Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Business

Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar Mar 2013

Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar

Amit Deokar

Collaboration activities are particularly difficult in e-learning environments, where the intention is to provide students with valuable learning experiences through working in teams and sharing a common goal. These activities are often conducted in an ad hoc manner with lack of proper assessment and control over learning outcomes. In this article, we propose the idea of enhancing the effectiveness of collaborative e-learning practices through structured collaborative e-learning processes and integrated assessment mechanisms. The structuring of collaboration processes is suggested through the application of successful collaboration process patterns, while the integrated assessment is suggested through assessing not just the end learning …


Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters Mar 2013

Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters

Amit Deokar

Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasoned Action (TRA) and ethics theories; deontology and teleology, to examine users’ behavioral intention to comply with ISPs. This is a research in progress, and an instrument is under development to conduct a survey study to gather data from employees in the banking sector in …


Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs Mar 2013

Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs

Amit Deokar

The Midwest chapter of the Association for Information Systems (MWAIS) was authorized as an official chapter of AIS during Fall of 2005. MWAIS is hosting its 7th research conference. Overall the Chapter has been successful in providing a forum to share ideas in traditional ways. As we broaden our leadership team and move to empower new leaders, this meeting is an excellent venue to share novel program ideas and discuss future directions.


A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar Mar 2013

A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar

Amit Deokar

In order to support effective and efficient business process management, it is imperative that the process management lifecycle be integrated with risk management knowledge. In this regard, this article presents a knowledge-based approach to integrating risk management with business process management. The adopted approach is based on conversational case-based reasoning (CCBR) with the objective to provide support in developing an appropriate risk management strategy for an ongoing workflow instance. This approach builds on the notion of integrating risks within business process models. A prototype is currently under development, which will assess the feasibility of this approach. We then intend to …


Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar Mar 2013

Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar

Amit Deokar

Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behavioral intention to comply with ISPs. The impact of information security awareness on behavioral intentions to comply is also considered in the research model. This is a research in progress, and an instrument is being developed to conduct a survey study to gather data from employees …


Evaluating The Impact Of Ehr On Clinical Reasoning Performance: A Ttf Perspective, Matthew Wills, Omar El-Gayar, Amit Deokar Dec 2011

Evaluating The Impact Of Ehr On Clinical Reasoning Performance: A Ttf Perspective, Matthew Wills, Omar El-Gayar, Amit Deokar

Amit Deokar

The proliferation of Electronic Health Records (EHR) as a backbone for healthcare delivery necessitates adequate tools for evaluating and improving the efficacy of such investments particularly as it relates to clinical reasoning performance. However, a thorough review of the literature indicates lack of a tested, validated instrument for evaluating and predicting the impact of EHR use on clinical reasoning performance. Despite successful application to a variety of other industries, TTF has not been adequately adapted to healthcare, EHR technology or the clinical reasoning task. Accordingly, the objectives of this research are to: 1) produce a valid instrument with diagnostic and …


Ontology-Based Information Extraction For Analyzing It Services, Amit Deokar, Sagnika Sen Dec 2009

Ontology-Based Information Extraction For Analyzing It Services, Amit Deokar, Sagnika Sen

Amit Deokar

Service Level Agreements (SLA) for multi-service Information Technology (IT) outsourcing contracts contain vast amounts of textual information. The SLAs provide details about a specific service, Key Performance Indicators (KPI) to measure its performance; as well as process elements, such as activities, events, and resources that are integral in achieving performance goals. However, KPIs and the process elements may be interrelated. The knowledge of such interrelationships is often tacitly present in the SLAs. The aim of our research is to extract this hidden information from IT service contracts and analyze them to empower customers of IT services to make better performance …