Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 69

Full-Text Articles in Business

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo Sep 2023

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo

Faculty Publications

Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.

Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.

Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …


A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda Sep 2022

A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda

Theses and Dissertations

The Department of Defense (DoD) has encouraged the transition to digital engineering, yet there are limited guides for how to transition and there is limited data to show where an organization like a program office can reap the most benefit from the transition. To identify areas where potential benefits may be realized, this thesis compares two Requests for Information (RFIs), one document-based and one model-based, from generation to response. A survey was developed and administered to 7 members of a single program office to grade the RFI responses. The survey was based on the 43 benefit categories identified in the …


Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt Aug 2022

Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt

Faculty Publications

Organizations with large facility and infrastructure portfolios have used asset management databases for over ten years to collect and standardize asset condition data. Decision makers use these data to predict asset degradation and expected service life, enabling prioritized maintenance, repair, and renovation actions that reduce asset life-cycle costs and achieve organizational objectives. However, these asset condition forecasts are calculated using standardized, self-correcting distribution models that rely on poorly-fit, continuous functions. This research presents four stepwise asset condition forecast models that utilize historical asset inspection data to improve prediction accuracy: (1) Slope, (2) Weighted Slope, (3) Condition-Intelligent Weighted Slope, and (4) …


Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner Jan 2019

Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner

Faculty Publications

This article provides insights into the current state of developmental testing (DT) and requirements management in Department of Defense information systems employing Agile development. The authors describe the study methodology and provide an overview of Agile development and testing. Insights are described for requirements, detailed planning, test execution, and reporting. This work articulates best practices related to DT and requirements management strategies for programs employing modernized Software Development Life Cycle practices.


Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker Mar 2013

Management Information Systems And The Age Of Social Media: An Investigation Of Social Network Research, Carissa M. Parker

Theses and Dissertations

Due to the up-rise of social media, social networking sites have increased in popularity and use over the last few years. During this time, research related to social networks has also escalated. This study presents social network research trends found in ISR, JMIS, and MISQ for a six year period, 2005-2010. The social network-related articles from these premier MIS journals were examined in terms of topical theme and research strategy employed. Furthermore, the most productive authors and affiliations were identified and presented individually, by state, and by region. An additional outcome of this research is the presentation of a preliminary …


Data Quality-A Key To Successfully Implementing Ecss, Craig A. Lane Mar 2009

Data Quality-A Key To Successfully Implementing Ecss, Craig A. Lane

Theses and Dissertations

In response to the Expeditionary Logistics for the 21st Century (eLog21) campaign initiatives published in 2003, the United States Air Force (USAF) pursued the acquisition of technology to help transform its logistics processes. With process mapping complete and a proposed roll-out schedule, forward progress towards full implementation of the Expeditionary Combat Support System (ECSS) continues. As a key enabler to achieving eLog21 initiatives, implementing ECSS will help transform current USAF logistics business processes. Integrating more than 450 legacy systems, and with a projected end-state in excess of 750,000 primary, secondary, and tertiary users, ECSS is the largest enterprise resource planning …


Achieving Alignment: An Analysis Of Enterprise Architecture Best Practices Within The United States Air Force, Michael A. Fetters Mar 2009

Achieving Alignment: An Analysis Of Enterprise Architecture Best Practices Within The United States Air Force, Michael A. Fetters

Theses and Dissertations

This research uncovers areas of best practices that support achieving alignment between an organization’s Information Technology (IT) and its business processes. One principal finding of this effort revealed that the means used to achieve alignment exists within the effective application of Enterprise Architecture (EA), a common practice found throughout the Federal Government, Department of Defense, and the Air Force. EA is the tool used to achieve alignment; likewise, the reason for developing IT architecture is to achieve alignment of IT investments and mission objectives. This research groups the best practices into vision, identification, framework, and governance. Interestingly, these practices relate …


An Assessment Of The Air Force Weather Agency's Readiness For Knowledge Management Initiatives, Daniel Tucker Mar 2009

An Assessment Of The Air Force Weather Agency's Readiness For Knowledge Management Initiatives, Daniel Tucker

Theses and Dissertations

The successful implementation of knowledge management (KM) initiatives requires a level of commitment and preparedness by the organization that is commensurate with the expected results. An organization must be willing to allocate the necessary resources to ensure their readiness to undertake new KM projects. The purpose of this study is to review AFWA’s organizational culture and measure its propensity for accepting KM initiatives. The study uses empirically validated constructs to evaluate and assess the organization’s people, culture, climate, processes and attitudes as they relate to KM. This research was conducted using semi-structured interviews to elicit respondents’ views about KM practices. …


An Analysis Of Defense Information And Information Technology Articles: A Sixteen Year Perspective, Daniel K. Smith Mar 2009

An Analysis Of Defense Information And Information Technology Articles: A Sixteen Year Perspective, Daniel K. Smith

Theses and Dissertations

Over the past two decades, information and information technology (IT) have evolved significantly and have become increasingly important to our national security. Many different journals have described this evolution. The purpose of this study is to examine the evolution of information and IT through the articles of two defense journals over a sixteen-year period. It provides a review of the article subject matter, the changes in the subject matter, the contributing authors and their institutions, and predictions for the next five years.


An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr. Mar 2008

An Empirical Investigation Of Factors Influencing Knowledge Management System Success, John F. Whitfield Jr.

Theses and Dissertations

Knowledge has been viewed as a critical component for organizations. Consequently, organizations implement Knowledge Management Systems (KMSs) to seek competitive advantages, but they may encounter mixed results. This research draws on previous information system and knowledge management system success-related literature and selects eight factors that are believed to be critical for the successful implementation of a KMS. These factors were derived through a literature search of current KMS success-related literature. The purpose of this study is to identify factors that could have a clear influence on the development and implementation of KMSs. The study presents the empirical examination of a …


A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley Mar 2008

A Case-Based Exploration Of Task/Technology Fit In A Knowledge Management Context, Michael W. Moseley

Theses and Dissertations

Task/Technology Fit (TTF) posits that as the intersection of the task domain and the capabilities of an information system (IS) increases in magnitude, the performance gains experienced by user through use of the IS will be positively impacted. While rooted in the traditional IS literature, this research proposes that TTF be extended to incorporate additional factors unique to the context of Knowledge Management (KM). Based upon the findings of this research, it is reasonable to conclude that when employing the TTF model to determine KMS fitness, additional factors other than the task requirements and KMS capabilities should be considered. This …


Governance Structure Transforemation During Erp Implementations, Elise V. Strachan Mar 2008

Governance Structure Transforemation During Erp Implementations, Elise V. Strachan

Theses and Dissertations

The United States Air Force (USAF) has a number of initiatives underway to better support tomorrow’s Warfighter. As part of the Expeditionary Logistics for the 21st Century (eLog21) campaign, one of the most critical initiatives is the Expeditionary Combat Support System (ECSS). ECSS is the world’s largest enterprise resource planning (ERP) implementation and will completely transform USAF logistics operations. The benefits of an ERP include centrally-managed and integrated information sharing, while the many challenges include training future state operations and employing change management. An effective governance structure is essential in order for the USAF to realize the full benefits of …


Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina Mar 2008

Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina

Theses and Dissertations

With increased reliance on communications to conduct military operations, information centric network management becomes vital. A Defense department study of information management for net-centric operations lists the need for tools for information triage (based on relevance, priority, and quality) to counter information overload, semi-automated mechanisms for assessment of quality and relevance of information, and advances to enhance cognition and information understanding in the context of missions [30]. Maximizing information utility to match mission objectives is a complex problem that requires a comprehensive solution in information classification, in scheduling, in resource allocation, and in QoS support. Of these research areas, the …


Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner Mar 2008

Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner

Theses and Dissertations

The purpose of this research was to develop an information requirements analysis method that would provide the Director of Cyberspace Forces with the information required to support effective command and control of cyberspace. This research investigates the role of information in command and control, information in the traditional war fighting domains, cyberspace as a war fighting domain, and various methods of determining information requirements of organizations. This research produced an information requirements analysis method that is suitable for identifying the command and control information requirements of the Director of Cyberspace Forces.


A Comparative Assessment Of The Knowledge Management Leadership Approaches Within The Department Of Defense, Tommy V.S. Marshall Ii Mar 2007

A Comparative Assessment Of The Knowledge Management Leadership Approaches Within The Department Of Defense, Tommy V.S. Marshall Ii

Theses and Dissertations

Knowledge has superseded traditional corporate assets and has become the strategic resource for competitive advantage. To reap the benefits of knowledge, organizations must harvest and leverage the collective knowledge of the entire workforce. This is achieved through effective knowledge management. KM involves processes to create, to store, and transfer knowledge to accomplish business objectives and to achieve a competitive advantage. The Department of Defense has also recognized the importance of KM and has since mandated the acquiring, refining, and sharing of knowledge. The Departments of the Army, Air Force, and Navy have each undertaken individual KM efforts. This research, guided …


A Comparative Assessment Of Knowledge Management Education Across The United States Department Of Defense, Gary Lee Wright Mar 2007

A Comparative Assessment Of Knowledge Management Education Across The United States Department Of Defense, Gary Lee Wright

Theses and Dissertations

Knowledge is a critical resource for organizations today, especially to the DoD. When organizations understand what knowledge is, they can begin to draw value from it. Drawing value from knowledge is best accomplished through the processes of knowledge management: knowledge creation, knowledge storage and retrieval, knowledge transfer, and knowledge application (Alavi and Leidner, 2001). Organizations can create an environment in which these processes flourish by ensuring the organization has the elements of a supportive leadership, structure to control and optimize knowledge sharing, technology to facilitate the KM processes, and a commitment to maximize knowledge sharing and continuously improve (Stankosky et …


Assessing Perceptions Of Knowledge Management Maturity/Capabilitites: A Case Study Of Saf/Fm, Aaron M. Blair Mar 2007

Assessing Perceptions Of Knowledge Management Maturity/Capabilitites: A Case Study Of Saf/Fm, Aaron M. Blair

Theses and Dissertations

Knowledge is an essential organizational resource that is required at all echelons to accomplish processes, to make decisions, and to improve efficiency and effectiveness. In order to take advantage of the benefits of knowledge, organizations must harvest and leverage the collective knowledge of the entire workforce through effective knowledge management (KM). The Air Force Center of Excellence for Knowledge Management recognized SAF/FM as having an exemplar KM program within the Air Force. This research used the Knowledge Management Capability Assessment (KMCA) framework to assess the overall KM maturity and capabilities of the seemingly mature SAF/FM KM program. The results indicate …


Refinement Of An Instrument To Assess Readiness For Knowledge Management, Landon C. Bailey Mar 2007

Refinement Of An Instrument To Assess Readiness For Knowledge Management, Landon C. Bailey

Theses and Dissertations

Academics and practitioners have described knowledge as a primary source for competitive advantage for organizations; however, many attempts at instituting knowledge management programs to increase organizational competitiveness do not succeed. Instituting knowledge management programs generally requires organizations to make significant changes and the concept of readiness has long been believed to be an important precondition for successful organizational change. By linking previous research in enablers for knowledge management and organizational change, it is possible to adapt an established organizational change readiness instrument to measure readiness for knowledge management. This study culminates in the development and field-testing of the resultant knowledge …


Investigating Barriers To Knowledge Management: A Case Study Of The Air Force Center Of Excellence For Knowledge Management, Edgar L. Myers Iv Sep 2006

Investigating Barriers To Knowledge Management: A Case Study Of The Air Force Center Of Excellence For Knowledge Management, Edgar L. Myers Iv

Theses and Dissertations

Knowledge is becoming recognized as an organization's most valuable and powerful resource. As a resource, knowledge is used to improve an organization's efficiency and effectiveness, to create innovative solutions, and to enhance decision making capabilities. Being such an important resource, it stands to reason that an organization's knowledge resources must be effectively managed. However, while an organization attempts to manage its knowledge, its efforts are constrained by a variety of influences acting as barriers. Using Holsapple and Joshi's (2000) "influences on the management of knowledge" framework, the purpose of this research is to identify those barriers which are acting as …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Evaluating Km Journal Content: An Assessment Of Trends (2000-2005), Donnie O. Harp Mar 2006

Evaluating Km Journal Content: An Assessment Of Trends (2000-2005), Donnie O. Harp

Theses and Dissertations

Knowledge management (KM) has been receiving ever increasing attention from researchers and practitioners, especially over the last 5 years. Consequently, some researchers and practitioners now believe that KM should be its own discipline and have established KM-specific journals in an effort to further this idea. Many of these journal founders believe that KM has emerged as a mixture of many disciplines and have written the goal of being interdisciplinary into their charters. This research reviews the KM literature published in KM-specific journals from 2000 to 2005. Specifically, using a content analysis methodology, this research reviews and analyzes the body of …


Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross Mar 2006

Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross

Theses and Dissertations

Many databases rely on documents (research) of the past to input data to create a comprehensive database. The Selected Acquisition Report (SAR) is one such document. The SARs are pervasive documents that have undergone decades of scrutiny by Congress and watchdog organizations such as the Government Accountability Office. Since the SAR has undergone such massive evolutionary changes, creating an accurate acquisition database presents a daunting task for the analyst and researcher alike. This research concerns itself with one such database. From this prior research database, we look to fill in missing data. We first conduct a literature review to determine …


A Comparative Assessment Of Knowledge Management Programs Across The United States Armed Services, Patrick L. Booker Mar 2006

A Comparative Assessment Of Knowledge Management Programs Across The United States Armed Services, Patrick L. Booker

Theses and Dissertations

Knowledge is a corporate resource that is required to accomplish business processes, to make decisions, and to improve efficiency and effectiveness. To completely take advantage of the benefits of knowledge, organizations must harvest and leverage the collective knowledge of the entire workforce. This can be achieved through effective knowledge management. Knowledge management involves processes to create, to store, and transfer knowledge to accomplish business objectives and to achieve a competitive advantage. The United States armed services have also recognized the benefits of knowledge management in meeting the emerging challenges of modern warfare. This study investigated knowledge management programs in the …


Usability And Accessibility Of Air Force Intranet Web Sites, Richard S. Bentley Mar 2006

Usability And Accessibility Of Air Force Intranet Web Sites, Richard S. Bentley

Theses and Dissertations

The Air Force is moving to a network centric environment where information must be data visible, accessible, and understandable. This transformation has seen the adoption of the Internet web browser as a de facto standard for information access. The Technology Acceptance Model suggests that information systems must not only be useful but also be usable and a large body of usability engineering knowledge exists to support usable design. In addition, the U.S. government mandates specific minimum design features required to support disabled user access. This research effort seeks to establish an understanding of how well common practice usability design principles …


Corporate Entrepreneurship Assessment Instrument (Ceai): Systematic Validation Of A Measure, Tassika M. Davis Mar 2006

Corporate Entrepreneurship Assessment Instrument (Ceai): Systematic Validation Of A Measure, Tassika M. Davis

Theses and Dissertations

The implementation of corporate entrepreneurship is becoming an important activity for private- and public-sector organizations. Organizational factors have been linked to successful corporate entrepreneurship. The Corporate Entrepreneurship Assessment Instrument (CEAI) is an instrument that attempts to measure the effectiveness of the key internal organizational factors, or climate, that influence innovative activities and behaviors. This study attempted to assess the content validity and factor structure of the CEAI and thus add weight to the psychometric soundness of the instrument. In sum, the effectiveness of the instrument was tested using the framework for scale development presented by Hinkin (1998). Overall, the CEAI …


Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder Dec 2005

Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder

Theses and Dissertations

Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …


Decision Analysis Method For Air Mobility Beddown Planning Scenarios, Jacob M. Salmond Mar 2005

Decision Analysis Method For Air Mobility Beddown Planning Scenarios, Jacob M. Salmond

Theses and Dissertations

Currently at Air Mobility Command, Plans and Programming, Requirements Division (AMC/A75R), infrastructure requirements for a proposed permanent beddown location are accomplished through corporate knowledge and manual lookup. With the loss of corporate knowledge in the foreseeable future, AMC/A75R is would like to capture this knowledge base in an information system. This research developed a spreadsheet analysis tool that takes hard requirements and compares them with existing capabilities at a given location. Through gap analysis, the tool produced infrastructure requirement shortfalls and associated costs to satisfy the shortfalls.


Key Issues In The Application Of Knowledge Management In Education, George A. Mendoza Mar 2005

Key Issues In The Application Of Knowledge Management In Education, George A. Mendoza

Theses and Dissertations

Today's world is a fast moving place in which decisions are made with an ever-increasing speed, and the success of an organization rests on its ability to correctly make these decisions. This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM). Despite its acceptance and use in commercial organizations, KM is not being applied in the academic world. No KM models exist for educational use, and no other studies into this topic can be found. This research establishes a …


Barriers To Electronic Records Management (Erm): An Exploratory Case Study Investigating Erm In The Deployed Environment During Operations Enduring Freedom And Iraqi Freedom, Brian G. Hobbs Mar 2005

Barriers To Electronic Records Management (Erm): An Exploratory Case Study Investigating Erm In The Deployed Environment During Operations Enduring Freedom And Iraqi Freedom, Brian G. Hobbs

Theses and Dissertations

Corporate and government organizations can use electronic records as an important strategic resource, if the records are managed properly. In addition to meeting legal requirements, electronic records can play a vital role in the management and operation of an organization's activities. Corporate America is facing challenges in managing electronic records, and so too is the U.S. Air Force (USAF). The deployed environment is particularly problematic for electronic records management (ERM). This research, thus, investigates ERM in the deployed environment to identify and characterize the barriers faced by USAF personnel who deployed to locations supporting Operations Enduring Freedom and Iraqi Freedom. …


A Historical Context Analysis Of Changes In Content Management Ideology, William Lee Jr. Mar 2005

A Historical Context Analysis Of Changes In Content Management Ideology, William Lee Jr.

Theses and Dissertations

Digital content has grown continually over the past years, yet acceptance of a common definition of what is "content management" still generates debates in IS communities. This research will be a qualitative study using a combined approach of historical and context analysis of literary artifacts for drawing inferences to explore the evolutionary changes in content management ideology. Using a seven-step process, a specific structure is designed with a systematic approach to encounter the phenomena being researched and present the evidence of the results. Performing an analysis on the evolution of content management from a historical perspective will benefit researchers and …