Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

PDF

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 182

Full-Text Articles in Business

The Nature Of Project Success, Michael J. Cuellar Dec 2013

The Nature Of Project Success, Michael J. Cuellar

Michael J. Cuellar

This paper investigates the ontological status of project success. The literature shows that success has historically been considered to be an objective property of a project, one that can be assessed and the status of the project as a success or failure determined. However, this approach is shown to have serious deficiencies in dealing with certain project results. As an alternative, this paper suggests that following the subjective view of project success; success should be considered as a politically determined social construction. The paper advocates using Archer’s Morphogenetic Social Theory (Archer 1995; Cuellar 2010b) to explanatory mechanism. Under that theory, …


Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha Dec 2013

Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha

Joseph Shrestha

The term “big data” is associated with one or more of the four characteristics: volume, variety, and velocity. The technologies associated with the big data has already been proven in other sectors. Internet giants like Google, Facebook, Netflix, etc. uses big data collected from their users to present advertisements, friend recommendations, and TV shows and movies relevant to the specific user. Big data is also used for insurance fraud detection, improving bus system by reducing congestion, predictive flight arrival time, weather forecast, and genomic analysis.
For the construction industry, volume and variety becomes particularly relevant. From project planning to the …


Isscm Graduating Cohort, December 2013, Raj Soin College Of Business, Wright State University Dec 2013

Isscm Graduating Cohort, December 2013, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster congratulating the December 2013 Graduating Cohort from the Master of Science in Logistics and Supply Chain Management Program.


A Review Of Communication Tools And Techniques For Successful Ict Projects, Ernest Mnkandla Dec 2013

A Review Of Communication Tools And Techniques For Successful Ict Projects, Ernest Mnkandla

The African Journal of Information Systems

Practitioners have repeatedly mentioned that projects that lack effective communication are doomed to fail. Project communications management involves the generation, collection, and storage of information within a project. Project communication therefore provides vital ingredients for the go-no-go decisions in a project through the effective selection of the minimum essential things that can be done to share the collected information among the stakeholders. A fast growing way to manage software development projects is agile project management, whose focus is balancing between continuous releases of quality deliverables and frequently sharing project progress information. In this editorial, we advocate for research on the …


A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma Dec 2013

A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma

Research Collection School Of Computing and Information Systems

Traditional methods to evaluate research performance focus on citation count, quality and quantity of research output by individual researchers. These measures overlook the roles an individual plays in research collaboration, which is critical in an institutional research management environment due to the inherent interdependency among research entities. In order to address the organizational research management needs, we propose a research social network approach to better analyze local collaboration networks. For this purpose, we develop a new “collaboration supportiveness” measure to quantify an individual researcher's collaboration ability. Insights derived from this research are very helpful for managers to effectively allocate resources, …


Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa Nov 2013

Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa

João Barata

We present an approach to develop IS Quality Culture, in the context of ISO 9001. The research design begins with semi-structured interviews with eight auditors, followed by action research. We confirmed that auditors recognize the importance of five distinct IS Quality dimensions: information/data, software, administrative, service, and infrastructure. However, the audit practice reveals the risk of considering IS as mere support, disregarding the cultural aspects of IS Quality. Our contribution addresses this gap by providing an audit checklist and an approach accessible to IS non-experts. An IS Quality Culture is vital in regulatory environments, and may raise the audit effectiveness …


Collaborative Competitive Intelligence: A Knowledge Base System Approach, Yu Liang Chi, Tsang Yao Chen Nov 2013

Collaborative Competitive Intelligence: A Knowledge Base System Approach, Yu Liang Chi, Tsang Yao Chen

Business and Information Technology Faculty Research & Creative Works

This study develops a collaborative decision support system to enhance the enterprise competitive intelligence (CI) decision process. A CI knowledge model is constructed by identifying concepts of and relations among instance types, decision models, rules of thumb, and weighting of organization functions. The system consists of: 1) a Domain Ontology of concepts and instances to express the knowledge categorization structure; 2) a Task Ontology to express an objective-oriented knowledge framework to express the combination of questions; and 3) Semantic Rules to develop the logical steps for problem solving. The case experiment results of high Decision Correctness Rate and Departmental Weighting …


The Relationship Between Strategic Information Systems Planning Situational Factors, Process Configuration And Success, A. J. Gilbert Silvius, Jeroen Stoop Nov 2013

The Relationship Between Strategic Information Systems Planning Situational Factors, Process Configuration And Success, A. J. Gilbert Silvius, Jeroen Stoop

Journal of International Technology and Information Management

This paper reports a study into the relationship between the configuration of the process of Strategic Information Systems Planning (SISP) and the success of SISP. SISP is an important activity in the alignment of information technology systems and services to business requirements. However, despite the obvious importance of a proper planning of information technology and information systems in organizations, success of SISP is not evident. And as the success of SISP is also influenced by the process followed in developing the SISP, the research question for this study was, “How does the configuration of the SISP process influence the success …


A Conceptual Framework For E-Commerce Innovation In Chinese Smes Chun-Sheng Yu, Chun-Sheng Yu, Xue-Bing Dong Nov 2013

A Conceptual Framework For E-Commerce Innovation In Chinese Smes Chun-Sheng Yu, Chun-Sheng Yu, Xue-Bing Dong

Journal of International Technology and Information Management

As E-Commerce (EC) is rapidly gaining popularity in China, EC innovation becomes a major growth strategy for many SMEs. Meanwhile, problems and challenges are hindering proliferation of EC innovation. The need exits for a theoretical model to forge EC innovation: a dynamic process with progressive stages of both internal and external e-readiness. Derived from theories and evidenced by the case studies from Hangzhou, China, our conceptual framework reveals top management, organizational learning, government support, market forces, and technology readiness as essential in each development stage, but with different emphasis. Implications of the framework are discussed.


Creativity, Coordination & Knowledge Co-Creation On A Global Scale- The Process Perspective, Olivera Marjanovic, Narcyz Roztocki Nov 2013

Creativity, Coordination & Knowledge Co-Creation On A Global Scale- The Process Perspective, Olivera Marjanovic, Narcyz Roztocki

Journal of International Technology and Information Management

In very recent times new tools and technologies for peer-to-peer collaboration and coordination became easily and readily available taking knowledge creation processes outside of the organizational boundaries. This paper proposes to extend the existing boundaries of Business Process Management (BPM) to include an emerging category of processes; here termed Global Knowledge-Intensive Business Processes (GKIBP). These processes differ from other global processes, such as supply chains and collaborative cross-organizational business processes (BPs), as their main outcome is a commercial knowledge artifact, co-created trough coordinated activities of knowledge agents, that may or may not come from an organizational setting. Drawing from, and …


Horizontal Collaborative E-Purchasing For Hospitals: It For Addressing Collaborative Purchasing Impediments, Robbert J. G. Kusters, Johan Versendaal Nov 2013

Horizontal Collaborative E-Purchasing For Hospitals: It For Addressing Collaborative Purchasing Impediments, Robbert J. G. Kusters, Johan Versendaal

Journal of International Technology and Information Management

Horizontal collaborative purchasing (HCP) has often been cited as a way for hospitals to address the challenges of the rising healthcare costs. However, hospitals do not seem to utilize horizontal collaborative purchasing on any large scale, and recent initiatives have had mixed results. Focusing on Dutch hospitals, in this paper we present major impediments for collaborative purchasing, resulting in a first component of our proposed electronic horizontal collaborative purchasing model for hospitals; as a second component it contains a collaborative purchasing typology. A first validation round with hospital purchasing professionals, described separately in Kusters and Versendaal (2011), confirmed four applicable …


Indian Smes Perspective For Election Of Erp In Cloud, Tripti Negi Mahara Nov 2013

Indian Smes Perspective For Election Of Erp In Cloud, Tripti Negi Mahara

Journal of International Technology and Information Management

With increasing market competition and globalization, SMEs have shown interest to deploy ERP package to integrate their business processes. High investment in terms of cost, manpower and time are the major hurdles while selecting a traditional ERP package. Hence there is a need to look for a cost effective ERP solution. Deploying ERP on Cloud is one such option due to lower infrastructure cost and flexible payment. A SME evaluates an ERP solution from Economical, Technological and People perspectives with the factors that measure them. . . A factor can either be a benefit or a threat. A benefit facilitates …


Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani Nov 2013

Top Management Support, Collective Mindfulness, And Information Systems Performance, Shaji A. Khan, Albert L. Lederer, Dinesh A. Mirchandani

Journal of International Technology and Information Management

Mindfulness is a cognitive process that facilitates the discovery and correction of errors that might escalate. This study applies mindfulness theory to examine the impact of top management support for information systems on collective mindfulness, and that of collective mindfulness on IS performance. It treated such mindfulness in five dimensions, and top management support and IS performance as uni-dimensional. Forty-seven chief executive officers responded to a survey asking their perceptions of the constructs. Top management support predicted four of the dimensions with the strongest effect on sensitivity to IS operations. A negative path from support to commitment to IS resilience …


Behavioral Modeling Of The Individual’S Acceptance And Use Of Internet In Bangladesh: An Analysis Using An Integrated Approach, Md Shah Azam, Mohammed Quaddus, Nasrin Lubna Nov 2013

Behavioral Modeling Of The Individual’S Acceptance And Use Of Internet In Bangladesh: An Analysis Using An Integrated Approach, Md Shah Azam, Mohammed Quaddus, Nasrin Lubna

Journal of International Technology and Information Management

This study attempts to examine individuals’ behavior in the adoption and usage of the Internet for accomplishing various transactions and communication in Bangladesh. A descriptive research design is administered to ascertain the joint impact of the study constructs. A combination of AMOS 18 and PLS graph has been used for structural equation modeling with a cross-sectional dataset of 239 individuals in Bangladesh collected through a questionnaire survey. The proposed model was assessed with two step procedure after scrutiny and correction for non response and subjective response bias. The psychometric properties of the model, convergent and discriminant validity were assessed through …


Assessing The Moderating Effect Of Consumer Product Knowledge And Online Shopping Experience On Using Recommedation Agents For Customer Loyalty, Victoria Y. Yoon, R. Eric Hostler, Zhiling Guo, Tor Guimaraes Nov 2013

Assessing The Moderating Effect Of Consumer Product Knowledge And Online Shopping Experience On Using Recommedation Agents For Customer Loyalty, Victoria Y. Yoon, R. Eric Hostler, Zhiling Guo, Tor Guimaraes

Research Collection School Of Computing and Information Systems

Social media technologies have greatly facilitated the creation of many types of user-generated information, e.g., product rating information can be used to generate preference-based recommendation. As a decision support tool, a Recommendation Agent (RA) has been widely adopted by many e-commerce websites. The impact of RAs on online shopping has been extensively examined in the IS literature. However, from Marketing and Social Media perspectives, the widely adopted cognitive–affect–conative–action framework of customer loyalty has not been tested in the presence of RAs. Moreover, there has been little research assessing the impact of increasing consumer knowledge about specific product domains on customer …


Identifying Contextual Factors Of Employee Satisfaction Of Performance Management At A Thai State Enterprise, Molraudee Saratun, Parisa Rungruang Oct 2013

Identifying Contextual Factors Of Employee Satisfaction Of Performance Management At A Thai State Enterprise, Molraudee Saratun, Parisa Rungruang

The South East Asian Journal of Management

Although there has been an increase in Performance Management (PM) literature over the years arguing that PM perceptions are likely to be a function of PM process components and contextual factors, the actual relationship between the contextual factors and employee satisfaction of PM remains little explored. Extending previous research, this study examines relationships between contextual factors and employees’ PM satisfaction. Derived from the literature, these contextual factors are motivation and empowerment of employees, role conflict, role ambiguity, perceived organisational support, procedural justice and distributive justice. Seven directional hypotheses are tested accordingly through a series of regression analyses. This article finds …


What Factors Drive Job Seekers Attitude In Using E-Recruitment?, Ritzky Karina Brahmana, Rayenda Brahmana Oct 2013

What Factors Drive Job Seekers Attitude In Using E-Recruitment?, Ritzky Karina Brahmana, Rayenda Brahmana

The South East Asian Journal of Management

In a digital world, job seekers prefer to use e-recruitment for a vacancy searching. Thus, the explanation of the determinants of their attitude in using this technology is left unobserved. This article reports the result of a survey study on how users utilize e-recruitment to search for works. Three hundred eighty-five just-graduated undergraduate students answered questions regarding their intention of using the e-recruitment under Theory of Acceptance Model. We propose Perceived Usefulness, Perceived Ease of Use, and Perceived of Enjoyment as the determinants of the job seekers intention. Results showed that those three variables influence the decision making of job …


Including Capabilities Of Local Actors In Regional Economic Development: Empirical Results Of Local Seaweed Industries In Sulawesi, Mark T. J. Vredegoor, Bartjan W. Pennink Oct 2013

Including Capabilities Of Local Actors In Regional Economic Development: Empirical Results Of Local Seaweed Industries In Sulawesi, Mark T. J. Vredegoor, Bartjan W. Pennink

The South East Asian Journal of Management

Stimson, et al. (2009) developed one of the most relevant and well known model for Regional Economic Development. This model covers the most important factors related to economic development question. However, this model excludes the social components of development. Local community should be included in terms of the development of a region. This paper introduced to the Stimson model “Skills” and “Knowledge” at the individual level for local actors indicating the capabilities at the individual level and introduced “Human Coordination” for the capabilities at the collective level. In our empirical research we looked at the Indonesian seaweed market with a …


Service Recovery Paradox In Indian Banking Industry: An Empirical Investigation, Arunesh Garg Oct 2013

Service Recovery Paradox In Indian Banking Industry: An Empirical Investigation, Arunesh Garg

The South East Asian Journal of Management

The present study examines existence of service recovery paradox in Indian banking industry. The study is taken up in the tri-city of Chandigarh, Panchkula and Mohali. The respondents are categorized into failure and no-failure groups on the basis of their service experience. Failure group constitutes those respondents who have experienced service recovery, and has been further divided into five sub-groups ranging from service recovery++ (service recovery better than expected) to service recovery- - (service recovery worse than expected). Service recovery paradox is examined by comparing service recovery++ group with no-failure group. The study shows evidence for existence of service recovery …


Factors Influencing Individual Performance In An Indonesian Government Office, Azizatul Munawaroh, Corina D. S. Riantoputra, Sally Bethesda Marpaung Oct 2013

Factors Influencing Individual Performance In An Indonesian Government Office, Azizatul Munawaroh, Corina D. S. Riantoputra, Sally Bethesda Marpaung

The South East Asian Journal of Management

Reformation in Indonesian government offices leads to many substantial changes, and demands improved job performances while arguably loading employees with more work. This research aims to understand factors that potentially influence job performance in Indonesian government offices that carries on such reformation. Using adapted scales from previous studies, this research investigates the role of workload, responsibility for others (level of responsibility to care for other people) and need for achievement on employee’s performance. A survey to all full-time workers in an Indonesian government office is conducted. Contrary to expectation, workload does not influence employee’s performance. Instead, regression analysis demonstrates that, …


Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma Oct 2013

Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma

Qing Hu

In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …


The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu Oct 2013

The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu

Qing Hu

Transformational leadership has been identified as one of the most critical factors in ERP success. However, few studies have explored how transformational leadership impacts ERP success, especially in the assimilation phase. Drawing from organizational learning and leadership theories, we submit that transformational leadership is positively related to exploitative and exploratory learning, mediated by three types of organizational learning culture. We developed a theoretical model and collected data from top and middle managers of 101 organizations in China that have used ERP systems for at least one year. Our results suggest that (1) transformational leadership is positively related with psychological safety, …


The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie Oct 2013

The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie

Qing Hu

Firms in China, and in Asia-Pacific countries to a certain degree, cannot escape from two institutional characteristics of modern organizations: the uniquely Eastern practice of guanxi and the uniquely Western artifact of information technology. While both constructs have been extensively studied in organizational contexts, few have examined how these two constructs interact with each other and how such interaction impact organizational processes, norms, and other institutional properties. From the lens of structuration theory, we attempt to understand this interesting and important phenomenon. We submit that guanxi is neither a cultural artifact of the Chinese society, nor a product of weak …


Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla Oct 2013

Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla

Qing Hu

Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent …


Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling Oct 2013

Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling

Qing Hu

Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using …


Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede Oct 2013

Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede

The African Journal of Information Systems

Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used …


Africa’S Contributions To Information Systems, Richard T. Watson Oct 2013

Africa’S Contributions To Information Systems, Richard T. Watson

The African Journal of Information Systems

Africans created the world’s first major information systems, gesturing and language. Now days, Africa is once again showing leadership in the area of frugal IS.