Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 233

Full-Text Articles in Business

Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii Jan 2015

Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii

Communications of the IIMA

Union membership has undergone a dramatic decline and some have hailed the internet as a means for unions to reverse their membership declines. This study examines the usability of union websites. The content of union websites has been analyzed, but the usefulness of that content, and the overall usability of the websites, has not been assessed. In order for unions to fully utilize the internet and realize the potential benefits of cyberspace usage, they must provide websites that users find easy to use and that provide useful content. This study employs Hassan and Li's (2005) benchmarking approach in order to …


Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau Jan 2015

Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau

Communications of the IIMA

The establishment of an organizational help desk (HD) is to provide technical support to users when they encounter technical problems related to hardware, software and network connections. Due to the lack of resources, users often have to wait for a considerably long time before their enquiries and problems are answered and solved. This paper discusses the background of HD and its existing challenges. The application of Knowledge Management (KM) techniques and Knowledge Management System (KMS) enables HD to manage its knowledge effectively. In addition, the combination is capable of relieving the overloaded HD by shifting some of the troubleshooting responsibilities …


Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart Jan 2015

Web Design: Elements Of Effective Communication, Kurt Collins, Anthony Coulson, Jake Zhu, C.E. Tapie Rohm, Walt Stewart

Communications of the IIMA

The rapid evolution of information technology over the past several decades has opened many new and unique modes of communication. Clearly, the web is one such technology. However, it is quite possible that a fascination with the technology per se can hinder participants from one of its main functions— effective communication. The following essay explores a return to the basics of designing an effective web-based communication strategy. The key components of this strategy are: 1) consistent look and feel, 2) conceptual consistency, and 3) positive attention.


Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas Jan 2015

Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas

Communications of the IIMA

Suppose that a project consists of n separate tasks and one and only one task can be completed in one time period. However, since some tasks can be started only before others have been completed, only feasible task schedules are considered. There is a cost associated with the time at which a task is completed and the project cost is equal to the sum of all the task costs. How can a feasible task schedule with minimum project cost be found for completing the entire project? This research proposes using a genetic algorithm to solve this problem efficiently.


Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre Jan 2015

Bioinetric And Systems Security: An Overview Of End-To-End Security System, Emmanuel Opara, Mohammad Rob, Vance Etnyre

Communications of the IIMA

As online security threats continue to spread, protecting valuable data becomes one of the security challenges businesses face in today's business-to-customer (B2C) and business-to-business (B2B) ecommerce. Biometrics technology shows increased promise in enterprise network security. It will play a vital role as system developers fortify the security apparatus of its organization. In this paper, we analyze biometrics technologies and describe techniques that can be utilized to decrease the probabilities of online attacks.


Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette Jan 2015

Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette

Communications of the IIMA

The purpose of this paper is to detail the barriers to the integration of technology in US school systems. The harriers experienced by both individual teachers and to school systems as a whole are discussed. Student barriers, such as computer skill levels or poverty, are also discussed. In addition, this paper explains how technology should be used and the measurable benefits of doing so. Measurable benefits reported in the literature include increased performance on measures of reading comprehension, writing, components of IQ, transfer to novel tasks, and grade point average. Closing comments focus on how technology integration must be an …


Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan Jan 2015

Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan

Communications of the IIMA

VoIP is a relatively new technology. Current research suggests that firms are using VoIP technology to cut costs, to improve productivity, and the firm's strategic position. The literature is rich with "how to " articles and a discussion ofpossible benefits, costs, and implementation barriers. But, very few academic studies exist. The purpose of this study is to identify and present the issues related to VoIP adoption and implementation.


An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young Jan 2015

An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young

Communications of the IIMA

The Web is becoming more important for communication andfor data access. Unfortunately, not all Web sites are accessible for all users. Web accessibility is concerned with overcoming the barriers that users with disabilities face when they try to access information on Web sites. Currently, for disabled users, the Web presents many barriers that make it dijfiult to use. These barriers can be addressed by organizational commitment and by improved development techniques. This paper examines how Web accessibility standards and legal mandates are affecting the design of corporate and governmental Web sites, and how the rate of adoption can be improved …


Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom Jan 2015

Software Development: Cowboy Or Samurai, Charmayne Cullom, Richard Cullom

Communications of the IIMA

Much has been written about the failure of software development projects. The importance of good software to business cannot be underestimated. A major issue is quality of the software being written and produced. Over the years, the emphasis for improvement in software development has been to change the process. Unified Modeling Language is but one of a long line of changes in software development process starting with structured programming introduced in the seventies to object oriented programming in nineties. However, several software development experts have begun to assert that the problem may not be with the process employed but rather …


To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson Jan 2015

To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson

Communications of the IIMA

The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum.


Competing Next Generation Wireless Technologies, Warren Adis Jan 2015

Competing Next Generation Wireless Technologies, Warren Adis

Communications of the IIMA

Wireless computing is facing a choice concerning the next telecommunication standard. Two of the new and competing protocol standards for local area and personal networking are 802.1 In and Ultra Wide Band. Each one has its own strengths and weaknesses and both will change wireless networking by dramatically increasing the transmission speed, the QoS and the security of the broadcast. Yet decisions have to be made about which protocol to adopt. The choice rests on a deeper understanding of each protocol, its evolution, compatibility and future direction. This paper analyzes these two competing protocols, discussing their performance and probability for …


Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson Jan 2015

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson

Communications of the IIMA

Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.


The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris Jan 2015

The Evolution Of An Internet Market Exchange And Value System: Examples From The Motion Control Industry, William Lightfoot, James Harris

Communications of the IIMA

This manuscript examines the evolution of internet value systems in the motion control industry. We believe the primary reason behind the inconsistent performance of that industry's adoption of the internet in the supply channel was largely due to poor strategy. Using a the concepts of bias exchanges and game theory it is suggested that intemet strategies such as disintermediation and first-mover advantage were elusive because firms focused too much on technology and not enough on customer value. Lessons for managers and future decisions are offered.


The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen Jan 2015

The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen

Communications of the IIMA

A company named Syscom was recently acquired by another company, Matcom. Both companies were focused on software development in similar markets, however, the Management Information Systems (MIS) decisions made by each company have resulted in significant differences as to how employees go about the business of developing, selling and supporting software. This paper highlights how Information Systems (IS) decisions made at these two companies enabled different ways for people to work together along with affecting various aspects of business operations and team communications. In addition, this paper presents issues with the integration of Syscom with the Matcom IS structure as …


The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan Jan 2015

The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan

Communications of the IIMA

This pilot project was designed to evaluate study abroad participants' degree of homesickness and use of communication channels, specifically telephone and email. A questionnaire was developed to assess several dimensions involved with studying abroad, including degree of culture shock and homesickness, and frequency and methods of communicating home. Respondents were 14 study abroad participants from a medium-sized southern university, including 4 males and 10 females. Based on the findings of this study, homesickness and degree of culture shock were related as measured by the items of strain, helpless, missing, accepted, escape, and shock. As hypothesized, students who reported being homesick …


The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia Jan 2015

The Micro-Multinational - A Model For Small Internationa! Business, William E. Gerbacia, Bryan E. Gerbacia

Communications of the IIMA

With the recent advances in telecommunications networking and teleconferencing software, small companies can become more cost competitive by outsourcing appropriate functions to lower wage countries. Ad-Station Systems is a startup media advertising company that provides a number of online and off-line advertising services. The online product offering requires support and programming. It was decided to evaluate whether these functions could be provided from a foreign location. An industrial dynamics model indicated that this is a viable option. The processes were designed and documented, and are described here.


A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke Jan 2015

A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke

Communications of the IIMA

There are a variety of models, methods and tools to help organizations manage defects found in the development of software. Defect tracking and processing must be integrated in the project life cycle and the testing process for software. This paper reviews a number of defect models and proposes the Full Life Cycle Defect Process model to manage defects that supports defect, project, and test processes. We describe the various states in our model and provide examples of various scenarios and paths through the model.


Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie Jan 2015

Developing Security For E-Commerce Applications: A Teaching Case, Chang Liu, Brian G. Mackie

Communications of the IIMA

The number of severe computer security breaches in e-commerce applications has been on the increase over the last few years. This has become one of the biggest security problems in recent years. Although there are tools to build e-commerce application firewalls to alert and prevent intruder attacks, these tools are not trivial to install (they are not plug-and-play). Internet intruders can create havoc and produce catastrophe results by exploiting weaknesses in e- commerce applications. Therefore, developers of e-commerce web sites have to incorporate ways to systematically identify and eliminate vulnerabilities in the EC applications to enhance their security. This paper …


Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr. Dec 2014

Enterprise Content Management: Understanding The Taxonomy, Jake Zhu, Tony Coulson, Miyuan Shan, C.E. Tapie Rohm Jr.

Communications of the IIMA

In an effort to understand content, its taxonomy and management, we define content management as the process of managing the creation, categorization, delivery and archiving of content in which workflow and business processes are maximized. Built upon what industry experts have to offer about enterprise content taxonomy, we have enacted a framework to better understand, create and manage enterprise taxonomies. This framework will be able to integrate rich content, modern computing technology, advanced analytics, automated worlflow, business requirements and human resources into a process where companies can easily manage their information for decision making and gaining competitive advantages.


An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot Dec 2014

An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot

Communications of the IIMA

Technology has improved to the point where web-sites for every course taught by an instructor are possible. This has produced many instructional benefits; however, it has also created a new set of problems. The problem addressed by this paper is the question of which web-site components to include in the class web-site. This is important because different web components support different student learning styles. Because it is not feasible to include all known webcomponents, the instructor must select those components that are most useful and support the broadest group of students. To address this question, a survey instrument was developed …


Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez Dec 2014

Ethics In Information Systems: Student Performance In Evaluating Ethical Dilemmas, Charletta F. Gutierrez

Communications of the IIMA

The explosion in information technology in the last 20 years, and in particular, data communications networks, has had a major impact on ethical thinking and ethical issues. This has been manifested in the recent accounting and business scandals, as it is becoming apparent that the ethical dimensions of information systems-related business decisions cannot be safely ignored. It is important for business educators to introduce students to relevant ethical situations that they may face in the business world. This paper discusses the Information Systems ethical environment and students performance on business ethics cases in a telecommunications course. The results of this …


Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno Dec 2014

Factors That Impact Student Performance In A Course Sequence, Gerard J. Morris, Charles H. Mawhinney, Janos Fustos, Joseph S. Morrell, Norman Pence, Wayne Haga, Kathryn Marold, Abel A. Moreno

Communications of the IIMA

On-line courses have become an important component of the delivery of courses in all areas of education. The validity of online delivery is challenged if Web students perform poorly in subsequent major courses. This paper investigates the effect of mode of delivery and other factors on the level of success, failure, potential, and limitations of web delivery in course sequences. This study was conducted on a two-course sequence in the Computer Information Systems Department at Metropolitan State College of Denver. The result of this research identifies important factors impacting student success in this two course sequence.


A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken Dec 2014

A Longitudinal Pedagogical Study Of 39 Online And 25 Face-To-Face Sections Of Seven Different Graduate Level Mis Courses, Rassule Hadidi, Chung-Hsien Sung, Miles D. Woken

Communications of the IIMA

This paper reports on a longitudinal pedagogical study of performance and perceptions of 1021 students in 39 online and 25 face-to-face sections of seven different courses taught by six different professors. The differences between the students' perceptions of the quality of the instructors and student performance are statistically significant based on the mode of course delivery. Students rated the quality of instructors in the online courses higher for the duration of the study. Student grade averages are slightly lower in the online courses. For all of the other survey questions dealing with the evaluation of the courses and the instructors, …


The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl Dec 2014

The Impact Of Market Metaphysics On Information Infrastructure Decisions, Bernd Carsten Stahl

Communications of the IIMA

One of the most pressing questions that governments and societies have to answer is how to develop the infrastructure of the expected information society. In this paper I will take a look at two archetypical positions: at a state-oriented and a market-oriented view. I will recount the arguments for both sides in order to then demonstrate that all of these arguments are in fact derivatives of the older discussion about state versus market that has been with us at least since Marx. I will then try to show that these arguments are based on metaphysical assumptions about the nature of …


An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery Dec 2014

An Exploratory Investigation Of The Learning Styles Of Students In An On-Line Degree Program, Nicholas A. Beadless Ii, Christopher M. Lowery

Communications of the IIMA

This study is an exploratory investigation into whether different leaning styles predict performance in an online course. Students enrolled in several cohorts of an accredited MBA program were surveyed with regard to their learning styles and those styles were correlated with the grades earned in the course. The program is unique in that the entire program could be completed online.


Discussing Issues Of Information Technology In Country Development, Rami Al-Gharaibeh, William Acar, Andrew G. Kotulic, Thomas J. Froehlich Dec 2014

Discussing Issues Of Information Technology In Country Development, Rami Al-Gharaibeh, William Acar, Andrew G. Kotulic, Thomas J. Froehlich

Communications of the IIMA

The development of countries with laggard economies is becoming a global concern. The harmful complications of poverty and illiteracy are beginning to show up outside those countries in violent forms. The precautions against this migration of harm are splitting the world apart at the same time as technology may become able to bring it together. Over the last few years, information technology (IT) has grown very fast and is still spreading into all aspects of life in developed countries. The recent research in those countries is bringing more evidence that IT is a leveraging tool for business and not a …


Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih Jan 2009

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih

Journal of International Technology and Information Management

Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …


Using Computer Resources For Personal Activities At Work: Employee Perceptions Of Acceptable Behavior, Troy J. Strader, Lou Ann Simpson, Suzanne R. Clayton Jan 2009

Using Computer Resources For Personal Activities At Work: Employee Perceptions Of Acceptable Behavior, Troy J. Strader, Lou Ann Simpson, Suzanne R. Clayton

Journal of International Technology and Information Management

Employees use computer resources at work for personal activities and the implementation of countermeasures has not reduced this behavior. In this study we investigate the extent to which an employee’s ethical orientation and supervisory role have an impact on their perceptions regarding these behaviors. We find that employees assess acceptability using a utilitarian orientation. The more money and time involved in an activity, the more employees perceive them to be unacceptable. We also find that supervisors view these activities as less acceptable than do non-supervisor employees. Demographics have little to do with explaining perceptions. Research and managerial implications are discussed.


Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey Jan 2008

Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey

Journal of International Technology and Information Management

The “digital divide” has been present in the field of information technology (IT) since the inception of the digital computer. Throughout the course of history, one group (or more) has had better access to computer and information technology than another faction. For example: rich versus poor, young versus old, advanced societies versus less developed countries, etc. This disparity has existed for a variety of reasons, among them political, cultural, economic and even class or socioeconomic in nature. This paper examines one particular component of this phenomenon, the “gray divide” pertaining to the use of IT by our elderly, or senior …


Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs Jan 2008

Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs

Journal of International Technology and Information Management

This study evaluates the construct validity of an end-user computing satisfaction scale in the context of the Korean culture. The structure and dimensionality, reliability and validity of an end-user computing satisfaction (EUCS) instrument were cross-validated using data obtained from 108 managers of Korean firms in the context of the end-user satisfaction with their office information system. The results of this study are generally consistent with previous findings regarding the measurement property of this instrument. However, Korean data also supports the five correlated first-order factors model. Managerial and research implications of the identified results are discussed.