Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Business

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff Jan 2015

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff

Communications of the IIMA

The rapid advances in information and communication technologies coupled with the dominant overarching Neo-liberal/capitalist ideological underpinnings of the dominant Western powers have generated a momentum towards a homogeneous global village. The impact of which has been to expand World conflict and propelled many nations towards losing their national identity and traditions. This article discusses the various impacts from IT globalization and calls for a new global communication awareness.


A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang Jan 2015

A Networking-Based View Of Business Model Innovation: Theory And Method, Rong Fu, Li Qiu, Liang Quyang

Communications of the IIMA

After reviewing the literature, the concept of Business Model or E-Business Models are discussed in Ms paper. Firms keep interacting with each other and build all kinds of relationships among them. Based on the theory of business networks, we put forward a networking-based view of business model analysis frame. When we make decisions to choose one or other business models, first, the source of value should be found. Second, business network models, which show the procedure of value creation and distribution, should be analyzed. Third, we choose the feasible network among networks we analyzed. Finally, the firms' strategy to ensure …


Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot Jan 2015

Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot

Communications of the IIMA

University-based education is facing direct competition from for-profit corporations over the lucrative lifetime-learning market. This is occurring primarily because universities have not adapted to advances in technology and changes in the educational needs of students. To correct this problem, a new curriculum solution is proposed. This solution is loosely based upon the model curricula generated by professional organizations. The solution utilizes personal learning plans tied to a global learning schema. The end result is a very flexible curriculum delivery model that effectively utilizes modern technology and is potentially superior to any offered by commercial education providers.


Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta Jan 2015

Web Data Mining: A Case Study, Samia Jones, Omprakash K. Gupta

Communications of the IIMA

With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. The main problem related to the retrieval of information from the World Wide Web is the enormous number of unstructured documents and resources, i.e., the difficulty of locating and tracking appropriate sources. In this article, a survey of the research in the area of web mining and suggest web mining categories and techniques. Furthermore, a presentation of …


Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette Jan 2015

Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette

Communications of the IIMA

When individuals and businesses conduct transactions electronically over a network using mobile devices, they have participated in mobile e-commerce. The advantages and disadvantages of mobile e-commerce are presented in this paper. This is followed by a discussion of who is using mobile e-commerce and why they are using it. Information is also presented on how to be successful with mobile e-commerce.


The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak Jan 2015

The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak

Communications of the IIMA

Medical information has a special status among the various items of personal information. The introduction of information technology (IT) has changed the handling of medical information in ways that are both promising for improving health care as well as threatening to the individual patient's medical information privacy. The challenge to business practitioners is to manage medical information intelligently and to avoid the negative consequences of mismanaging this information, which may include customer backlash in the forms of boycotts, lawsuits, and loss of company reputation. This challenge is particularly important in the context of the U.S. National Health Information Network initiative, …


Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir Jan 2015

Utilization Of Buffers For Performance Evaluation Of Local Area Network Protocols, Sarhan M. Musa, Emmanuel Uzoma Opara, Cajetan M. Akujuobi, Nader F. Mir

Communications of the IIMA

This paper discusses the performance of traffic flow over Local Area Networks (LAN) utilizing buffers to avoid any irrelevant traffic that clusters the network using sniffer pro. The study applies buffer technology to filter out unnecessary information so the system captures only required information packets. Buffers that capture the protocols are identified. These are. Address Resolution Protocols (ARP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP). The study identified to the user/analyzer of an Ethernet technology, how to isolate a cluster network problem, monitor network performance, and offer tips on how to correctly assess …


The Business Models Of E-Marketplace, Weijun Zheng Jan 2015

The Business Models Of E-Marketplace, Weijun Zheng

Communications of the IIMA

An electronic marketplace (EM) is an inter-organizational information intermediary that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior researches on EM design have not defined EM business model clearly. With a review of existing literatures on business model, this paper developed taxonomy of EM business models and classified existing EMs business model from a network role perspective. Further discussion of the evolution of EM business model is provided at the end.


Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer Jan 2015

Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer

Communications of the IIMA

This research focused on mid-term planning representing the tactical level of supply chain management among manufacturers. Mid-term planning is based on established frame contracts between suppliers and customers. Demand forecasts and early customer orders (from retailers or consumers) are the starting point for performing planning runs involving logistical functions such as procurement, production, storage, and distribution. The aim is to draw up consistent plans among supply chain partners.


Check 21: The New Technological Drive Towards Paperless Banking, Chang-Tseh Hsieh Jan 2015

Check 21: The New Technological Drive Towards Paperless Banking, Chang-Tseh Hsieh

Communications of the IIMA

Over the last decade, banks have spent a great deal of resources on technology improvements. With decreasing interest rate spreads, banks are being forced to look for new ways to increase profits. Recently, new legislation was passed that will allow banks to become more efficient in check truncation through technology. The new legislation is commonly referred to as Check 21. If used properly. Check 21 will increase employee efficiency and reduce other operational costs such as courier services. This paper examines the short history of Check 21 and discusses how technology affects banks profitability. Key areas where banks can become …


Dell's Use Of Crm-Scm Integration To Dominate The Pc Market, Sharon Klinker, Ronald Terrell, Ahmed Y. Mahfouz Jan 2015

Dell's Use Of Crm-Scm Integration To Dominate The Pc Market, Sharon Klinker, Ronald Terrell, Ahmed Y. Mahfouz

Communications of the IIMA

Dell is one of the most successful and profitable computer corporations in history. It has been known for its innovative customer service and product custom configuration. As it continues to grow, it is faced with the challenge of how to maintain its customer relationships and inventory management, while continuing to meet the demands and requirements of its customers. This paper will examine how Dell implements enterprise-wide computing software, which profiles and targets its customers, as well as streamlines the flow of its products throughout the supply chain. Dell's collaboration with other computer software companies has allowed it to become a …


Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang Jan 2015

Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang

Communications of the IIMA

The major purpose of this paper is to investigation the issues of teaching ERP systems in a supply chain management course. The secondary purpose of the paper is to evaluate the effectiveness of students' perception of learning ERF systems in a supply chain management course.


A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka Jan 2015

A Case Study Of Cmm Deployment At Sbc Communications, James T. Sofos, Jack T. Marchewka

Communications of the IIMA

Recently, SBC Communications (SBC) initiated a project to improve the software development processes of its Information Technology (IT) group. The project was named EXPRESS (Excellence in Process for Enterprise Software Solutions), and the goal was to transform the IT function to a Capability Maturity Model (CMM) Level 3 operation. SBC's management hopes that achieving CMM level 3 will result in improved delivery of IT services and products through greater efficiency by having a standardized means to initiate and perform IT work. This paper provides a case study that describes the EXPRESS project. This will include comparing SBC's former project management …


An Empirical Application Of Delone And Mclean Model In Evaluating Decision Support System In The Banking Sector Of Oman, Anu Manchanda, Saurabh Mukherjee Jan 2014

An Empirical Application Of Delone And Mclean Model In Evaluating Decision Support System In The Banking Sector Of Oman, Anu Manchanda, Saurabh Mukherjee

Journal of International Technology and Information Management

Banks are investing a huge amount on information systems to provide fast services to their customers and to stay competitive. Therefore it becomes necessary to measure the success of these systems. The main objective of this study is to assess the applicability of DeLone and McLean model of information systems in evaluating decision support system in the banking sector of Oman and to check the relationship among variables of the model. In order to achieve the objectives, data was collected from the managers and assistant managers using decision support system in the banks of Oman. Hypotheses were tested using correlation …


A Hybrid Machine Learning System For Stock Market Forecasting, Lokesh Kumar, Anvita Pandey, Saakshi Srivastava, Manuj Darbari Jan 2011

A Hybrid Machine Learning System For Stock Market Forecasting, Lokesh Kumar, Anvita Pandey, Saakshi Srivastava, Manuj Darbari

Journal of International Technology and Information Management

A hybrid machine learning system based on Genetic Algorithm (GA) and Time Series Analysis is proposed. In stock market, a technical trading rule is a popular tool for analysts and users to do their research and decide to buy or sell their shares. The key issue for the success of a trading rule is the selection of values for all parameters and their combinations. However, the range of parameters can vary in a large domain, so it is difficult for users to find the best parameter combination. In this paper, we present the Genetic Algorithm (GA) to overcome the problem …


The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai Jan 2011

The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai

Journal of International Technology and Information Management

This research article presents a past, present and future meta analysis of information systems offshoring (ISO) research over the 2000-2010 time period. ISO has emerged as a significant sourcing strategy adopted by many organizations to manage, support and deliver their information system needs. Across the selected academic articles our findings compare research methodologies applied, client vs. vendor perspectives studied and ISO topic areas investigated. Interesting results emerge in the range and evolution of ISO research. As a result of our analysis, our findings clearly indicate areas of need for future ISO researchers to consider when conducting future ISO research.


Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre Jan 2010

Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre

Journal of International Technology and Information Management

Enterprise systems need reliable, flexible and secure means for making public and confidential information available to users in a secured and trusted manner. Although enterprise systems have variety of choice to authenticate these users, organizations face significant issues when granting access and providing a manageable structure for valuable access control. Logon functionalities such as user name and password algorithm have been used to grant authentication and authorization into enterprise systems network resources. Since most systems clients prefer the ease of using passwords, and since passwords are easily compromised, the urgency for a stronger authentication process becomes paramount. This study performed …


A Bpm-Systems Architecture That Supports Dynamic And Collaborative Processes, Pascal Ravesteijin, Martijn Zoet Jan 2010

A Bpm-Systems Architecture That Supports Dynamic And Collaborative Processes, Pascal Ravesteijin, Martijn Zoet

Journal of International Technology and Information Management

Business Process Management Systems (BPMSs) are increasingly implemented in and across organizations. However, the current combination of functionality, concepts and characteristics in BPMSs is very much based on an industrial-based view of the economy while western economies are rapidly moving towards an information and service economy in which the ratio of knowledge workers is rising dramatically. Compared to the ‘old’ type of worker the knowledge worker is typically highly educated, used to collaborating with other knowledge workers and less likely to be sensitive to a controlling style of management in the execution of his or her work. While many organizations …


A Practical Information Technology Program, Bijan Mashaw Jan 2009

A Practical Information Technology Program, Bijan Mashaw

Journal of International Technology and Information Management

This paper discusses the challenges facing business in the 21 st century and the dramatic changes in the use of computers and application development process. These challenges, as well as the increase of global economy, coupled with the demand for the business technology workers indicate the need for redesigning the Information System Curriculum. The proposed framework for an Information Technology (IT) Program in this paper offers a pragmatic curriculum model to accommodate the needs and challenges of the 21st century. The framework provides a fundamental IT education for the graduates of such a curriculum, as well as allowing an area …


Inference-Guiding On Bayesian Knowledge-Based Systems, Jinchang Wang Jan 2009

Inference-Guiding On Bayesian Knowledge-Based Systems, Jinchang Wang

Journal of International Technology and Information Management

Bayesian network is a robust structure for representing knowledge containing uncertainties in a knowledge-based system. In applications of expert systems and knowledge-based systems, it often happens that initial data are not sufficient to derive a conclusion of high enough certainty. Inference-guiding is in that case to identify the missing information, pursue its value, and lead inference to a conclusion. This paper presents and characterizes a criterion for effectively selecting key missing information, and thereby develops a “smart” inference approach with the inference-guiding function based on the newly developed criterion for uncertain inference in a Bayesian knowledge-based system.


Expanding Group Support System Capabilities From The Knowledge Management Perspective, Shin-Yuan Hung, King-Zoo Tang, Tsan-Chuan Shu Jan 2008

Expanding Group Support System Capabilities From The Knowledge Management Perspective, Shin-Yuan Hung, King-Zoo Tang, Tsan-Chuan Shu

Journal of International Technology and Information Management

A group support system (GSS) is a computer-based system that enables people in different places to discuss and make decisions on connected computers. Expanding GSS capabilities from the knowledge management perspective is believed to significantly improve the performance and satisfaction of group meetings. This study develops the organizational knowledge management process, proposed by Alavi and Leidner (2001), to expand the capabilities of a GSS. Additionally, a prototype system has been implemented. Finally, an experiment is conducted to evaluate the system and demonstrate its applicability and usability. Experimental results indicate that users perceive a web-based GSS with knowledge management capabilities to …


Similarities And Differences Of Custom Designed Erp Systems Development And Implementation In Two Cases In Services And Manufacturing, Farshad Salimi Jan 2008

Similarities And Differences Of Custom Designed Erp Systems Development And Implementation In Two Cases In Services And Manufacturing, Farshad Salimi

Journal of International Technology and Information Management

In this paper we made a comparative review of two case studies in development, design, and implementation of in-house custom-designed Enterprise Resource Planning packages in manufacturing and services. For comparison, we scanned through business solutions, tangible and intangible benefits, process of implementation, implementation problems and planning, benefits of ERP implementation, business processes, business strategies, project goals, IT infrastructure, and key critical success factors (KCSFs). The KCSFs and the important key factors were the focus point in evaluation of differences. For instance, in manufacturing, the innovation strategy was identified as an important KCSF in implementation planning phase whereas in service, understanding …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


Capturing And Shaping Shifting Requirements Using Xml And Xslt: A Field Study, Charmayne Cullom, Tod Sedbrook Jan 2007

Capturing And Shaping Shifting Requirements Using Xml And Xslt: A Field Study, Charmayne Cullom, Tod Sedbrook

Journal of International Technology and Information Management

This paper explores Extensible Mark-up Language (XML) and Extensible Stylesheet Language Transformations (XSLT) for authoring, presenting and managing system requirements. A field study is presented that explores the influence of XML schema and XSLT rendering and modeling templates on stakeholder communications. The study is of an e-commerce project where an evolving business model and changing partnerships forced the requirements team to continually adapt XML and XSLT tools to capture requirements. Coding procedures categorized resulting repositories of XML documents, XML schema, XSLT templates, stakeholder interviews, field notes, e-mails, and business documents. Qualitative techniques are applied to derive a model summarizing the …


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash Jan 2007

Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash

Journal of International Technology and Information Management

The paper reports the development of an e-monitoring and maintenance system based on web technology and mobile device, PDA. Rarity of experts led to the application of artificial intelligence and later, distributed artificial intelligence for condition monitoring and diagnosis of machine condition. Recently, web technology along with wireless communication is emerging as a potent tool in maintenance. It facilitates obtaining of the desired information by the relevant personnel at any time wherever he may be. The paper first describes the web and mobile architecture that formed the basis of the system and ICT tools used to communicate among the different …


Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava Jan 2007

Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava

Journal of International Technology and Information Management

UML is widely used as an industry standard for modeling any system. In this paper will be dealing with simple UML diagrams and show that low it can be transformed into process algebra models specially designated to model urban traffic systems. The model capture functionality at the level of mesoscopic as well as microscopic level and it is merged with process algebra’s producer consumer theory. The model is also formalized using Process algebra equations. This paper focuses on complex situational activity diagrams enhancing the expressivity by refining at the abstraction levels. Performance requirement is annotated by the UML profile for …


Using System Dynamics Approach To Construct A Performance Measurement Model For Pharmacy Supply Chain Management, Jiinpo Wu, Charlie C. Chen, Ray Tsai Jan 2006

Using System Dynamics Approach To Construct A Performance Measurement Model For Pharmacy Supply Chain Management, Jiinpo Wu, Charlie C. Chen, Ray Tsai

Journal of International Technology and Information Management

A credible performance measurement system is imperative to evaluate SCM systems effectiveness. However, commonly accepted measurements for evaluating pharmacy supply chain management (SCM) are yet to be developed. This study models the dynamic behavior of pharmacy supply chains to include managerial policies and performance measuring systems based on a well-established theoretical framework. The system dynamics methodology is adopted to simulate three scenarios: (1) demand forecasting policy, (2) market need, and (3) manufacturing errors. Simulation results lead to important policy implications of pharmacy SCM.


An Empirically Derived Taxonomy Of Information Systems Integration, Thawatchai Jitpaiboon, T.S. Ragu-Nathan, Mark A. Vonderembse Jan 2006

An Empirically Derived Taxonomy Of Information Systems Integration, Thawatchai Jitpaiboon, T.S. Ragu-Nathan, Mark A. Vonderembse

Journal of International Technology and Information Management

Information systems integration (ISI) represents the degree of cooperation in information system practices between business functions within a firm and between a firm and its trading partners. Although the establishment of information systems integration objective has been reported as one of the key concerns of top management because ISI enhances the firms’ competitiveness and growth, the classification of the information system practices and its managerial implications are still vaguely developed. The two objectives of this paper are: (1) to develop a taxonomy of information systems integration (ISI) called ISI-Matrix, and (2) to report managerial implications for matching each information system …


Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun Jan 2006

Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun

Journal of International Technology and Information Management

The study of information requirements for e-business systems reveals that the level of detail, granularity, format of presentation, and a broad range of information types are required for the applications. The provision of relevant information affects how e-business systems can efficiently support the business goals and processes. This paper presents an approach for determining information requirements for e-business systems (DIRES) which will allow the user to describe the core business processes, whose specification maps onto a business activity space. It further aids a configuration of information requirements into an information space. A case study of a logistics company in China …