Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Business

End User Perception And Software Quality Assessment, K L. Nance, M Strohmaier Jan 1997

End User Perception And Software Quality Assessment, K L. Nance, M Strohmaier

Journal of International Information Management

The topic of software quality assessment is at the forefront of the software engineering movement. Many models of organization and quality control exist which serve to foster software quality and reliability (Bloom, McPheters & Tsiang, 1973; Brandl, 1990; Comer, 1988; Dunn, 1990; Kaplan, Clark & Tang, 1994; Livson, 1988; Musa, lannino & Okumoto, 1987). Some models now consider the software engineering project team and end users, but most still treat them as static contributors to the system. Major factors often ignored in most conventional models include the cybernetics of the process, and human factors which have a significant impact on …


Computer Supported Strategic Management, Karen L. Fowler, Donna M. Scott Jan 1997

Computer Supported Strategic Management, Karen L. Fowler, Donna M. Scott

Journal of International Information Management

This paper presents an overview of the essential components of effective strategic management and a detailed description of the methodology for leading an organization through the strategic management process. This process can be extremely time consuming and can easily fall victim to "pep rally" thinking, rather than producing useful critical evaluation.The authors have successfully used GroupSystems software, one of a limited number of software products designed to support meetings, to significantly reduce the amoimt of time required for meetings and to improve the level of independent, unbiased input from participants. The parallel processing afforded by the software typically reduced meeting …


A Four-Way Interaction Model: A Holistic Approach To The Group Decision Support Systems, Chin-Wun Lin, Frank M. Lin Jan 1997

A Four-Way Interaction Model: A Holistic Approach To The Group Decision Support Systems, Chin-Wun Lin, Frank M. Lin

Journal of International Information Management

This study adopts the general systems theory and proposes a four-way interaction model which uses nth logic function to represent interactions of a Group Decision Support System (GDSS) to examine the interaction issues when designing a GDSS. Task type and decision guidance are used to illustrate the application of the proposed model.


Security Versus Integrity In Information Systems, Gerhaed Steinke Jan 1997

Security Versus Integrity In Information Systems, Gerhaed Steinke

Journal of International Information Management

Security and integrity are frequently competing characteristics in an information system. Sectirity implies that a user can only access a specific subset of the information in the system, namely that information which the user has permission to access. Integrity implies that the information is "correct", i.e., that it satisfies the constraints, rules and conditions contained in the information system. A problem arises when a user who is unable to access certain information because of security restrictions, is left with an "incorrect" or inconsistent view of the information system. In this paper we define an information organizational structure and policy which …


Design Considerations For Computer Simulation Games In The Management Discipline, Charmayne Cullom, Daniel J. Rowley Jan 1997

Design Considerations For Computer Simulation Games In The Management Discipline, Charmayne Cullom, Daniel J. Rowley

Journal of International Information Management

Computer simulations have been utilized for well over twenty years as an instruetional tool in business currieulums. According to Joseph Wolfe (1993), use of business computer simulations is no longer "cutting-edge." Simulation games have become common place with utilization widespread in the university community. The reasons for implementing business computer simulations are varied but typically emphasize provision of decision-making experiences simulating the real world and role playing (Hsu 1989). Increased interest and utilization of computer simulations in the business curriculum arose after the general acceptance of experienced-based learning theory. Such experiential learning requires participants to be actively involved in learning …


Maturity Model Linkages Between Software Development Teams, Users And Quality, Eugene G. Mcguire Jan 1997

Maturity Model Linkages Between Software Development Teams, Users And Quality, Eugene G. Mcguire

Journal of International Information Management

Information Systems literature has shown clear linkages between the selection of software development methodologies, the actions of software development teams, overall product quality, and user satisfaction. Rarely are these linkages emphasized, however, in current research on process improvement. This paper examines the convergence of these areas and discusses current research designed to further explore these linkages within the Capability Maturity Model (CMM) framework.


An End User's Model For Communications Technologies In The Twenty First Century, Antony Coulson, C.E. Tapie Rohm Jr Jan 1997

An End User's Model For Communications Technologies In The Twenty First Century, Antony Coulson, C.E. Tapie Rohm Jr

Journal of International Information Management

This paper presents an end user's model for understanding the use of communications technology or media in the 21st century. The rapid advancement of communications technologies like Email, Group Decision Support System and Video Conferencing are not being taken advantage of today. A model is presented and then explained in terms of the existing technology. A review of the literamre is provided at each step of the way. A table summarizes the information reviewed.


Group Impacts Using Four Meeting Facilitation Techniques, Milam Aiken, Khalid Aljumaih, Brian Reithel, Sumali Conlon Jan 1997

Group Impacts Using Four Meeting Facilitation Techniques, Milam Aiken, Khalid Aljumaih, Brian Reithel, Sumali Conlon

Journal of International Information Management

Many studies have investigated the effects of various meeting facilitation techniques on groups, but few have directly compared the effects of different electronic techniques on group interaction. In fact, the vast majority of research in the area of electronic meeting support has used only two techniques: verbal brainstorming and electronic individual poolwriting. This paper describes an experiment involving four groups of 35 undergraduate students each using electronic individual poolwriting, electronic gallery writing, verbal brainstorming, and manual individual poolwriting. Results show that groups using the two electronic techniques were more satisfied and productive and experienced less production blocking and evaluation apprehension. …


The Gap Between Theory And Practice: A Database Application Case Study, Martha Myers, Paula Skinner Jan 1997

The Gap Between Theory And Practice: A Database Application Case Study, Martha Myers, Paula Skinner

Journal of International Information Management

The transition from theory to practice is often challenging for sUidents. This paper considers this challenge within the context of implementing a database design in an end-user DBMS. The tradeoffs are examined between adhering to the theory that is taught in the classroom and straying from the theory when faced with deadlines, software applications that will not support the theory, and specific client needs. In the first section, the problems and tradeoffs for developers and system clients are described. In the second section, a specific case study of a student project for a charitable organization is described. The third section …


Information Systems Education— A National Evaluation Of A Curriculum Model For End-User Computing Support, C Steven Hunt, Charles M. Ray, Scott Eckholdt Jan 1997

Information Systems Education— A National Evaluation Of A Curriculum Model For End-User Computing Support, C Steven Hunt, Charles M. Ray, Scott Eckholdt

Journal of International Information Management

This research represents an evaluation of a curriculum model by a national sample of information systems professionals. The Curriculum Model for Organizational and End-User Information Systems (OEIS) is a guide for educators planning programs that prepare four-year college students for entry-level positions that support end-user computing. It stresses end-user information technology and human factors, business process redesign, communication, and end-user training. A national sample of Association for Systems Management members evaluated the model's sixty objectives. All sixty objectives, as measured by the aggregate rating and the mean ratings of individual objectives, were considered important. More than two-thirds of them were …


Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo Jan 1997

Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo

Journal of International Information Management

Whereas a critical mass of computer users has migrated to Windows95, some are still using Windows 3.1 and DOS. There is concern that the benefits of installing Windows95 may not outweigh the costs.


A Comparison Of Performance And Satisfaction Between Two Types Of Group Decision Support Systems, Mahesh Vanjani, Milam Aiken, Joseph Paolillo Jan 1997

A Comparison Of Performance And Satisfaction Between Two Types Of Group Decision Support Systems, Mahesh Vanjani, Milam Aiken, Joseph Paolillo

Journal of International Information Management

Group Decision Support Systems (GDSSs) and other electronic meeting technologies have been developed to support or replace traditional, verbal meetings. While extensive research has been conducted regarding the impact of these systems on the group decision making process, the vast majority of these studies have focused on groups meeting fact-to-face in one room. This paper focuses on how group members perform when distributed as non-proximate sub-groups (virtual legislative sessions) as compared to proximate, face-to-face groups (synchronous legislative sessions). Experiments involving 12 groups of 10 members each showed that there were few significant differences in productivity and satisfaction between the two …


Information Revolution: Impact Of Technology On Global Workforce, Kamlesh T. Mehta, Vivek Shah Jan 1997

Information Revolution: Impact Of Technology On Global Workforce, Kamlesh T. Mehta, Vivek Shah

Journal of International Information Management

This paper explores the promises and perils of the Information Revolution and addresses the complex issues such as global labor force, impact of technology on both industrialized and third-world countries. The paper discusses the beneficiaries and losers of the information revolution and an outlook for global employment in the 21st century.


Factorial Management Of Global Information Systems, Long O. Anyanwu Jan 1997

Factorial Management Of Global Information Systems, Long O. Anyanwu

Journal of International Information Management

The growth of worldwide competition and expansion of business markets especially in Eastern Europe and the third world have triggered several formidable problems for the global information systems (GIS) manager. Numerous multinational corporations have failed to meet their objectives beyond their national borders. This study identifies the major recurrent problems and critical influencing factors, discusses their symptomatic characteristics and impacts on the corporate business and information systems management, streamlines appropriate recommendations for combating each problem, and finally, develops a matrix of factors, characteristics, domain classifications, and suggested recommendations for easy reference for managers.


The Cultural And Political Influences On It Diffusion In The People's Republic Of China, Jack T. Marchewka, Qiong Wu Jan 1997

The Cultural And Political Influences On It Diffusion In The People's Republic Of China, Jack T. Marchewka, Qiong Wu

Journal of International Information Management

This paper investigates how political and cultural influences impact the diffusion and use of information technology (IT) in the People's Republic of China. Five separate interviews were conducted with individuals in five state-owned businesses. Based upon our interviews, it appears that the role and use of information technology in these organizations depends largely upon societal spectrums such as politics, culture, economic status, and the educational levels of the employees.


Preparing For A Change: A Planning Framework For Business Process Reengineering, Chung Kim, Heidi Perreault Jan 1997

Preparing For A Change: A Planning Framework For Business Process Reengineering, Chung Kim, Heidi Perreault

Journal of International Information Management

Business Process Reeingineering (BPR) projects offer organizations a means for improving their business processes. The high failure rate associated with BPR projects points to the need to have detailed plans designed prior to introducing change. This article provides a planning framework modeled on Lewin's three-stage change model. The framework incorporates both social and technical aspects of the project. The framework presented is a comprehensive planning process. It presents a guideline for establishing a solid foundation prior to implementing change. Although good planning cannot guarantee success, success without planning is impossible.


Computer Crimes: Taxonomy And Prevention Strategies, Santosh S. Venkatraman Jan 1997

Computer Crimes: Taxonomy And Prevention Strategies, Santosh S. Venkatraman

Journal of International Information Management

Computer and communications networks have greatly enhanced the effectiveness and efficiencies of organizations. They have, however, also created an opportunity for computer criminals. Computer crimes are committed for many reasons: 1) revenge by disgruntled employees, 2) desire for a challenge, 3) to cause mischief, and 4) money. In order to better understand the nature of computer crimes, a comprehensive taxonomy of computer crimes is developed in this paper. Strategies to effectively combat the various computer crimes are then presented. It is hoped that the information provided in this paper makes the readers more knowledgeable on this important topic and motivates …