Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (9)
- Physical Sciences and Mathematics (9)
- Databases and Information Systems (7)
- Management Information Systems (4)
- Social and Behavioral Sciences (4)
-
- Business Administration, Management, and Operations (3)
- Business Intelligence (3)
- Business Law, Public Responsibility, and Ethics (3)
- Management Sciences and Quantitative Methods (3)
- Psychology (3)
- Information Security (2)
- Medicine and Health Sciences (2)
- Sociology (2)
- Applied Behavior Analysis (1)
- Arts and Humanities (1)
- Community-Based Learning (1)
- E-Commerce (1)
- Education (1)
- Ethics and Political Philosophy (1)
- Finance and Financial Management (1)
- Health Information Technology (1)
- Human Resources Management (1)
- Insurance (1)
- International Business (1)
- Marketing (1)
- Marriage and Family Therapy and Counseling (1)
- Mental and Social Health (1)
- Organizational Behavior and Theory (1)
- Other Business (1)
- Keyword
-
- Information science (7)
- Information technology (6)
- Business (1)
- Business Intelligence (1)
- Business Strategy (1)
-
- CIO (1)
- Chief Information Officer (1)
- Classification (1)
- Cloud computing (1)
- Compliance (1)
- Computer Science (1)
- Computer science (1)
- Construct development (1)
- Consumer Control (1)
- Creativity (1)
- Data Mining (1)
- Design (1)
- Effectiveness (1)
- Ethical behavior model (1)
- Ethics (1)
- Exceptional (1)
- Experimental (1)
- Externalization (1)
- Fair Information Practices (1)
- Feature Selection (1)
- Health care management (1)
- Human Resource Analytics (1)
- Human Resource Systems (1)
- Human Resource Technology (1)
- IS Strategy (1)
Articles 1 - 12 of 12
Full-Text Articles in Business
An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton
An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton
CCE Theses and Dissertations
Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness.
While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance …
An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown
An Information Privacy Examination Of The Practices Of Pharmaceutical Companies Regarding Use Of Information Collected Through Their Websites, Shonda Dellena Brown
CCE Theses and Dissertations
Consumers have begun to take a more proactive approach to their healthcare by accessing pharmaceutical companies Websites to obtain health and drug information, support groups, rebates, coupons, as well as free drug trials. In exchange for these benefits, companies require consumers to voluntarily disclose information. However, research has shown that consumers continue to be concerned about how their information is managed, used, and distributed by companies, especially if accessed via the Web. To date, there has been limited empirical research to examine the actual online practices of companies when it comes to privacy, especially those of pharmaceutical companies. Using Delphi …
An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley
CCE Theses and Dissertations
Business intelligence (BI) systems have been widely recognized as a leading technology for many years. However, despite the high priority and importance placed on BI, there has been a significant lack of BI system implementation (BISI) success. BI systems are not considered to be conventional information systems (IS) and often rely on the integration of a complex information infrastructure. Consequently, the degree of information quality (IQ) and system quality (SQ) have not met expectations for BISI success.
This study was designed to determine how an organization may gain benefits in the context of BISI by uncovering the antecedents and critical …
Corporate Diversification And Ceo Turnover Among Financially Distressed Firms, Jana Lynn Cook
Corporate Diversification And Ceo Turnover Among Financially Distressed Firms, Jana Lynn Cook
HCBE Theses and Dissertations
A comprehensive examination of the differences in compensation and turnover between domestic and multinational firms in distress from 2003 - 2008 was completed. An examination of three major theories of turnover is examined within the boundaries of distressed firms and support is found for the Scapegoat Theory as proposed by Huson in 2004. The results found no significant differences between total compensation levels between domestic and international firms. And with turnover rates of 26 percent and 51 percent, these groups have only board size as a significant impacting variable.
Adoption Factors Impacting Human Resource Analytics Among Human Resource Professionals, Roslyn Vargas
Adoption Factors Impacting Human Resource Analytics Among Human Resource Professionals, Roslyn Vargas
HCBE Theses and Dissertations
In today’s fast paced, ever-changing world, one cannot help hearing the terms Big Data and analytics. The Internet holds vast amounts of data and this data, for example in retail, is being used to predict shopping habits, current needs, trends, and more. Why should this be limited to the retail side of an organization? Today, there is a more significant push for Human Resource (HR) professionals to be strategic business partners, and, therefore, HR professionals need to work on leading, not lagging, in the area of measurements and analytics. Some organizations that have adopted the use of analytics in their …
Balancing Act: Successfully Combining Creativity And Accountability In The Practice Of Marriage And Family Therapy, Nathalie Duque Bello
Balancing Act: Successfully Combining Creativity And Accountability In The Practice Of Marriage And Family Therapy, Nathalie Duque Bello
Department of Family Therapy Dissertations and Applied Clinical Projects
The conditions that allowed early MFTs the freedom to creatively explore different interventions and theories of change are no longer available in today’s mental health care system. Although there are many benefits to the structure of managed behavioral healthcare organizations, a thorough review of the literature demonstrates that many therapists working in managed care agencies struggle with maintaining their theoretical creativity, claiming third-party payers’ service requirements and paperwork a barrier to their creativity. A phenomenological transcendental research method was utilized to understand the phenomenon of successfully combining creativity and accountability in the practice of marriage and family therapy from the …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
Designing An Effective Information Security Policy For Exceptional Situations In An Organization: An Experimental Study, George S. Antoniou
CCE Theses and Dissertations
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that violate the terms of an information security policy because strict compliance with the policy could cause the organization to …
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray
CCE Theses and Dissertations
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
Feature Selection And Classification Methods For Decision Making: A Comparative Analysis, Osiris Villacampa
CCE Theses and Dissertations
The use of data mining methods in corporate decision making has been increasing in the past decades. Its popularity can be attributed to better utilizing data mining algorithms, increased performance in computers, and results which can be measured and applied for decision making. The effective use of data mining methods to analyze various types of data has shown great advantages in various application domains. While some data sets need little preparation to be mined, whereas others, in particular high-dimensional data sets, need to be preprocessed in order to be mined due to the complexity and inefficiency in mining high dimensional …
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen
CCE Theses and Dissertations
While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …
Implicit Measures And Online Risks, Lucinda W. Wang
Implicit Measures And Online Risks, Lucinda W. Wang
CCE Theses and Dissertations
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and dominates human being’s decision-making. A theoretical model in which implicit risk perception precedes explicit risk evaluation is proposed. The research model proposes that implicit risk affects both explicit risk and the attitude towards online purchase. In a direct path, the implicit risk affects attitude towards purchase. In an indirect path, the implicit risk affects explicit risk, which in turn affects attitude towards purchase.
The stimulus used …