Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 117 of 117

Full-Text Articles in Business

Enacted Capabilities On Adoption Of Information Systems: A Study Of Small- And Medium-Sized Enterprises, Noor Akma Mohd Salleh, Fiona Rohda Jan 2015

Enacted Capabilities On Adoption Of Information Systems: A Study Of Small- And Medium-Sized Enterprises, Noor Akma Mohd Salleh, Fiona Rohda

Communications of the IIMA

An increasing number of studies into the adoption behaviour of Information systems (IS) have focused on small- and medium-sized enterprises (SMEs). These past studies provide an understanding of the contextual factors offering a simple dichotomous measure such as adopters and non-adopters rather than the manner of usage (from adoption to utilisation). This study introduces the construct of enacted capabilities and examines the enacted capabilities that activate and stimulate SMEs to use an IS to it fullest potential. The construct is derived from the resource-based view of the firm and allows the integration of the technology acceptance model with diffusion of …


A Comprehensive Analysis Of The H-Ib And L-1 Visa Programs In The U.S. From An It Perspective, Donald R. Moscato, Eric D. Moscato Jan 2015

A Comprehensive Analysis Of The H-Ib And L-1 Visa Programs In The U.S. From An It Perspective, Donald R. Moscato, Eric D. Moscato

Communications of the IIMA

This paper analyzes the experience of the H-IB and L-1 visa programs and their impact on information technology in the United States. The topics discussed are as follows: initial justification of the programs, the relationship of the programs to outsourcing and off-shoring, who is covered by the H-IB and L-1 visa programs, utilization of the visa programs by various constituencies, the impact of the visa programs on the prevailing wage, the arguments pro and con for the program, who is on either side of the lobbying effort, protectionist legislation regarding the visa programs, fraud within the visa programs, the alleged …


Workplace Surveillance And Employee Privacy: Implementing An Effective Computer Use Policy, Scott Cox, Tanya Goette, Dale Young Jan 2015

Workplace Surveillance And Employee Privacy: Implementing An Effective Computer Use Policy, Scott Cox, Tanya Goette, Dale Young

Communications of the IIMA

Organizations face growing liability with regard to employee use of electronic resources. To mitigate the risk of liability, companies must develop and implement a computer-use policy outlining proper use of organizational electronic resources. This paper examines critical aspects of computer use policies, including: clearly explaining reasons for the policy, applying the policy to all employees including all levels of the organization, and indicating zero tolerance for offensive, harassing or discriminating communications. Finally, the paper identifies the implications of a computer usage policy.


Mobile Computing For Hospitals: Transition Problems, Warren Adis Jan 2015

Mobile Computing For Hospitals: Transition Problems, Warren Adis

Communications of the IIMA

Mobile communication devices have an untapped potential to increase the quality of healthcare services. These devices can become the backbone for a new level of hospital service. This would include improved communications among medical and support staff and increased patient monitoring using a whole new generation of RFlDs. Yet, problems come with the introduction of new technology, some anticipated, some not. This paper develops several hospital scenarios depicting possible problem areas in the conceptualizing, planning and design of future mobile networks.


War Against Spam: A Comparative Analysis Of The Us And The European Legal Approach, Sylvia Mercado Kierkegaard Jan 2015

War Against Spam: A Comparative Analysis Of The Us And The European Legal Approach, Sylvia Mercado Kierkegaard

Communications of the IIMA

Unsolicited commercial mail (also known as spam and junk mail) can inconvenience tens of millions of Internet users and impose huge costs on Internet Service Providers. Realizing the need to boost competitiveness and consumer confidence, the European Union (EU) and the United States have instituted various legal frameworks and policies to regulate unsolicited commercial mail. The EU has adopted an opt-in approach to spam mail, which means e-marketers need to seek the permission of consumers before they send out commercial emails, while the US CAN SPAM Act takes an opt-out approach. The EU's opt-in regime is viewed as offering greater …


The Diffusion Of Internet Interactivity On Retail Web Sites: A Customer Relationship Model, Noor Raihan Ab Hamid, Micheal G. Mcgrath Jan 2015

The Diffusion Of Internet Interactivity On Retail Web Sites: A Customer Relationship Model, Noor Raihan Ab Hamid, Micheal G. Mcgrath

Communications of the IIMA

The use of internet as an interactive marketing media has captured much attention from managers in their quest for a better relationship with online customers. The belief that serving existing customers are more profitable than acquiring new ones, entailing relationship building effort no longer a choice, but a necessity. This study attempted to uncover the measures of E-CRMprogram and determining the extent to which these features influence consumer satisfaction and loyalty. The findings revealed that firms should focus on ten relationship marketing measures in order to build enduring consumer relationships. Further, this study provides evidence that the implementation of E-CRM …


Web-Based Aptitude Tests At Universities In German-Speaking Countries, Michael Amberg, Sonja Fischer, Manuela Schroder Jan 2015

Web-Based Aptitude Tests At Universities In German-Speaking Countries, Michael Amberg, Sonja Fischer, Manuela Schroder

Communications of the IIMA

Universities can select their students more and more independently. In order to support the selection process, web-based aptitude tests are a possibility to balance benefits und efforts of this task. Within this paper, we will point out how current web-based aptitude tests are designed, what competences are covered, and which methods for development are used. For this purpose, we developed a classification how web-based aptitude tests are implemented. Furthermore, competences as the basis of web-based aptitude tests are appraised. Four competence categories (professional, methodological, personal, and social competences) are selected as the most appropriate pattern. Thereafter, we analyse methods for …


Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian Jan 2015

Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian

Communications of the IIMA

This paper describes a study of soft-skills training at a large Business Process Outsourcing Firm located in Bangalore, India. Soft-skills training pertains to social and customer handling skills in addition to cultural sensitization of Indians to other cultures. Soft-skills are very important for the success of BPO firms, yet there is not much in the literature that addresses soft-skills training of BPO workers. This study attempts to bridge the gap. It adopts a qualitative approach using a combination of methods such as the long interview, secondary sources research and actual observation. The results are used to develop a framework for …


Cio/Cto Job Roles: An Emerging Organizational Model, Robert C. Beatty, Kirk P. Arnett, Chang Liu Jan 2015

Cio/Cto Job Roles: An Emerging Organizational Model, Robert C. Beatty, Kirk P. Arnett, Chang Liu

Communications of the IIMA

The position of Chief Information Systems Officer (CIO) has become a daunting job due to the myriad of business and technical responsibilities assigned to the organization's top information systems (IS) executive. CIOs are being asked to successfully ensure the firm's IS investments are continually aligned with its strategic business objectives, while also planning and maintaining an IT infrastructure that will meet the firm's current and future information processing needs. Many CIOs are finding it extremely difficult to balance the two key roles of technician and businessperson successfully. Many business experts that have analyzed this problem have concluded that the tasks …


Implementing Self-Service Technology To Gain Competitive Advantages, Chang-Tseh Hsieh Jan 2015

Implementing Self-Service Technology To Gain Competitive Advantages, Chang-Tseh Hsieh

Communications of the IIMA

Choosing, implementing and managing effective self-service technologies are challenging tasks for most firms. While some self-service technologies could be quickly adopted, others are resisted. This paper examines what a firm should consider in order to encourage customers to at least try, and eventually adopt, the SST offered by a firm into the customer's regular routine. Factors that encourage the customer to try a new self-service technology for the first time and factors impact customer satisfaction and dissatisfaction will be addressed. A practical guideline for developing and implementing successful SST will be proposed.


Towards An Agile Approach To Software Process Improvement: Addressing The Changing Needs Of Software Products, Ian Allison Jan 2015

Towards An Agile Approach To Software Process Improvement: Addressing The Changing Needs Of Software Products, Ian Allison

Communications of the IIMA

This paper highlights the need for greater agility and flexibility in the process improvement activity. The ideas presented here relate to aspects that have arisen from a case study of a global software product organisation. A model of how software process improvement can be agile in nature is proposed. This model is intended as indicative of the issues that need consideration by IS management. The model highlights the need to learn to improve through situated practice within an organisational framework that supports the needs of the business.


Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard Jan 2015

Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard

Communications of the IIMA

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …


Characteristics Of The Multiple Attribute Decision Making Methodology In Enterprise Resource Planning Software Decisions, Edward W.N Bernroider, Johann Mitlohner Jan 2015

Characteristics Of The Multiple Attribute Decision Making Methodology In Enterprise Resource Planning Software Decisions, Edward W.N Bernroider, Johann Mitlohner

Communications of the IIMA

Realising information technology (IT) decisions and implementations are consistently seen as major challenges of business management faced with increasingly complex IT environments. This article seeks to increase the awareness of the multiple attributive decision making methodology (MADM) in the context of enterprise resource planning (ERP) projects and provides empirical insights based on 209 datasets originating from a primary, national and industry independent survey. The given MADM topics comprise strategic alignment, attributes with associated importance weightings, considered and chosen systems, methodical utilisation, follow-up controlling, andfinally MADM relevance in terms of a possible connection between MADM and ERP success. The results in …


The Development Of A Thorough Test Plan In The Analysis Phase Leading To More Successful Software Development Projects, Jim Nindel-Edwards, Gerhard Steinke Jan 2015

The Development Of A Thorough Test Plan In The Analysis Phase Leading To More Successful Software Development Projects, Jim Nindel-Edwards, Gerhard Steinke

Communications of the IIMA

A critical problem in many software development projects is missing some important requirements until late in the development life cycle. The impact of a missing or misunderstood requirement can add to the project cost and delay product launch due to rework both of the application code, documentation updates, and addition test passes. Building a thorough test plan very early in the product development cycle has the potential for early discovery of missing requirements with attendant reduction in project costs and schedule improvement. In this paper we discuss some of the causative factors of how and why requirements can be missed …


Measuring The Accessibility Of The U.S. State Government Web Sites, Jennifer Daniels White, Tanya Goette, Dale Young Jan 2015

Measuring The Accessibility Of The U.S. State Government Web Sites, Jennifer Daniels White, Tanya Goette, Dale Young

Communications of the IIMA

Web accessibility has become an important issue since the dramatic rise in the use of the Web. Web accessibility deals with overcoming barriers users with disabilities face when trying to access information on Web sites. The U.S. has passed laws relating to Web accessibility to improve the usability of the Internet for disabled users. Technical advancements have improved assistive tools such as page readers for users with disabilities, but accessibility requires more than assistive tools. Web page design causes many accessibility problems. This study examines the accessibility of the home pages of the official government Web sites of the 50 …


A Comparative Study Of Business Process Reengineering In China, Xin James Hin Jan 2015

A Comparative Study Of Business Process Reengineering In China, Xin James Hin

Communications of the IIMA

This research investigates the current status of business process reengineering (BPR) in China by answering the following two questions: How do Chinese business executives view benefits, critical success factors, and major obstacles of BPR implementation? What are the managerial implications of BPR in China? Data were collected by means of survey questionnaires to senior managers in Beijing and Shanghai. Of the 195 survey questionnaires out, 110 usable returns were received, a 56.4 return rate. As far as the 110 usable returns are concerned, 62.4% of them were answered by presidents, vice presidents, chief financial officers (CFG) or chief information officers …


Critical Success Factors For The Implementation Of Business-To- Business Electronic Procurement, Rebecca Angeles, Ravinder Nath Jan 2015

Critical Success Factors For The Implementation Of Business-To- Business Electronic Procurement, Rebecca Angeles, Ravinder Nath

Communications of the IIMA

This article investigates the critical success factors of e-procurement—the purchase of goods and services for organizations, which usually represents one of the largest expense items in a firm's cost structure. Data was gathered using the survey method and a random sample drawn from the membership of the Institute for Supply Management and the Council of Logistics Management. Data was analyzed from 74 firms that implemented e-procurement. Factor analysis resulted in a four-factor solution: (1) factor one suggests the rationalization of the firm's management of its suppliers; (2) factor two calls for redesigning affected business processes and influencing end-user/employee procurement-related behaviors; …


Optimizing Data Warehousing Startegies, Joseph O. Chan Jan 2015

Optimizing Data Warehousing Startegies, Joseph O. Chan

Communications of the IIMA

Database technologies have evolved over the last two decades into different constructs to support the ever-growing information needs for organizations spanning the spectrum of operational and analytical processing. The paper examines the characteristics of transactional databases, operational data stores, data warehouses and virtual data warehouses. A framework is developed for an optimal data warehousing strategy based on organizational needs classified by the types of business processes defined by the requirements of supporting functional areas and the levels of decision structures. Enterprise architecture is described to provide an integrated and complimentary view of various data warehousing constructs.


Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke Jan 2015

Review Of It Offshore Outsourcing Issues, Helen M. Carothers, Gerhard Steinke

Communications of the IIMA

This paper attempts to take an objective look at offshore outsourcing within the information technology (IT) industry. Background material is provided to establish a clear definition and context for the discussion. Basic benefits, risks, and trends are identified and domestic market impacts are explored.


Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen Jan 2015

Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen

Communications of the IIMA

This study aims to finding the factors that affect the adoption of web services technology. The study proposes a web service technology adoption model in which three contexts from Tornatzky and Fleischer's (1990) framework, namely, external environmental context, technological context and organizational context, and two constructs from the TAM (Davis, 1989) model, perceived usefulness and perceived ease of use, are studied to determine their influence on web services adoption. Exploratory factor analysis is used to explore the factors affecting the adoption of web services technology. Structural Equation modeling is used to validate and analyze the research model.


Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb Jan 2015

Policies, Procedures, And Devices Used By U.S. Hospitals For Hipaa Privacy And Security Compliance, Diane C. Davis, Jeff Squibb

Communications of the IIMA

The purpose of the study was to identify the policies and procedures required in U.S. hospitals to meet the requirements of the Health Information Portability and Accountability Act (HIPAA). A major aspect of the study focused on the degree of change required to meet the security standards and on the types of security devices used by the hospitals. Findings from a survey of 286 U.S. hospitals found the greatest amount of change needed to meet HIPAA security compliance were changes resulting in increased Information Systems (IS) budget requirements, changes to network monitoring, and additional hiring in the IS department.


An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones Jan 2015

An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones

Communications of the IIMA

Electronic Data Interchange (EDI) is widely regarded by organizations worldwide as the business standard for the timely and secure exchange of electronic business transactions in an expanding global marketplace. While numerous research efforts have explored how the adoption, implementation, and integration of this technology can impact an organization's technical, organizational, and competitive environment - few studies have documented the process used by organizations to implement EDI transaction sets with trading partners. This paper advances an innovative lifecycle used by a food manufacturing company to successfully design, implement, and test an EDI transaction set. This paper also describes how this transaction …


The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul Jan 2015

The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul

Communications of the IIMA

This paper investigates the interrelationship and effect of trust and culture on the level of goal setting within the context of information systems security. In doing so, it explores and discusses the concepts of trust and strong culture and seeks to demonstrate their importance in setting efficiently information systems security goals. The paper contributes to interpretive information systems research with the study of goal setting in a security management context and its grounding within an interpretive epistemology.


Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie Jan 2015

Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie

Communications of the IIMA

The number of severe computer security breaches in e-commerce applications has been on the increase over the last few years. This has become one of the biggest security problems in recent years. Although there are tools to build e-commerce application firewalls to alert and prevent intruder attacks, these tools are not trivial to install (they are not plug-and-play). Internet intruders can create havoc and produce catastrophe results by exploiting weaknesses in e- commerce applications. Therefore, developers of e-commerce web sites have to incorporate ways to systematically identify and eliminate vulnerabilities in the EC applications to enhance their security. This paper …


Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen Jan 2015

Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen

Communications of the IIMA

Facing the competitive pressure from new hospitals and new regulations from the Bureau of National Health Insurance, hospital managers in Taiwan are concentrating on reducing the hospital operation costs and improving the healthcare quality. Practitioners and academic researchers agree that reducing the pharmacy cost is one of the best solutions to sustain competitive advantage. As electronic commerce becomes popular in many industry sectors, e- procurement is growing rapidly in the healthcare industry. The purpose of this paper is to investigate the managers' perceptions of benefits of using electronic procurement system. After surveying 152 hospitals in Taiwan, we find that hospital …


Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka Jan 2015

Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka

Communications of the IIMA

This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm's president supported the project to the extent that it …


Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani Jan 2015

Likelihood Of Purchase On-Line: Reliability, Security, And Design, Milam Aiken, Mahesh B. Vanjani

Communications of the IIMA

Several factors can influence a consumer's likelihood of purchasing on the Web including trust, ease-of-use, and price discounts. This study examines over a dozen different variables that affect the decision to conduct business online. A survey of experienced Web users validated that poor design, security, and reliability tend to decrease a person's willingness to purchase through the Web.