Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Business

Predicting Patients’ Use Of Provider-Delivered E-Health: The Role Of Facilitating Conditions, E. Vance Wilson, Nancy K. Lankton Oct 2014

Predicting Patients’ Use Of Provider-Delivered E-Health: The Role Of Facilitating Conditions, E. Vance Wilson, Nancy K. Lankton

Nancy K. Lankton

This chapter presents a new rational-objective (R-O) model of e-health use that accounts for effects of facilitating conditions as well as patients’ behavioral intention. An online questionnaire measured patients’ behavioral intention to use a new e-health application as well as proxy measures of facilitating conditions that assess prior use of and structural need for health services. A second questionnaire administered three months later collected patients’ self-reported use of e-health during the intervening period. The new model increased predictions of patients’ e-health use (measured in R2) by more than 300% over predictions based upon behavioral intention alone, and all measured factors …


Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R.T. Larsen Oct 2014

Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R.T. Larsen

Kai R.T. Larsen

Developing explanations of observed phenomenon is one of the major functions of research in Information Systems (IS). But what is an explanation? What types of explanation can IS research provide and what do they mean? The objectives of this research are to develop a shared language, to increase understanding of the meaning of research results and to stimulate discussion of explanation in Information Systems research. Four years of articles published in two top-ranked IS journals over a period of ten years were sampled based on four explanation types defined in modern philosophy: covering-law, statistical-relevance, pragmatic and functional. Explanation types, sub …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer Aug 2014

How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer

Arnoud DE MEYER

The large majority of modern production companies have at their disposal a multitude of computer systems. The immediate challenge for these companies consists of integrating these computer systems and databases. How will one arrive at this integration? On the basis of a questionnaire administered in 1985, 1986 and 1987 among a group of large European manufacturers, one comes to the conclusion that this integration is one of the immediate priorities for this group of companies. They do not intend to implement turnkey systems. but instead will integrate the different databases and computer systems gradually. One can see emerging islands of …


The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka Aug 2014

The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka

Adriane B. Randolph

Due to the increased availability of both neuroscience methods and theories, Information Systems (IS) scholars have begun to investigate the potential of neuroscience for IS research. This new field of research is referred to as NeuroIS. Moreover, large technology companies (e.g., Microsoft and Philips) started research programs to evaluate the potential of neuroscience for their business. The application of neuroscientific approaches is also expected to significantly contribute to advancements in human-computer interaction (HCI) research. Against this background, a panel debate is organized to discuss the potential of neuroscience for HCI studies. The panel hosts an intellectual debate from different perspectives, …


User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph Aug 2014

User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph

Adriane B. Randolph

The loss of communication is one of the most profound disabilities a human being can experience, inhibiting social contact and complicating medical and personal care. Locked-in patients are paralyzed and unable to speak, but cognitively intact. Developments in biometric technology provide non-muscular channels of control and provide opportunities to restore some communication for people with little or no muscle movement. Although these biometric devices have been effective, the input rate is very slow for the requirements of interactive communication. Prediction techniques increase the speed of communication in assistive technology. However, the user’s context (time of day, location, presence of conversational …


Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson Aug 2014

Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson

Adriane B. Randolph

Individuals suffering from locked-in syndrome are completely paralyzed and unable to speak but otherwise cognitively intact. Traditional assistive technology is ineffective for this population of users due to the physical nature of input devices. Brain-computer and biometric interfaces offer users with severe motor disabilities a non-muscular input channel for communication and control, but require that users be able to harness their appropriate electrophysiological responses for effective use of the interface. There is currently no formalized process for determining a user’s aptitude for control of various biometric interfaces without testing on an actual system. This study presents how basic information captured …


Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya Jul 2014

Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya

Monica Adya

Studies of human decision making have demonstrated that stress exacerbates risk taking. Since all decisions involve some element of risk, stress has critical impact on decision quality. Decisions are found to improve with stress up to an optimal threshold beyond which deterioration is observed. However, few studies have examined the psychological experiences underlying risk-taking behavior in conjunction with stress creators. In this paper we propose a research framework that integrates pre-conditions of stress (perceptions of high gain/loss, risk, complexity, and organizational pressure) with observed psychological experiences (time pressure, uncertainty, information overload, and dynamism) that potentially result in risky decision making. …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Alberto Coustasse, DrPH, MD, MBA, MPH

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Andrew Sikula, Sr.

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Doohee Lee

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2014

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong Jun 2014

Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong

Madison Ngafeeson

In a digital era where Information and Communication Technologies (ICT) play a pivotal role in driving forward the competitiveness of nations, it is imperative to understand the factors influncing the successful diffusion and deployment of this resource. ICT has become a global resource influncing the competitiveness of not only companies, but also nations. Previous research discussed the factors \ influncing ICT effectiveness and networked readiness; nevertheless, the impact of a country´s secure communications, competitiveness, and ICT laws on global IT effectiveness has yet to be addressed. Using country-level data generated by World Bank, World Economic Forum, and UNDP, this study …


The Impacts Of Personality Traits And Goal Commitment On Employees' Job Satisfaction, Wai Kwan (Elaine) Lau Jun 2014

The Impacts Of Personality Traits And Goal Commitment On Employees' Job Satisfaction, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

The present research investigates the effects of personality traits, such as self-efficacy and locus of control, on job satisfaction. It also examines the mediating impact of goal commitment on relationships between personality and job satisfaction. The results indicate that both self-efficacy and locus of control are positively associated with goal commitment. In addition, locus of control is found positively related to job satisfaction. However, self-efficacy does not have the same positive relationship with job satisfaction. The study further confirms the mediating effect of goal commitment on relationships between personality traits and job satisfaction.


The Effects Of Leadership Style On Employee’S Perception Of Justice: The Role Of Employee’S Participation, Wai Kwan (Elaine) Lau Jun 2014

The Effects Of Leadership Style On Employee’S Perception Of Justice: The Role Of Employee’S Participation, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

The present research examines the effect of leadership style (classical, transactional, transformational, and dynamic) and employee’s participation on employee’s perception of justice (distributive, procedural, and interactional justice). It is proposed that different leadership styles are expected to display different effects on employee’s participation and perceptions of justice. Moreover, employee’s participation in decision making process is predicated to positively influence his/her perception of justice.


Quantitative Analysis Of Impacts Of Employee Engagement On Continuance And Normative Commitment, Daniel A. Cernas Ortiz, Hong Qin, Wai Kwan (Elaine) Lau Jun 2014

Quantitative Analysis Of Impacts Of Employee Engagement On Continuance And Normative Commitment, Daniel A. Cernas Ortiz, Hong Qin, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

A positive relationship between employee engagement and affective commitment is already documented in the literature. However, we do not adequately know how engagement is associated with continuance and normative commitment. Using survey methodology we find that while engagement has a non–significant positive association with continuance commitment; it has a positive association with normative commitment. No negative association was found between engagement and continuance commitment. These results advance prior findings about the effect of employee engagement on different types of commitment and provide understandings in setting effective performance standards in the organization.


Factors Influence On Success Mass Customization, Wai Kwan (Elaine) Lau Jun 2014

Factors Influence On Success Mass Customization, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

This paper summarizes the common elements of mass customization (MC). It argues that MC should be viewed as a manufacturing management system that synergizes and integrates all the elements. Then, three factors, customer, technology, and organizational factors are identified. The moderating effects between implemented MC and improved performance are discussed.


Retail Internationalization: Jc Penney’S Global Expansion, Wai Kwan (Elaine) Lau Jun 2014

Retail Internationalization: Jc Penney’S Global Expansion, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

In apparel industry, as domestic markets become overstored and/or mature, retailers consider international market involvement as a strategy for growth. Retailers have been successful in expansions to some countries, but not in others. This paper analyzes and evaluates JC Penney’s positioning and retailing strategies in domestic market, international expansion strategies, and factors such as culture influences on its international expansion strategies. This study presents a prototype for other retailers to follow when looking inside and outside national borders for expansion opportunities.


Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau Jun 2014

Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

The present research investigates the effects of personality traits, self-efficacy and locus of control, on job satisfaction. It also examines the mediating impact of goal commitment on relationships between personality and job satisfaction. The results indicate that self-efficacy and locus of control are positively related to goal commitment. Goal commitment is positively associated with job satisfaction. In addition, locus of control is fund positively related to job satisfaction while self-efficacy does not have such relationship with job satisfaction.


The Effect Of Employee Engagement On Continuance And Normative Commitment To The Organization, Wai Kwan (Elaine) Lau Jun 2014

The Effect Of Employee Engagement On Continuance And Normative Commitment To The Organization, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

A positive relationship between employee engagement and affective commitment is already documented in the literature. However, we do not adequately know how engagement is associated with continuance and normative commitment. Using survey methodology we find that while engagement has a non-significant positive association with continuance commitment, it has a positive association with normative commitment. No negative association was found between engagement and continuance commitment. This study’s results support recent critiques to Allen and Meyer’s three-dimensional model of organizational commitment.


Developing And Implementing Information Security Programs: Amcis 2005 Workshop Proposal, Michael E. Whitman, Herbert J. Mattord May 2014

Developing And Implementing Information Security Programs: Amcis 2005 Workshop Proposal, Michael E. Whitman, Herbert J. Mattord

Herbert J. Mattord

One of the continuing challenges facing industry is the security and protection of information. Advances in information security have been unable to keep pace with advances in computing in general. One of the recognized ways to combat the threat to information security is education needed to prepare students to create a secure and ethical computing environment.


Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell May 2014

Assessing Relative Weights Of Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, Steven Furnell

Herbert J. Mattord

Organizations rely on password-based authentication methods to control access to many Web-based systems. In a recent study, we developed a benchmarking instrument to assess the authentication methods used in these contexts. Our instrument developed included extensive literature foundation and an expert panel assessment. This paper reports on the development of the instrument and the expert panel assessment. The initial draft of the instrument was derived from literature to assess 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. Following, the criteria within the index were evaluated by an expert panel and the same panel provided opinions …