Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Series

2016

Institution
Keyword
Publication

Articles 1 - 30 of 51

Full-Text Articles in Business

From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle Dec 2016

From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle

Faculty Publications

Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …


Linkages Between Firm Innovation Strategy, Suppliers, Product Innovation, And Business Performance: Insights From Resource Dependence Theory, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan Nov 2016

Linkages Between Firm Innovation Strategy, Suppliers, Product Innovation, And Business Performance: Insights From Resource Dependence Theory, Muhammad Shakeel Sadiq Jajja, Vijay R. Kannan, Shaukat Ali Brah, Syed Zahoor Hassan

Management Faculty Publications

Purpose The purpose of this paper is to use resource dependence theory to hypothesize that a buyer’s innovation strategy enhances supplier innovation focus and a buyer-supplier relationship that supports product innovation. These in turn positively impact buyer product innovation outcomes and business performance. Moreover, it is argued that the buyer-supplier relationship positively moderates the impact of supplier innovation focus on product innovation. Design/methodology/approach Structural equation modeling and hierarchical linear regression are used to test hypotheses. Findings The results support all hypotheses and suggest that company (buyer) age and variables related to buyer engagement with international markets directly influence performance. The …


Isscm, Master Of I.S. Cohort, Fall 2016, Raj Soin College Of Business, Wright State University Oct 2016

Isscm, Master Of I.S. Cohort, Fall 2016, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the 2016 Cohort from the Master of Information Systems Program.


Isscm, M.S. In Logistics & Scm Cohort, Fall 2016, Raj Soin College Of Business, Wright State University Oct 2016

Isscm, M.S. In Logistics & Scm Cohort, Fall 2016, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

Poster of the Fall 2016 Cohort from the Master of Science in Logistics and Supply Chain Management Program.


The Role Of The Sense Of Community In The Sustainability Of Social Network Sites, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich Oct 2016

The Role Of The Sense Of Community In The Sustainability Of Social Network Sites, Stanislav Mamonov, Marios Koufaris, Raquel Benbunan-Fich

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

ABSTRACT: The evolution of information technologies enables new forms of communication and facilitates the emergence of different types of virtual communities, such as social networks. While some social network services have succeeded, others have failed. Understanding the factors that affect the sustainability of social network sites is important for both research and practice. We draw on the sense of community theory to develop a nomological framework of antecedents and consequences associated with sense of community in social network sites. We evaluate the framework with a survey of 506 Facebook users. We find that sense of community has a strong effect …


What Is Professionalism? The Validation Of A Comprehensive Model Of Professionalism, Andrew W. Rowland Oct 2016

What Is Professionalism? The Validation Of A Comprehensive Model Of Professionalism, Andrew W. Rowland

Masters Theses & Specialist Projects

Professionalism is a term frequently used in organizations yet perceptions of what it means differ from person to person. Given its frequent use and its link to various job outcomes, such as organizational commitment (Bartol, 1979), there is a need to have a universal definition of professionalism. While there are existing models of professionalism these models are typically developed for a specific field or industry. Thus, there is also a need for a comprehensive model of professionalism that can be used across multiple fields and industries. This study worked to develop a model of professionalism that creates a comprehensive model …


Facilitators For Software Development Agility, Shekhar Rathor Sep 2016

Facilitators For Software Development Agility, Shekhar Rathor

FIU Electronic Theses and Dissertations

Software development methodologies provide guidelines and practices for developing information systems. They have evolved over time from traditional plan-driven methodologies to incremental and iterative software development methodologies. The Agile Manifesto was released in 2001, which provides values and principles for agile software development. Over the last few years, agile software development has become popular because its values and principles focus on addressing the needs of contemporary software development. IT and Business teams need agility to deal with changes that can emerge during software development due to changing business needs. Agile software development practices claim to provide the ability to deal …


Still A Man's World? Second Generation Gender Bias In External Equity Term Sheet Negotiations, Ethne Swartz, Frances M. Amatucci, Susan Coleman Sep 2016

Still A Man's World? Second Generation Gender Bias In External Equity Term Sheet Negotiations, Ethne Swartz, Frances M. Amatucci, Susan Coleman

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Women increasingly start and lead growth ventures yet receive a small proportion of external equity funding. Term sheet negotiation is a pivotal moment for obtaining growth capital. We employ a multi-method, mixed mode research design to explore strategies of women entrepreneurs who have negotiated term sheets and discuss our quantitative findings. Results indicate that women entrepreneurs in our sample worked hard to achieve optimal outcomes yet come up short because of exogenous and endogenous factors linked to second generation gender bias in the negotiation process. Propositions for future research are generated given the results of this exploratory research.


Improved Forward Buying Of Commodity Materials, Andrew Manikas, James Kroes Aug 2016

Improved Forward Buying Of Commodity Materials, Andrew Manikas, James Kroes

IT and Supply Chain Management Faculty Publications and Presentations

This research presents the Enhanced Commodity Forward Buy (ECFB) heuristic, a new method for commodity purchasing, which allows strategic forward buying of commodities for products that include commodity components or materials. The ECFB addresses limitations of existing methods by considering stochastic demand and stochastic commodity prices for products that contain both commodity and non-commodity materials. We conduct a simulation test of the new heuristic on 10 commodity indices using actual historical market prices, over a range of holding costs, markup margins, commodity percentages of the product’s cost of goods sold and demand distributions. The results of the simulation show that …


More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle Aug 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle

Faculty Publications

System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance of a primary task (the task that was interrupted), no research has examined the effect of DTI on the interrupting task. This is an important gap because in many …


Relevance Is In The Eye Of The Beholder: Design Principles For The Extraction Of Context-Aware Information, Arturo Castellanos Jul 2016

Relevance Is In The Eye Of The Beholder: Design Principles For The Extraction Of Context-Aware Information, Arturo Castellanos

FIU Electronic Theses and Dissertations

Since the1970s many approaches of representing domains have been suggested. Each approach maintains the assumption that the information about the objects represented in the Information System (IS) is specified and verified by domain experts and potential users. Yet, as more IS are developed to support a larger diversity of users such as customers, suppliers, and members of the general public (such as many multi-user online systems), analysts can no longer rely on a stable single group of people for complete specification of domains –to the extent that prior research has questioned the efficacy of conceptual modeling in these heterogeneous settings. …


3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr. Jun 2016

3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr.

Articles

No abstract provided.


Crop Price Patterns, Jessica J. Groskopf Jun 2016

Crop Price Patterns, Jessica J. Groskopf

Extension Farm and Ranch Management News

No abstract provided.


Procurement With Reverse Auction And Flexible Noncompetitive Contracts, Sean X. Zhou, Zhijie Tao, Nianbing Zhang, Gangshu (George) Cai Jun 2016

Procurement With Reverse Auction And Flexible Noncompetitive Contracts, Sean X. Zhou, Zhijie Tao, Nianbing Zhang, Gangshu (George) Cai

Information Systems and Analytics

This article investigates a hybrid procurement mechanism that combines a reverse auction with flexible noncompetitive contracts. A buyer adopts such mechanism to procure multiple units of a product from a group of potential suppliers. Specifically, the buyer first offers contracts to some suppliers who, if accepting the contract, do not participate in the auction while committing to selling a unit to the buyer at the price of the subsequent auction. For the suppliers rejecting the offers, they can join the subsequent auction with the other suppliers to compete on the remaining units. When the buyer offers only one flexible noncompetitive …


Reengineering Of Mesh Thesauri For Term Selection To Optimize Literature Retrieval And Knowledge Reconstruction In Support Of Stem Cell Research, Yan Su, James E. Andrews, Hong Huang, Yue Wang, Liangliang Kong, Peter Cannon, Ping Xu May 2016

Reengineering Of Mesh Thesauri For Term Selection To Optimize Literature Retrieval And Knowledge Reconstruction In Support Of Stem Cell Research, Yan Su, James E. Andrews, Hong Huang, Yue Wang, Liangliang Kong, Peter Cannon, Ping Xu

School of Information Faculty Publications

BACKGROUND: PubMed is a widely used database for scientists to find biomedical-related literature. Due to the complexity of the selected research subject and its interdisciplinary nature, as well as the exponential growth in the number of disparate pieces of biomedical literature, it is an overwhelming challenge for scientists to define the right search strategies and quickly locate all related information. Specialized subsets and groupings of controlled vocabularies, such as Medical Subject Headings (MeSH), can enhance information retrieval in specialized domains, such as stem cell research. There is a need to develop effective search strategies and convenient solutions for knowledge organization …


An Integrated Approach To The Teaching Of Operations Management In A Business School, Ram Misra, Handanhal Ravinder, Richard Peterson May 2016

An Integrated Approach To The Teaching Of Operations Management In A Business School, Ram Misra, Handanhal Ravinder, Richard Peterson

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

The authors discuss a curriculum integration effort that a school of business piloted recently. This effort was aimed at integrating the core functions (finance, marketing, management, and operations) so that undergraduate students would better appreciate the full impact of functional decisions on each other and in achieving the corporation's business objectives. The authors deployed a webbed integration model in which a business case was used to highlight the impact of a functional decision on the other three functions. The focus of the article is on how this model was implemented in the context of a required introductory course in operations …


10 Things Managers Can Do To Survive Digital Disruption, Singapore Management University May 2016

10 Things Managers Can Do To Survive Digital Disruption, Singapore Management University

Perspectives@SMU

Don't be a sitting duck. Respond to changes in markets with practical strategies


Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters Apr 2016

Ec 845 Nebraska Cash Soybean Prices And Basis Patterns, Jessica J. Groskopf, Cory Walters

Extension Farm and Ranch Management News

No abstract provided.


Using A Multiple Method And Mixed Mode Approach To Examine Women Entrepreneur Negotiating Styles, Ethne Swartz, Frances M. Amatucci, Susan Coleman Mar 2016

Using A Multiple Method And Mixed Mode Approach To Examine Women Entrepreneur Negotiating Styles, Ethne Swartz, Frances M. Amatucci, Susan Coleman

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Purpose – The purpose of this study is to explore an optimal research design for research on women entrepreneurs involved in negotiating term sheets for private equity capital. This research explores new ways for researchers to connect with such current “invisibles” through the use of a mixed method and mixed mode research design to expand sampling options and secure respondent participation. The authors discuss existing data sets that have been used as secondary sources for data on financing of companies and consider their inadequacy for research questions about process issues in negotiation. The authors present process-related findings regarding the efficacy …


A Response To “Transaction Cost Economics On Trial Again”, Michael Schermann, Philip Yetton, Helmut Krcmar Mar 2016

A Response To “Transaction Cost Economics On Trial Again”, Michael Schermann, Philip Yetton, Helmut Krcmar

Information Systems and Analytics

We appreciate the careful and thoughtful commentary on Schermann et al. (2016) by Lacity and Khan (2016). Their commentary caused us to reflect on some of the underlying assumptions guiding our research. In the spirit of Lacity and Khan (2016), we do not attempt to defend our research and ‘win’ the conversation. Instead, we build on their insights to contribute to this potentially fruitful conversation among IS scholars started by Lacity and Khan (2016). We are grateful for the invitation from the Journal of Strategic Information Systems (JSIS) to do this.


Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker Mar 2016

Metro Meals On Wheels Treasure Valley Employs A Low-Cost Routing Tool To Improve Deliveries, Andrew S. Manikas, James R. Kroes, Thomas F. Gattiker

IT and Supply Chain Management Faculty Publications and Presentations

In this paper, we discuss a project in which we developed a spreadsheet-based system that interfaces with a no-fee driving-directions application programming interface to quickly and accurately build a travel time and distance matrix and then rapidly determine near-optimal delivery-route schedules using a modified genetic algorithm. To the best of our knowledge, the method we used to create the travel matrix had not been employed previously in an academic study. The tool was tested and refined in a humanitarian setting—a local branch of the Meals on Wheels Association of America (now Meals on Wheels America), an organization that combats hunger …


Antitrust And Information Technologies, Herbert J. Hovenkamp Mar 2016

Antitrust And Information Technologies, Herbert J. Hovenkamp

All Faculty Scholarship

Technological change strongly affects the use of information to facilitate anticompetitive practices. The effects result mainly from digitization and the many products and processes that it enables. These technologies of information also account for a significant portion of the difficulties that antitrust law encounters when its addresses intellectual property rights. In addition, changes in the technologies of information affect the structures of certain products, in the process either increasing or decreasing the potential for competitive harm.

For example, digital technology affects the way firms exercise market power, but it also imposes serious measurement difficulties. The digital revolution has occurred in …


The Role Of Transaction Cost Economics In Information Technology Outsourcing Research: A Meta-Analysis Of The Choice Of Contract Type, Michael Schermann, Konrad Dongus, Philip Yetton, Helmut Krcmar Feb 2016

The Role Of Transaction Cost Economics In Information Technology Outsourcing Research: A Meta-Analysis Of The Choice Of Contract Type, Michael Schermann, Konrad Dongus, Philip Yetton, Helmut Krcmar

Information Systems and Analytics

Two recent reviews report that the empirical findings in information technology outsourcing (ITO) research are frequently inconsistent with the prevailing dominant analytical framework of transaction cost economics (TCE). While employing similar methodologies, the two reviews propose different strategies to resolve the inconsistencies. One is to improve the methodological rigor, specifically, the operationalization of TCE constructs. The other is to abandon TCE in favor of a new analytical framework. This paper presents a meta-analysis of the empirical findings on the choice of contract type as a function of task uncertainty. The results support both strategies. Refining the operationalization of TCE constructs, …


How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins Feb 2016

How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins

Faculty Publications

Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users' responses to security messages—discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS—cognitive neuroscience applied to information system (IS)—to shed new light …


Becoming Sustainable In Our Own Way: Sustainability At The Flagship Massachusetts Public University, Ludmilla Pavlova-Gillham, Dennis Swinford Jan 2016

Becoming Sustainable In Our Own Way: Sustainability At The Flagship Massachusetts Public University, Ludmilla Pavlova-Gillham, Dennis Swinford

Campus Planning Community and Conference Presentations

This presentation was delivered at the 2016 World Symposium on Sustainable Development at Universities . It outlines a case study of the comprehensive sustainability efforts undertaken by the University of Massachusetts Amherst and evaluates its progress by applying Kotter’s 8-step approach to change management to multiple phases of the campus development efforts. Emphasis is placed on efforts to integrate sustainability goals with campus master planning, facility plans, green building policies, governance and educational and operations teaching and research initiatives. The presentation also outlines concrete steps for comprehensive physical planning that universities may consider as they integrate change management practices for …


Real-Time Diffusion Of Information On Twitter And The Financial Markets, Ali Tafti, Ryan Zotti, Wolfgang Jank Jan 2016

Real-Time Diffusion Of Information On Twitter And The Financial Markets, Ali Tafti, Ryan Zotti, Wolfgang Jank

School of Information Systems and Management Faculty Publications

Do spikes in Twitter chatter about a firm precede unusual stock market trading activity for that firm? If so, Twitter activity may provide useful information about impending financial market activity in real-time. We study the real-time relationship between chatter on Twitter and the stock trading volume of 96 firms listed on the Nasdaq 100, during 193 days of trading in the period from May 21, 2012 to September 18, 2013. We identify observations featuring firm-specific spikes in Twitter activity, and randomly assign each observation to a ten-minute increment matching on the firm and a number of repeating time indicators. We …


Using Voicethread As An Ice Breaker Assignment, Curtis Izen Jan 2016

Using Voicethread As An Ice Breaker Assignment, Curtis Izen

Publications and Research

No abstract provided.


A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju Jan 2016

A Work System Front End For Object-Oriented Analysis And Design, Steven Alter, Narasimha Bolloju

Business Analytics and Information Systems

This paper proposes that basic ideas from the work system theory (WST) and the work system method (WSM) might serve as a front end to object-oriented analysis and design (OOAD), thereby providing a path from business-oriented descriptions to formal, technical specifications. After describing the background motivation and summarizing work system concepts, the paper uses a hiring system example to show how two tools from WSM can be used as a front end for OOAD, in effect, a step before creating use case diagrams and other types of Unified Modeling Language (UML) artifacts. Potential benefits of this approach stem from a …


A Formalism For Plan – A Big Data Personal Learning Assistant For University Students, Timothy Arndt, Angela Guercio Jan 2016

A Formalism For Plan – A Big Data Personal Learning Assistant For University Students, Timothy Arndt, Angela Guercio

Business Faculty Publications

Big Data-based methods of learning analytics are increasingly relied on by institutions of higher learning in order to increase student retention by identifying at risk students who are in need of an intervention to allow them to continue on in their educational endeavors. It is well known that e-Learning students are even more at risk of failing out of university than are traditional students, so Big Data learning analytics are even more appropriate in this context. In this paper, we present our approach to this problem. We wish to place control of a student’s learning process in his own hands, …


Enterprise It Asset Disposition: An Overview And Tutorial, Shu Z. Schiller, Jeff Merhout, Rike Sandlin Jan 2016

Enterprise It Asset Disposition: An Overview And Tutorial, Shu Z. Schiller, Jeff Merhout, Rike Sandlin

ISSCM Faculty Publications

Enterprise IT Asset Disposition (ITAD) addresses the recovery and recycling of an enterprise’s IT assets that are near or at the end of their lifecycle. The aim of ITAD is to maximize the value of investment over the IT asset’s entire lifecycle while guaranteeing data security and protecting against environmental liability. Regulatory requirements mandate specific disposal methods for computing assets, and enterprises face significant risks if they fail to comply. Despite the critical importance of ITAD, many enterprises lack a clear understanding of ITAD and its regulations and struggle with the management of ITAD processes. One solution to this challenge …