then, a …


Design And Evaluation Of A Voting Tool In A Collaborative Environment, Zheng Li Aug 2003

Design And Evaluation Of A Voting Tool In A Collaborative Environment, Zheng Li

Dissertations

This dissertation researchdesigned, implemented, and evaluated a Web-based Dynamic Voting Toolfor small group decision-making in a collaborative environment.

In this dissertation, theliterature on voting tools in current GDSS research is presented. Variousvoting theories and methods are analyzed, and the advantages and weaknessesare compared, so as to gain a better understanding of how to apply thesedifferent voting methods to diverse decision-making situations. A briefoverview of scaling theories is also given, with an emphasis on Thurstone'sLaw.

The basic features of someweb-based voting tool implementations are reviewed along with a discussionof the pros and cons of Intemet voting. A discussion of Human DynamicVoting …


Enemy At The Gate: Threats To Information Security, Michael E. Whitman Aug 2003

Enemy At The Gate: Threats To Information Security, Michael E. Whitman

Faculty and Research Publications

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.


Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng May 2003

Genescene: Biomedical Text And Data Mining, Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Shauna Eggers, Ryan R. Falsey, Kerri L. Kislin, Zan Huang, Jiexun Li, Jie Xu, Daniel M. Mcdonald, Gavin Ng

CGU Faculty Publications and Research

To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. GeneScene provides biomedical researchers with research findings and background relations automatically extracted from text and experimental data. These provide a more detailed overview of the information available. The extracted relations were evaluated by qualified researchers and are precise. A qualitative ongoing evaluation of the current online interface indicates that this method to search the literature is more useful and efficient than keyword based searching.


Cio Lateral Influence Behaviors: Gaining Peers' Commitment To Strategic Information Systems, Harvey Enns, Sid L. Huff, Christopher A. Higgins Mar 2003

Cio Lateral Influence Behaviors: Gaining Peers' Commitment To Strategic Information Systems, Harvey Enns, Sid L. Huff, Christopher A. Higgins

MIS/OM/DS Faculty Publications

In order to develop and bring to fruition strategic information systems (SIS) projects, chief information officers (CIOs) must be able to effectively influence their peers. This research examines the relationship between CIO influence behaviors and the successfulness of influence outcomes, utilizing a revised model initially developed by Yukl (1994). Focused interviews were first conducted with CIOs and their peers to gain insights into the phenomenon. A survey instrument was then developed and distributed to a sample of CIO and peer executive pairs to gather data with which to test a research model. A total of 69 pairs of surveys were …


Research Strategy And Scoping Survey On Spreadsheet Practices, Thomas A. Grossman Jr., O Ozluk Jan 2003

Research Strategy And Scoping Survey On Spreadsheet Practices, Thomas A. Grossman Jr., O Ozluk

Business Analytics and Information Systems

We propose a research strategy for creating and deploying prescriptive recommendations for spreadsheet practice. Empirical data on usage can be used to create a taxonomy of spreadsheet classes. Within each class, existing practices and ideal practices can he combined into proposed best practices for deployment. As a first step we propose a scoping survey to gather non-anecdotal data on spreadsheet usage. The scoping survey will interview people who develop spreadsheets. We will investigate the determinants of spreadsheet importance, identify current industry practices, and document existing standards for creation and use of spreadsheets. The survey will provide insight into user attributes, …


Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell Jan 2003

Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell

Conference papers

Writing research papers presents numerous different challenges, which vary from how to layout the various pages and format the text to what to include in the different sections that make up the paper. In order to clarify these issues this paper sets out guidelines and best practice approaches and demonstrates their use in the style of this paper.


Advances In Mobile Commerce Technologies, Ee Peng Lim, Keng Siau Jan 2003

Advances In Mobile Commerce Technologies, Ee Peng Lim, Keng Siau

Research Collection School Of Computing and Information Systems

No abstract provided.