Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 117

Full-Text Articles in Business

Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller Jan 2015

Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller

Communications of the IIMA

The Semantic Web is expected to be the next generation of the WWW. Ontologies and agents are major ingredients of the Semantic Web. In (Lee and Geller 2005), we have argued that some existing ontologies make use of unnatural concepts. We stated that unnatural concepts make it difficult to use an ontology and they contradict the purpose of an ontology, which includes explanatory power for the purpose of sharing information. In this paper we elaborate what makes a concept unnatural. We also analyze existing ontologies to get numeric measures of how natural their concepts are.


It Transformation Decision Processes: A Conceptual Framework For Efficiency/Effectiveness Optimization, Jurgen Reiner, Volker Stix Jan 2015

It Transformation Decision Processes: A Conceptual Framework For Efficiency/Effectiveness Optimization, Jurgen Reiner, Volker Stix

Communications of the IIMA

Decision processes are complex managerial challenges for long-term information technology (IT) initiatives with an organization-wide scope (in short: IT transformations). Costs, benefits, and risks of such IT investments are hard to capture, and the dozens ofprescriptive methods proposed for IT project evaluation have proved to contribute little to solve the dilemma in practice. Thus, as opposed to continue the search for another prescriptive evaluation methodology, this paper follows a new approach: it targets the development of a conceptual framework that allows for the improved management of holistic IT decision processes - as opposed to cook-book approaches that attempt optimizing the …


A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel Jan 2015

A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel

Communications of the IIMA

A great deal of research is focused on formation of a data warehouse. This is an important area of research as it could save many computation cycles and thus allow accurate information provided to the right people at the right time. Two considerations when forming a data warehouse are data cleansing (including entity resolution) and with schema integration (including record linkage). Uncleansed and fragmented data requires time to decipher and may lead to increased costs for an organization, so data cleansing and schema integration can save a great many (human) computation cycles and can lead to higher organizational efficiency. In …


Explicitly Stated Security Policies Of Web Sites Of Global Banks Of Europe, Australia, Asia And The U.S, Donald R. Moscato, Eric D. Moscato Jan 2015

Explicitly Stated Security Policies Of Web Sites Of Global Banks Of Europe, Australia, Asia And The U.S, Donald R. Moscato, Eric D. Moscato

Communications of the IIMA

This paper is the latest component of a research project conducted by the authors over a three-year period. The first phase emphasized the privacy policies of global banks and other businesses engaged in E-commerce. Over 600 individualized web-sites were visited and evaluated. This, the second phase of the research project, focuses on the security policies in place for global financial institutions. The purpose of this research study is to review, compare and summarize the security policies of global banks as they are expressed on their web sites. A total of over 300 web sites of global banks were included in …


A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka Jan 2015

A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka

Communications of the IIMA

Recently, SBC Communications (SBC) initiated a project to improve the software development processes of its Information Technology (IT) group. The project was named EXPRESS (Excellence in Process for Enterprise Software Solutions), and the goal was to transform the IT function to a Capability Maturity Model (CMM) Level 3 operation. SBC's management hopes that achieving CMM level 3 will result in improved delivery of IT services and products through greater efficiency by having a standardized means to initiate and perform IT work. This paper provides a case study that describes the EXPRESS project. This will include comparing SBC's former project management …


A Case Study Of Pratt And Whitney Aircraft's Commercial Spares Planning, Vincent A. Mabert, Ashok Soni, Gerard Campbell Jan 2015

A Case Study Of Pratt And Whitney Aircraft's Commercial Spares Planning, Vincent A. Mabert, Ashok Soni, Gerard Campbell

Communications of the IIMA

This case study, which can be used as a teaching case, deals with jet engine spare parts planning at Pratt and Whitney Aircraft Company, a division of United Technologies Corporation. The case includes background on the company's history and an overview of their jet engine manufacturing operations. The primary focus of the case is on the application and evaluation offorecasting models for demand planning within an ERF system environment. An Excel-based decision support system (DSS), which is available from the authors upon request, enables the evaluation of alternative time series forecasting models for a variety of jet engine spare parts. …


Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago Jan 2015

Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago

Communications of the IIMA

While much has been studied and written about the adjustments managers must make when supervising remote workers in virtual work arrangements, little has been written about the potential change in the organizational culture and the effect the culture has on the virtual worker's quality of work life and professional isolation. Not only may culture affect the implementation and success of telecommuting arrangements, but the increased isolation and independence of a virtual worker may impact the culture surrounding remote workers and create an organizational subculture. This study examines the relationship between quality of work life, professional isolation, and an organization's cultural …


Status Of E-Government In Texas Metropolitan Areas, Mahesh B. Vanjani, Douglas A. Goings, Clare Bailey Jan 2015

Status Of E-Government In Texas Metropolitan Areas, Mahesh B. Vanjani, Douglas A. Goings, Clare Bailey

Communications of the IIMA

The internet and e-commerce technologies have already altered the way businesses operate. In the recent past, E-govemment has attempted to emulate the success of e-commerce organizations. This paper explores the status of e-govemment in metropolitan areas in Texas. The paper focuses on metropolitan areas since, based on reports on online usage in the US, rural areas still lag behind the metro areas. Consequently, rural counties, in general, have not developed their official e-govemment web sites as much as have counties in metropolitan areas.


Understanding The Adoption Behavior Of Indian Consumers: The Key To Enhance The Diffusion Of Personal Computers, Chitra Krishnaswamy Jan 2015

Understanding The Adoption Behavior Of Indian Consumers: The Key To Enhance The Diffusion Of Personal Computers, Chitra Krishnaswamy

Communications of the IIMA

The market for personal computers, particularly in the household segment, is burgeoning on account of the liberalization, privatization and globalization measures initiated by Government of India. Consequently competition to win over the PC market has intensified. This scenario has enhanced the need for understanding the adoption behavior of the personal computer which would enable marketers to arrive at strategies corresponding to the target markets socio, economic, political, cultural and competitive setting at the macro level and adopter-centered approach at the micro level. This study is based on the collection of primary data from 335 adopters of personal computers and 165 …


On The Applicability Of Data Envelopment Analysis For Multiple Attriliute Decision Making In The Context Of Information Systems Appraisals, Edward W.N. Bernroider, Volker Stix Jan 2015

On The Applicability Of Data Envelopment Analysis For Multiple Attriliute Decision Making In The Context Of Information Systems Appraisals, Edward W.N. Bernroider, Volker Stix

Communications of the IIMA

This article elaborates on the applicability of basic and extended data envelopment analysis (DEA) models for various information system (IS) decision use-cases including illustrative examples from an enterprise resource planning (ERP) software investment appraisal. The usage of data envelopment analysis models and their extensions for IS decisions remains limited. This omission seems critical in particular for two reasons. First, organizational studies have shown that in practice business management fails to appreciate the portfolio of investment appraisal techniques available. Second, DEA based methodologies, especially new extensions, promise valuable insights to support the complex IS decision problem. The results indicate DEA applicability …


Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii Jan 2015

Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii

Communications of the IIMA

Union membership has undergone a dramatic decline and some have hailed the internet as a means for unions to reverse their membership declines. This study examines the usability of union websites. The content of union websites has been analyzed, but the usefulness of that content, and the overall usability of the websites, has not been assessed. In order for unions to fully utilize the internet and realize the potential benefits of cyberspace usage, they must provide websites that users find easy to use and that provide useful content. This study employs Hassan and Li's (2005) benchmarking approach in order to …


Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau Jan 2015

Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau

Communications of the IIMA

The establishment of an organizational help desk (HD) is to provide technical support to users when they encounter technical problems related to hardware, software and network connections. Due to the lack of resources, users often have to wait for a considerably long time before their enquiries and problems are answered and solved. This paper discusses the background of HD and its existing challenges. The application of Knowledge Management (KM) techniques and Knowledge Management System (KMS) enables HD to manage its knowledge effectively. In addition, the combination is capable of relieving the overloaded HD by shifting some of the troubleshooting responsibilities …


Design And Implementation Of A Web Usage Mining Model Based On Upgrowth And Preflxspan, Hengshan Wang, Cheng Yang, Hua Zeng Jan 2015

Design And Implementation Of A Web Usage Mining Model Based On Upgrowth And Preflxspan, Hengshan Wang, Cheng Yang, Hua Zeng

Communications of the IIMA

Web Usage Mining (WUM) integrates the techniques of two popular research fields - Data Mining and the Internet. By analyzing the potential rules hidden in web logs, WUM helps personalize the delivery of web content and improve web design, customer satisfaction and user navigation through pre-fetching and caching. This paper introduces two prevalent data mining algorithms - FPgrowth and PrefixSpan into WUM and they are applied in a real business case. Maximum Forward Path (MFP) is also used in the web usage mining model during sequential pattern mining along with PrefixSpan so as to reduce the interference of "false visit" …


Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart Jan 2015

Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart

Communications of the IIMA

The rapid evolution of information technology over the past several decades has opened many new and unique modes of communication. Clearly, the web is one such technology. However, it is quite possible that a fascination with the technology per se can hinder participants from one of its main functions— effective communication. The following essay explores a return to the basics of designing an effective web-based communication strategy. The key components of this strategy are: 1) consistent look and feel, 2) conceptual consistency, and 3) positive attention.


Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas Jan 2015

Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas

Communications of the IIMA

Suppose that a project consists of n separate tasks and one and only one task can be completed in one time period. However, since some tasks can be started only before others have been completed, only feasible task schedules are considered. There is a cost associated with the time at which a task is completed and the project cost is equal to the sum of all the task costs. How can a feasible task schedule with minimum project cost be found for completing the entire project? This research proposes using a genetic algorithm to solve this problem efficiently.


Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre Jan 2015

Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre

Communications of the IIMA

As online security threats continue to spread, protecting valuable data becomes one of the security challenges businesses face in today's business-to-customer (B2C) and business-to-business (B2B) ecommerce. Biometrics technology shows increased promise in enterprise network security. It will play a vital role as system developers fortify the security apparatus of its organization. In this paper, we analyze biometrics technologies and describe techniques that can be utilized to decrease the probabilities of online attacks.


Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette Jan 2015

Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette

Communications of the IIMA

The purpose of this paper is to detail the barriers to the integration of technology in US school systems. The harriers experienced by both individual teachers and to school systems as a whole are discussed. Student barriers, such as computer skill levels or poverty, are also discussed. In addition, this paper explains how technology should be used and the measurable benefits of doing so. Measurable benefits reported in the literature include increased performance on measures of reading comprehension, writing, components of IQ, transfer to novel tasks, and grade point average. Closing comments focus on how technology integration must be an …


Up From The Ashes: The Tippingpoint Technology Case, Bruce A. White Jan 2015

Up From The Ashes: The Tippingpoint Technology Case, Bruce A. White

Communications of the IIMA

In the legend of the Phoenix bird, the bird dies on a fiery pyre, but arises from the ashes. This is a case that parallels that legend. It's a case showing a technology company that almost died, but came back stronger. As NetPliance, it developed and marketed a "thin client," bare-bones Internet Appliance in the Business to Consumer B2C area. As the reorganized TippingPoint Technologies, it has become a leader in the intrusion prevention system area, using hardware and networking technologies in the Business to Business environment. Instead of just detecting viruses, spam, spyware and other negative attacks that have …


Disaster Planning And Management, Holmes E. Miller, Kurt J. Engemann, Ronald R. Yage Jan 2015

Disaster Planning And Management, Holmes E. Miller, Kurt J. Engemann, Ronald R. Yage

Communications of the IIMA

Recent events such as hurricanes, tsunamis, earthquakes, power outages, and the threat of pandemics have highlighted our vulnerability to natural disasters. This vulnerability is exacerbated by many organizations' increasing dependence on computer, telecommunications, and other technologies, and trends toward integrating suppliers and business partners into everyday business operations. In response many organizations are implementing disaster recovery planning processes. In this paper we discuss how to identify threats and scenarios; how to articulate the disaster recovery strategies; and four elements of the generic disaster recovery plan: Mitigation, preparedness, response, and recovery. We then provide examples of software that can help disaster …


Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan Jan 2015

Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan

Communications of the IIMA

VoIP is a relatively new technology. Current research suggests that firms are using VoIP technology to cut costs, to improve productivity, and the firm's strategic position. The literature is rich with "how to " articles and a discussion ofpossible benefits, costs, and implementation barriers. But, very few academic studies exist. The purpose of this study is to identify and present the issues related to VoIP adoption and implementation.


An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young Jan 2015

An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young

Communications of the IIMA

The Web is becoming more important for communication andfor data access. Unfortunately, not all Web sites are accessible for all users. Web accessibility is concerned with overcoming the barriers that users with disabilities face when they try to access information on Web sites. Currently, for disabled users, the Web presents many barriers that make it dijfiult to use. These barriers can be addressed by organizational commitment and by improved development techniques. This paper examines how Web accessibility standards and legal mandates are affecting the design of corporate and governmental Web sites, and how the rate of adoption can be improved …


Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom Jan 2015

Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom

Communications of the IIMA

Much has been written about the failure of software development projects. The importance of good software to business cannot be underestimated. A major issue is quality of the software being written and produced. Over the years, the emphasis for improvement in software development has been to change the process. Unified Modeling Language is but one of a long line of changes in software development process starting with structured programming introduced in the seventies to object oriented programming in nineties. However, several software development experts have begun to assert that the problem may not be with the process employed but rather …


An Investigation Of Digital Certificates For Government Officials: A Thailand Case, Waraporn Jirachiefpattana, Ajin Jirachiefpattana Jan 2015

An Investigation Of Digital Certificates For Government Officials: A Thailand Case, Waraporn Jirachiefpattana, Ajin Jirachiefpattana

Communications of the IIMA

Digital certificates are the building blocks of Public Key Infrastructure (PKI) that create and manage electronic credentials, allowing the use of digital signatures and their underlying keys and certificates across the Internet. This infrastructure is very important for e-service, e-commerce and even egovernment in Thailand. Thailand's Ministry of Information and Communication Technology (MICT) issued digital certificates for Thai government officials as a part of the national ICT master plan (IT 2010). Therefore, the aim of this paper is to examine how this project was initiated, planned, carried out, terminated and evaluated, and how appropriate risk strategies were formulated.


Technological, Organizational, And Environmental Antecedents To Web Services Adoption, Susan K. Lippert, Chittibabu Govindarajulu Jan 2015

Technological, Organizational, And Environmental Antecedents To Web Services Adoption, Susan K. Lippert, Chittibabu Govindarajulu

Communications of the IIMA

The proliferation of web services within the last two years enables organizations to assimilate software and services from different companies and locations into an integrated service capable of streamlining important processes. Widespread adoption of web services has not yet occurred across all industries. To better understand the key determinants of web services adoption at the firm level, a conceptual model of factors impacting web services adoption was developed. The conceptual model was grounded in the technology-organization-environment (TOE) framework (Tomatzky and Fleischer, 1990) to support the formulation of eleven propositions that may affect adoption and continued utilization of web services. Specifically, …


To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson Jan 2015

To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson

Communications of the IIMA

The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum.


Competing Next Generation Wireless Technologies, Warren Adis Jan 2015

Competing Next Generation Wireless Technologies, Warren Adis

Communications of the IIMA

Wireless computing is facing a choice concerning the next telecommunication standard. Two of the new and competing protocol standards for local area and personal networking are 802.1 In and Ultra Wide Band. Each one has its own strengths and weaknesses and both will change wireless networking by dramatically increasing the transmission speed, the QoS and the security of the broadcast. Yet decisions have to be made about which protocol to adopt. The choice rests on a deeper understanding of each protocol, its evolution, compatibility and future direction. This paper analyzes these two competing protocols, discussing their performance and probability for …


The Anatomy Of Real-Time Crm, Joseph O. Chan Jan 2015

The Anatomy Of Real-Time Crm, Joseph O. Chan

Communications of the IIMA

In the digital economy of the 21st century, the focus of production efficiency and product differentiation is shifted to value creation and relationship management. Customer relationship management is a critical business strategy in gaining competitive advantages. The ubiquity of the Internet has changed the way businesses are conducted. Real-time CRM is becoming increasingly significant to enable the agility of businesses to provide quick, accurate and complete responses to customer needs. This paper examines the structural makeup of real-time CRM that consists of e-business enabled CRM (ECRM), knowledge enabled CRM (KCRM) and business intelligence enabled CRM (ICRM). An architecture is developed …


Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson Jan 2015

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson

Communications of the IIMA

Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.


The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris Jan 2015

The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris

Communications of the IIMA

This manuscript examines the evolution of internet value systems in the motion control industry. We believe the primary reason behind the inconsistent performance of that industry's adoption of the internet in the supply channel was largely due to poor strategy. Using a the concepts of bias exchanges and game theory it is suggested that intemet strategies such as disintermediation and first-mover advantage were elusive because firms focused too much on technology and not enough on customer value. Lessons for managers and future decisions are offered.


A Comprehensive Study On The Differences Between Mrp And Erp Implementation, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh Jan 2015

A Comprehensive Study On The Differences Between Mrp And Erp Implementation, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh

Communications of the IIMA

This paper presents a comprehensive study on the fundamental differences between Material Requirements Planning (MRP) and Enterprise Resource Planning (ERP) systems. In order to reduce the complexity in undertaking such a comprehensive study, the study is performed in a number of steps such as 1) Comparative analysis of the differences in Key Critical Success Factors (KCSFs) in MRP implementation with those in ERP implementation in the period prior to the millennium change, 2) Comparative analysis of the differences in KCSFs in MRP implementation with those of ERP implementation in the post millennium-change period, and 3) How the perceptions of the …