Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- E-business and e-government (7)
- Proceedings (7)
- E-learning (4)
- Information security (4)
- Information systems (4)
-
- Local government (4)
- Theory and Meta-Theory (4)
- Adoption (3)
- Architectural strategy (3)
- Cyber (3)
- Cyber Operations (3)
- Cyber operations (3)
- Gender (3)
- Innovation (3)
- Internet (3)
- Municipal Councils (3)
- Sequestration (3)
- TQM (3)
- Total Quality Management (3)
- Adaptive Structuration Theory (2)
- Assimilation (2)
- Austerity (2)
- Case study (2)
- Change management (2)
- Collaboration (2)
- Computer Assisted Decision Making (2)
- Computer based nursing documentation (2)
- Computer science (2)
- Cyber Operations in Space (2)
- Cyberwar (2)
- Publication
-
- Associate Professor Linda Dawson (12)
- Pratyush Bharati (8)
- Jan Kallberg (7)
- Saurabh Gupta (6)
- Surendra Sarnikar (5)
-
- C. Jason Woodard (4)
- Dr Khin Win (4)
- Chong W. Kim (3)
- Maurice Dawson (3)
- Steven Alter (3)
- Andrew Sikula, Sr. (2)
- Associate Professor Ghassan Beydoun (2)
- Associate Professor Peter Hyland (2)
- Dr Holly Tootell (2)
- Dr Lam-Son Le (2)
- Humayun Zafar (2)
- Professor Rajeev Sharma (2)
- Roger H. Blake (2)
- Shahriar Akter (2)
- Aileen Koh (1)
- Anna Ujwary-Gil (1)
- Bryan Hosack (1)
- Deepak Kumar Subedi (1)
- Dr Akemi Chatfield (1)
- Dr Deogratias Harorimana (1)
- Dr Glenn Bewsell (1)
- Dr Hoa Dam (1)
- Dr Mark Freeman (1)
- Dr Ping Yu (1)
- Dr. Mutaz M. Al-Debei (1)
Articles 1 - 30 of 95
Full-Text Articles in Business
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Shahriar Akter
Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
Dr Khin Win
This research explores users’ intention to use teleconsultation technology. The study also explores the influence of facilitating conditions on the acceptance of the technology in the health care environment in Malaysia. Further, the study compares the level of user acceptance in two organizational settings: (1) between emergency and non-emergency environment, and (2) between referring and referral hospital. This research presumes on the basis of exploratory and descriptive study engaging a survey of healthcare providers who practice in public hospitals in Malaysia. The study reports a high level of acceptance and acceptable extent of facilitating conditions of teleconsultation technology. Thus, some …
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Dr Khin Win
The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of “Triangulation research method” and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Dr Khin Win
The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
Dr Khin Win
Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
Dr Akemi Chatfield
While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Associate Professor Ghassan Beydoun
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Associate Professor Ghassan Beydoun
Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Dr Glenn Bewsell
This research investigates mechanisms that impact trust and trust as an organising principle at online auctions using data collected from a community website. Qualitative analysis is used to make sense of the data collected and to identify key factors that impact trust and organising for trust. As a result of the discussion, I attempt to explore key factors that impact trust at online auctions and relate the discussion to previous research. This research adds to the understanding of trust theory and online auction trust, and this research can be used by practitioners to better support users and improve the design …
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Dr Ping Yu
This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Dr Holly Tootell
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Dr Holly Tootell
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Professor Rajeev Sharma
Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
Professor Rajeev Sharma
Business analytics involves interpreting organizational data to improve decision-making and to optimise business processes. It has the potential to improve firm performance and increase competitive advantage. Although many case studies have been reported that describe business analytics applications and speculate about how they might contribute to firm performance, there is no clearly articulated and theoretically grounded model in the literature. This paper proposes a theoretical framework for understanding how and why business analytics technology and capabilities can lead to value-creating actions that lead to improved form performance and competitive advantage. We focus particularly on how strategy and maturity impact business …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Chong W. Kim
As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
Dr Lam-Son Le
The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …
Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê
Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê
Dr Lam-Son Le
Business services arguably play a central role in service-based information systems as they would fill in the gap between the technicality of Service-Oriented Architecture and the business processes captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in plain Web services. The representation of business services requires that we view human activity and human-mediated functionality through the lens of computing and systems engineering. We give insights into the modeling of business services and relationships between them. This work sheds light on the analysis, design and reusability of business-aware services that business owners, entrepreneurs and business …
Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland
Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland
Associate Professor Peter Hyland
Many vendors have acclaimed Service Oriented Architecture (SOA) as a better way to design and build enterprise-wide software. While these claims may be true in the private sector, there is scant evidence in the literature for the same success in the public sector. The adoption of SOA as the dominant development paradigm within an organisation often requires significant organisational changes, which are difficult to achieve in the public sector, with its strict hierarchies and departmental independence. Indeed, many government departments are not ready to adopt this new paradigm. However, the literature does not provide a suitable SOA readiness framework for …
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Associate Professor Peter Hyland
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
Professor John Fulcher
Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose
Dr Hoa Dam
The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.
Andrew Sikula, Sr.
As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …
Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula
Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula
Andrew Sikula, Sr.
Do you want to affirmatively continue your and Tom Peters's Search for Excellence? Then practice MBI. A corollary to Ken Blanchard's idea of the One Minute Manager is the concept of Management by Interruptions (MBI). Although we do not want to overly manage the details of work, usually called micro management, we are often called upon as leaders and managers to supply frequent small segments of data and information. Mini management is good; micro management is not.
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
External Knowledge, Territorial Inertia And Local Development: An Exploratory Case Study, Francesca Cabiddu, Daniela Pettinao
External Knowledge, Territorial Inertia And Local Development: An Exploratory Case Study, Francesca Cabiddu, Daniela Pettinao
Francesca Cabiddu
This study examines the relationship between an entrepreneur’s absorptive capacity, the spiral of knowledge and local development. Although a great number of theoretical and empirical studies have pointed out the importance of local networking and informal contacts when spreading knowledge locally, very few of them provide robust evidence on the role of the entrepreneur’s absorptive capacity and external knowledge in local development. This paper tries to explain the reasons why this problem can no longer be ignored and provides a preliminary examination, through an exploratory case study, of the role that the entrepreneur’s absorptive capacity and external knowledge play in …
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Tqm In Small And Medium Scale Manufacturers: Development Of Measurement Instruments, Deepak Subedi, Uday S. Tate, Suneel K. Maheshwari
Deepak Kumar Subedi
The objective of our paper is to identify factors and develop constructs that could be used to develop a conceptual Total Quality Management (TQM) model that is applicable to small and medium scale manufacturers in the United States. The data for this study was collected from a mail survey targeted to managers in the manufacturing plants. Responses were analyzed and factor analysis was used to develop measurement instruments.
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
Jennifer Y Mak
Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.