Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Business

Impact Of Covid-19 On Aviation-Wildlife Strikes Across Europe, Isabel C. Metz, Marta Giordano, Dionysios Ntampakis, Marianna Moira, Anneke Hamann, Rosanne Blijleven, Jürgen J. Ebert, Alessandro Montemaggiori Jan 2022

Impact Of Covid-19 On Aviation-Wildlife Strikes Across Europe, Isabel C. Metz, Marta Giordano, Dionysios Ntampakis, Marianna Moira, Anneke Hamann, Rosanne Blijleven, Jürgen J. Ebert, Alessandro Montemaggiori

Human–Wildlife Interactions

Collisions between aircraft and wildlife (i.e., wildlife strikes) pose a serious threat toward the safety of aircraft, its crew, and passengers. The effects of COVID-19 related travel restrictions on wildlife strikes are unknown. With this study, we aim to address this information gap by assessing the changes of wildlife hazard management performance across European airports during the lockdown period (e.g., period of reduced operations and borders closure in spring 2020). We also sought to raise awareness of the importance of wildlife strike prevention in times of reduced operations. The objective of our study was to compare wildlife strike data before …


In Or Out? Perceptions Of Inclusion And Exclusion Among Ais Members, Jaime Windeler, Stacie Petter, Kathy Chudoba, Emma Coleman, Grace Fox, Thomas A. Chapman Jan 2020

In Or Out? Perceptions Of Inclusion And Exclusion Among Ais Members, Jaime Windeler, Stacie Petter, Kathy Chudoba, Emma Coleman, Grace Fox, Thomas A. Chapman

Data Analytics & Information Systems Faculty Publications

People want a sense of community, a benefit that a professional association such as the Association for Information Systems (AIS) can provide to members. When attempts to create a shared experience fall short and we feel excluded, we disengage and stop further attempts to participate. In this paper, we lay a foundation for individual and association inclusion practices in the AIS. First, we describe the current state of inclusion practices in the academy and in the AIS. Then, we describe findings from a survey of AIS members that measured their perceptions about inclusion and exclusion and factors that cultivated these …


Chs: Small: Support For The Academy Of Management Organizational Communication And Information Systems 2019 Doctoral Consortium, Katherine Chudoba Aug 2019

Chs: Small: Support For The Academy Of Management Organizational Communication And Information Systems 2019 Doctoral Consortium, Katherine Chudoba

Funded Research Records

No abstract provided.


Information Technology And The Search For Organizational Agility: A Systematic Review With Future Research Possibilities, Paul P. Tallon, Magno Queiroz, Tim Coltman, Rajeev Sharma Dec 2018

Information Technology And The Search For Organizational Agility: A Systematic Review With Future Research Possibilities, Paul P. Tallon, Magno Queiroz, Tim Coltman, Rajeev Sharma

Data Analytics & Information Systems Faculty Publications

Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature …


The Role Of It Application Orchestration Capability In Improving Agility And Performance, Magno Queiroz, Paul P. Tallon, Rajeev Sharma, Tim Coltman Nov 2017

The Role Of It Application Orchestration Capability In Improving Agility And Performance, Magno Queiroz, Paul P. Tallon, Rajeev Sharma, Tim Coltman

Data Analytics & Information Systems Faculty Publications

This paper investigates how IT application orchestration – a dynamic capability encapsulating a firm’s ability to refresh its application portfolio through a process of building, buying, and retiring IT applications – impacts firm performance. We propose a conceptual model in which the effect of IT application orchestration on firm performance is mediated by process agility. We further propose that a firm’s strategic orientation moderates the effect of IT application orchestration capability on process agility. Analysis of data from an international survey of IT executives supports our proposed hypotheses. This research contributes to the emergent literature on dynamic capabilities by proposing …


Linkages Between Firm Innovation Strategy, Suppliers, Product Innovation, And Business Performance: Insights From Resource Dependence Theory, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan Nov 2016

Linkages Between Firm Innovation Strategy, Suppliers, Product Innovation, And Business Performance: Insights From Resource Dependence Theory, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan

Management Faculty Publications

Purpose The purpose of this paper is to use resource dependence theory to hypothesize that a buyer’s innovation strategy enhances supplier innovation focus and a buyer-supplier relationship that supports product innovation. These in turn positively impact buyer product innovation outcomes and business performance. Moreover, it is argued that the buyer-supplier relationship positively moderates the impact of supplier innovation focus on product innovation. Design/methodology/approach Structural equation modeling and hierarchical linear regression are used to test hypotheses. Findings The results support all hypotheses and suggest that company (buyer) age and variables related to buyer engagement with international markets directly influence performance. The …


Supply Chain Strategy And The Role Of Suppliers: Evidence From The Indian Sub-Continent, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan Jan 2016

Supply Chain Strategy And The Role Of Suppliers: Evidence From The Indian Sub-Continent, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan

Management Faculty Publications

Supply chain strategy is widely recognized as being a crucial component of a broader corporate strategy. However, the relationships between a firm’s strategic supply chain focus, the tactical orientation of its suppliers, and the firm’s performance, are less well understood. Much of what is known is also based on developed country contexts. This study empirically examines relationships between a buying firm’s supply chain strategy and operational dimensions of its suppliers in a developing country context.


Risk Perception In Online Communities, Jason R. Couraud May 2014

Risk Perception In Online Communities, Jason R. Couraud

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Online communities have become a part of everyday life for many people. The members of the communities use them to keep in touch with family and friends, do business, look for jobs, play games, and more, both savory and unsavory. The ease of sharing personal information comes with the subsequent risk of having that information exposed publically or even stolen. The purpose of this study was to explore how much awareness of the risks affects a person’s decision to post personal information to an online community.

Chapter I introduces the concepts and issues that will be investigated by this paper. …


Churn Management Optimization With Controllable Marketing Variables And Associated Management Costs, Yong Seog Kim, Hyeson Lee, John D. Johnson May 2013

Churn Management Optimization With Controllable Marketing Variables And Associated Management Costs, Yong Seog Kim, Hyeson Lee, John D. Johnson

Data Analytics & Information Systems Faculty Publications

In this paper, we propose a churn management model based on a partial least square (PLS) optimization method that explicitly considers the management costs of controllable marketing variables for a success- ful churn management program. A PLS prediction model is first calibrated to estimate the churn proba- bilities of customers. Then this PLS prediction model is transformed into a control model after relative management costs of controllable marketing variables are estimated through a triangulation method. Finally, a PLS optimization model with marketing objectives and constraints are specified and solved via a sequential quadratic programming method. In our experiments, we observe …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell May 2012

Undergraduate Information Systems (Is) Curriculum And Career Track Development In United States Colleges And Universities: Assessment Of Adherence To Is 2010 Curriculum Guidelines, Corbin Christopher Bell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines. In addition, an analysis was conducted to see if curriculum in AACSB-accredited Information Systems programs across the United States changed significantly since other similar evaluations reported in 1996, and 2006, and whether it is closer in adherence to the IS 2010 curriculum guidelines.

The findings of this …


The Impact Of A Secondary Market On A Consumer's Intention To Buy New Video Games, Nicole Forsgen-Velasquez Jan 2012

The Impact Of A Secondary Market On A Consumer's Intention To Buy New Video Games, Nicole Forsgen-Velasquez

Data Analytics & Information Systems Faculty Publications

The secondary market for video game purchases is a multi-billion dollar industry that some believe is unfair to video game developers. Using the Theory of Reasoned Action (TRA), we investigated user attitudes and subjective norms and their affect on a consumer’s intention to buy new video games. While TRA has been used to study purchase intentions of material goods and digital goods, our study extends this work to investigate video games, which have both a physical and digital component. Based on a survey of 118 undergraduate students, two of the hypothesized relationships are significant predictors of intention to purchase: previous …


Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley Dec 2011

Business Intelligence Tools In A Developmental Environment: An Academic Module, Landon M. Hemsley

Undergraduate Honors Capstone Projects

Business Intelligence (BI), defined here as the creation and use of meaningful business information for management, has over the last 20 years shown over and over again its value to professional industry. The prevalence of BI has also demonstrated that a new brand of worker is needed to take advantage of the sophisticated tools available to modern industry. Evidence suggests modern universities have struggled to educate professionals on the tremendous impact BI can have on an organization if used properly. This work is a step in an endeavor to bridge that educational gap and generate an educational strategic advantage by …


The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay Aug 2011

The Impact Of Team-Based Learning’S Readiness Assurance Process On Virtually Isolated Adults, Matthew W. Barclay

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The purpose of this study was to test the effectiveness of the readiness assurance process of team-based learning (TBL) in virtually isolated settings. Many Internet sites offer courses for adults to use on their own without access to mentors or other learners. However, educational theory suggests that people learn better with others than by themselves. The focus of this investigation was whether the inclusion of the readiness assurance process would increase participants’ levels of learning based on Bloom’s revised taxonomy within the limits of virtual isolation.

In this study an experimental pretest-posttest design was employed. Using a 2- day mini-course …


The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar May 2011

The Adoption Of Computer Security: An Analysis Of Home Personal Computer User Behavior Using The Health Belief Model, Chester L. Claar

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.

The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling …


The Impact Of Virtual Private Network (Vpn) On A Company's Network, J. Myles Powell May 2010

The Impact Of Virtual Private Network (Vpn) On A Company's Network, J. Myles Powell

Undergraduate Honors Capstone Projects

Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This research discusses the performance of two different VPN configurations to determine their impact on a company's data communication network. The network configurations for this model are typical real-world networks complete with geographically diverse business office locations, a company headquarter, and a separate data warehouse location.

The effects of the two VPN configurations are then tested using the academic version of OPNET IT Guru network simulation software. Analysis of the data collected from the simulations show the different network performance that results from the use …


Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla Dec 2009

Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The constructivist's theory and its application to information retrieval from the Internet was reviewed. The main aim of the study was to devise and test an approach with which the most relevant information could be easily and efficiently extracted from the Internet. The impact of a judicious choice of the keywords to retrieve information, according to the particular approach to be implemented as well as the importance of speed reading as an additional technique to improve information retrieval, was compared and critically analyzed. The study was based on information retrieval from www.google.com and www.images.google.com and focused on real-life examples and …


Acquisition Of Operations Capability: A Model And Test Across Us And European Firms, Keah Choon Tan, Vijay R. Kannan, Jayanth Jayaram, Ram Narasimhan Feb 2007

Acquisition Of Operations Capability: A Model And Test Across Us And European Firms, Keah Choon Tan, Vijay R. Kannan, Jayanth Jayaram, Ram Narasimhan

Management Faculty Publications

In this paper, a three-factor model of operations capability is presented which, unlike previous studies that view capability as an outcome, examines the drivers of capability acquisition. The model proposes that capability acquisition is a function of an organization's commitment to the principles of quality management, just-in-time practices, and effective new product development processes. Furthermore, the paper proposes that these underlying facets of capability acquisition are common across geographic boundaries. The model is tested using data drawn from US and European companies. Results not only provide support for the three-factor model, but also for the invariance of the model and …


Bridging Space Over Time: Global Virtual Team Dynamics And Effectiveness, Kathy Chudoba, Martha L. Maznevski Jan 2000

Bridging Space Over Time: Global Virtual Team Dynamics And Effectiveness, Kathy Chudoba, Martha L. Maznevski

Data Analytics & Information Systems Faculty Publications

Global virtual teams are internationally distributed groups of people with an organizational mandate to make or implement decisions with international components and implications. They are typically assigned tasks that are strategically important and highly complex. They rarely meet in person, conducting almost all of their interaction and decision making using communications technology. Although they play an increasingly important role in multinational organizations, little systematic is known about their dynamics or effectiveness. This study built a grounded theory of global virtual team processes and performance over time. We built a template based on Adaptive Structuration Theory (DeSanctis and Poole 1994) to …


The Use Of Object-Oriented Design Methodologies In Systems Design, Rick C. Larkin May 1993

The Use Of Object-Oriented Design Methodologies In Systems Design, Rick C. Larkin

Undergraduate Honors Capstone Projects

Object-oriented design methodologies, along with object-oriented programming techniques, have recently gained significant popularity as their advantages have become evident. Traditional methodologies following the structured approach have not been successful in providing an accurate model of the business system.Object-oriented techniques, where an object in the computer system corresponds to a real-world object, have been much more successful in accurately modeling the business system and its environment.

Object-oriented methodologies provide many advantages over structured approaches to systems design. Concepts such as data hiding, encapsulation, inheritance, dynamic binding, and polymorphism help to achieve an accurate and flexible system that is resistant to corruption …


Operating Manual: Living Scriptures Management Information System, Deryn Young May 1992

Operating Manual: Living Scriptures Management Information System, Deryn Young

Undergraduate Honors Capstone Projects

This management information system is specifically designed to provide the managers of the Living Scripture's Summer Program with complete, timely, accurate sales data for each sales person, each team and both groups. The system uses dBASE IV Version 1.2 as its foundation. A majority of the functions the system performs are specialized features of DBASE IV, although some major modifications have been made to the DBASE code in most of the reports. The modifications were made to meet the user's specifications. The major functions of the system requiring user input include; inputting personal information for each sales person, inputting weekly …