Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Business

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Status Von Hybrid Mail, Jacob Johnsen Nov 2011

Status Von Hybrid Mail, Jacob Johnsen

Jacob Johnsen, MSc

Einführung im Hybrid Mail status und wie Hybrid Mail ist die logische Antwort auf viele der Herausforderungen denen sich Unternehmen stellen müssen.


On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose Nov 2011

On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose

Professor Aditya K. Ghose

The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …


Estimation Of The Evacuation Time In An Emergency Situation In Hospitals, Davood Golmohammadi, Daniel Shimshak Oct 2011

Estimation Of The Evacuation Time In An Emergency Situation In Hospitals, Davood Golmohammadi, Daniel Shimshak

Davood Golmohammadi

In this paper, a prediction model is presented that estimates the evacuation time in an emergency situation for hospitals. The model is generic enough to be used in various hospital settings. This model can provide incident managers with estimates of the evacuation times of different types of patients and can offer support to the managers with their resource allocation decisions in emergency situations. The major advantage of the prediction model is that the computation time is very short and the model does not need a lengthy and costly design. The model was applied for several different evacuation scenarios and the …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Environmental Impact Of Hybrid Mail, Jacob Johnsen Sep 2011

Environmental Impact Of Hybrid Mail, Jacob Johnsen

Jacob Johnsen, MSc

A review of hybrid mail with emphasis on the environmental aspects


Information Systems Project Abandonment: A Stakeholder Analysis, Gary Shan Chi Pan Sep 2011

Information Systems Project Abandonment: A Stakeholder Analysis, Gary Shan Chi Pan

Gary PAN

This case study reports on the experience of an organization in Singapore in implementing and eventually abandoning an electronic procurement project. By means of a stakeholder analysis, it examines stakeholders’ roles in the organization's decision to abandon the software project. This study uses Freeman's stakeholder analytical framework (Freeman, R. (1984). Strategic management: a stakeholder approach. Massachusetts: Pitman) to interpret data and develop four major findings. By providing a better understanding of project stakeholders’ perceptions, expectations and interrelationships during project development, this study presents researchers with a project abandonment evaluation framework that is enhanced with a stakeholder perspective. The lessons learned …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan Sep 2011

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan

Gary PAN

We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …


Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan Sep 2011

Transition To Is Project De-Escalation: An Exploration Into Management Executive's Influence Tactics, Gary Shan Chi Pan, Shan Ling Pan

Gary PAN

This paper seeks to understand the factors that shape management executives' influence behaviors and the influence tactics that may be utilized during de-escalation of commitment to information systems (IS) projects. De-escalation is potentially a more important issue than escalation because de-escalation provides remedies for the ills of escalation. Therefore, it is important to understand how project stakeholders' commitment to troubled IS projects may be transformed under management executives' influence, hence allowing project teams to carry out their de-escalation activities. Here, we adopt theories of leadership, politics, and interpersonal influence, as our lenses to examine the management executive's influence behaviors during …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn Sep 2011

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn

Gary PAN

This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


The Roles, Responsibilities And Practices Of Project Portfolio Manager In Australia: A Qualitative Study, Aileen Koh Jul 2011

The Roles, Responsibilities And Practices Of Project Portfolio Manager In Australia: A Qualitative Study, Aileen Koh

Aileen Koh

The increasing use of project and programs by organizations in Australia to achieve business strategy has led to the need to understand project portfolio management . In this study, project portfolio management is referred as portfolio management and it is recognised as one discipline within organizational governance and capability. To investigate the governance structures and the roles, responsibilities and practices of portfolio managers, a sequential mixed method approach under a realism paradigm is used. This paper presents the first stage qualitative study, using an inductive interview based approach with six portfolio managers for six organizations in Australia. The results from …


Playing Leapfrog, Jacob Johnsen May 2011

Playing Leapfrog, Jacob Johnsen

Jacob Johnsen, MSc

Several developing countries have used the introduction of hybrid mail to leapfrog evolution and are using the service to improve speed, quality, security and postal offering. Jacob Johnsen looks at this extraordinary phenomenon.


A Survey Of Data Warehousing Success Issues, Hongjiang Xu, Mark I. Hwang May 2011

A Survey Of Data Warehousing Success Issues, Hongjiang Xu, Mark I. Hwang

Hongjiang Xu

Data warehousing is an important area of practice and research, yet few studies have assessed its practices in general and critical success factors in particular. Although many guidelines for implementation exist, most are derived from anecdotal evidence. A survey of data warehousing professionals was conducted to gain insight into data warehousing success issues. The results reveal that data warehousing success is a multi-faceted construct and that improved productivity is the most valued measure for success. The results also put clearly defined business needs/benefits and source data quality at the top of the list of critical success factors. In addition, different …


The Importance Of Data Quality For Sap Implementation In Medium-Sized Organizations, Hongjiang Xu Apr 2011

The Importance Of Data Quality For Sap Implementation In Medium-Sized Organizations, Hongjiang Xu

Hongjiang Xu

Data quality issues are critical for any type ofinformation systems. The purpose of this study is toexplore the importance of data quality for SAPimplementation. This study involved a case study of amedium-sized organization that had implementedSAP R3 as their ERP system. Knowledge gained fromthis study has the potential in assisting medium-sizedorganizations to enhance the quality of the data usedin their ERP systems.


Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang Apr 2011

Consumers’ Attitudes Of E-Commerce In China, Hongjiang Xu, Xiaowen Zou, Hengshan Wang

Hongjiang Xu

This research studied the problem of B2C and C2Cconsumers’ attitudes towards trust of the businesstransaction process in China by using the“Consumer Attitudes towards Trust in the e-Business Model.” Four factors in the model wereanalyzed, privacy, security, financial institution andtrusted seal. From this analysis, the conclusion onthe consumers’ attitudes was drawn.


Information Security In The Caribbean Banks, Hongjiang Xu, Pierre Bowrin Apr 2011

Information Security In The Caribbean Banks, Hongjiang Xu, Pierre Bowrin

Hongjiang Xu

Information security is a crucial issue for organizations, especially for banking and financial institutions. However, not many studies have considered the perspectives of end users in developing countries’ banking industry, for which the challenges of competing globally are greater due to a lack of technical, human and financial resources. Therefore, this study examines how end users of local, regional, and international banks in St. Kitts (a Caribbean country)perceive information security. The study will provide financial institutions in developing countries with more efficient security measures that would facilitate their success in the global community.


The Importance Of Data Quality For Sap Implementation In Medium-Sized Organizations, Hongjiang Xu Apr 2011

The Importance Of Data Quality For Sap Implementation In Medium-Sized Organizations, Hongjiang Xu

Hongjiang Xu

Data quality issues are critical for any type ofinformation systems. The purpose of this study is toexplore the importance of data quality for SAPimplementation. This study involved a case study of amedium-sized organization that had implementedSAP R3 as their ERP system. Knowledge gained fromthis study has the potential in assisting medium-sizedorganizations to enhance the quality of the data usedin their ERP systems.


A Structural Model Of Data Warehousing Success, Hongjiang Xu, Mark I. Hwang Mar 2011

A Structural Model Of Data Warehousing Success, Hongjiang Xu, Mark I. Hwang

Hongjiang Xu

Data warehousing is an important area of practice and research, yet few studies have assessed its practices in general and critical success factors in particular. Although plenty of guidelines for implementation exist, few have been subjected to empirical testing. Furthermore, no model is available for comparing and evaluating the various claims made in different studies. In order to better understand the critical success factors and their effects on data warehousing success, a research model is developed in this paper. This model is useful for comparing findings across studies and for selecting variables for future research. The model is tested using …


The Effect Of Implementation Factors On Data Warehousing Success: An Exploratory Study, Hongjiang Xu, Mark I. Hwang Mar 2011

The Effect Of Implementation Factors On Data Warehousing Success: An Exploratory Study, Hongjiang Xu, Mark I. Hwang

Hongjiang Xu

Data warehousing is an important area of practice and research, yet few studies have assessed its practices in general and critical success factors in particular. Although plenty of guidelines for implementation exist, few have been subjected to empirical testing. In order to better understandimplementation factors and their effect on data warehousing success, perceptions of data warehousing professionals are examined in a cross sectional survey. Best subsets regression is used to identify the specific factors that are important to each success variable. Since different companies may have different objectives or emphases in their data warehousing endeavors, the results are useful in …


Issues In The Development Of Location Privacy Theory, Robert Minch Feb 2011

Issues In The Development Of Location Privacy Theory, Robert Minch

Robert P. Minch

Issues in the development of location privacy theory are identified and organized based on both technological considerations and more general privacy theories. Three broad categories containing six issues are described: location (including sensing methods and location properties), privacy (including definition and subject identification), and information flows (from location information acquisition through storage, use, and sharing). An influence diagram model is presented which relates these issues in context and may serve as a basis for further theory development, empirical research, and public policy discussion.


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Achieving Supply Chain Integration Using Rfid Technology: The Case Of Emerging Intelligent B-To-B E-Commerce Processes In A Living Laboratory, S. Fosso Wamba Dec 2010

Achieving Supply Chain Integration Using Rfid Technology: The Case Of Emerging Intelligent B-To-B E-Commerce Processes In A Living Laboratory, S. Fosso Wamba

Dr Samuel Fosso Wamba

Purpose: Despite the high operational and strategic potentials of RFID technology, very little studies have been conducted about its role as enabler of supply chain integration to achieve high-level operational efficiency. Therefore, this study is an initial effort towards bridging the existing knowledge gap in the literature. Design/methodology: This exploratory research was conducted in one retail supply chain. A multi-method approach combining a longitudinal real-life case study and a methodology integrating several steps, including a “Living Laboratory” strategy was used and involved all members of a product line to analyze in terms of their contributing activities and their interface with …


A Semantic Analysis Approach For Assessing Professionalism Using Free-Form Text Entered Online, Roger H. Blake Dec 2010

A Semantic Analysis Approach For Assessing Professionalism Using Free-Form Text Entered Online, Roger H. Blake

Roger H. Blake

This paper presents the results of an experimental study to measure professionalism for the purpose of assessing a professional development program. Soft skills such as professionalism are increasingly recognized as important, yet measuring and assessing these skills, typically best acquired experientially, has remained challenging. Following established research, we conceptualize professionalism as a construct with the dimensions of autonomy, commitment, belief in public service, self-regulation, and the use of a professional organization as a major referent. We demonstrate how these dimensions can be expressed and the professionalism of free-form text responses measured. These responses are reflections submitted online by participants in …


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim Dec 2010

Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim

Maurice Dawson

This article proposes a framework to create effective transitional leadership in the defence and aerospace industry. The proposed framework identifies and maps traits and skills of military personnel in a manner that can be tested and validated in accordance with principles of human resource management. Applying this framework would assist hiring managers in their selection of program or project managers from the military in transition to a defence contractor support organisation. Employing a research approach embracing a mix of both qualitative and quantitative strategies, the study examined more than 50 respondents to a 34-question survey, focusing on 14 respondents who …


Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson Dec 2010

Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson

Maurice Dawson

This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …


Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert Dec 2010

Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert

William A. Herbert

The popularity of email, blogging and social networking raises important issues for employers, employees and labor unions. This article will explore contemporary workplace issues resulting from the related social phenomena of electronic exhibitionism and voyeurism. It will begin with a discussion of the international social phenomenon of individuals electronically distributing their personal thoughts, opinions, and activities to a potential worldwide audience while at the same time retaining a subjective sense of privacy. The temptation toward such exhibitionism has been substantially enhanced by the advent of Web 2.0. The article then turns to the legal implications of electronic voyeurism including employer …