Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Business

An Investigation Into The Efficacy Of Mind Maps In Software Development Among Individuals And Pairs, Philip L. Bond Dec 2015

An Investigation Into The Efficacy Of Mind Maps In Software Development Among Individuals And Pairs, Philip L. Bond

Information Systems & Operations Management Theses

Software development is a cognitively demanding endeavor in which the creation and exchange of knowledge is paramount. Collaborative development, particularly pair programming, has been more advocated and adopted recently by practitioners. However, empirical studies have not categorically established the efficacy of pairs vis-à-vis individuals in software design contexts. In fact, recent findings suggest that pairs seldom outperform best individuals although they tend to do better than average individuals. Group losses arising from lack of coordination and/or communication could be a plausible explanation for this. The extant literature suggests that Mind Maps have the potential to graphically capture concepts and their …


Data Visualization In Exploratory Data Analysis: An Overview Of Methods And Technologies, Yingsen Mao Dec 2015

Data Visualization In Exploratory Data Analysis: An Overview Of Methods And Technologies, Yingsen Mao

Information Systems & Operations Management Theses

Exploratory data analysis (EDA) refers to an iterative process through which analysts constantly ‘ask questions’ and extract knowledge from data. EDA is becoming more and more important for modern data analysis, such as business analytics and business intelligence, as it greatly relaxes the statistical assumption required by its counterpart—confirmation data analysis (CDA), and involves analysts directly in the data mining process. However, exploratory visual analysis, as the central part of EDA, requires heavy data manipulations and tedious visual specifications, which might impede the EDA process if the analyst has no guidelines to follow. In this paper, we present a framework …


Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid Jun 2015

Knowledge Management: Integrating Social Networking Technologies And A Generative Learning Environment, Priscilla Arling, Mark Chun, B. Mcquaid

Priscilla Arling

Social networking technologies have commanded a lot of recent attention because they have changed the manner in which individuals have traditionally and historically accessed and shared knowledge. Although these technologies provide individuals with the opportunity to access and to utilize a plethora of knowledge created by others, the knowledge still needs to be organized, interpreted, and incorporated by the user in order for it to be useful. This research sought to better understand how social networking technologies can aid a firm's efforts to establish a knowledge management and a generative learning environment. The study closely followed one of the United …


The Effect Of Telework , Priscilla Arling Jun 2015

The Effect Of Telework , Priscilla Arling

Priscilla Arling

No abstract provided.


An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord Mar 2015

An Identification And Evaluation Of Information Security And Assurance Research Outlets, Michael Whitman, Humayun Zafar, Herbert J. Mattord

Humayun Zafar

The purpose of this study is to identify and comparatively assess the quality of information security specific publishing venues. Past studies in information systems and computer science have shown that information security-focused research can be published in mainstream information systems- and computer science-centric periodicals; however no studies to date have been found that specifically compared venues focused primarily on information security. Therefore the results of this study, when combined with assessments of publishing venues from those disciplines, can provide a more comprehensive perspective on publishing opportunities for academic authors in information security. Faculty members seeking research recognition should strive to …