Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Management Information Systems

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 108

Full-Text Articles in Business

Exploratory And Exploitative Knowledge Sharing In Interorganizational Relationships, Ghiyoung Im Dec 2006

Exploratory And Exploitative Knowledge Sharing In Interorganizational Relationships, Ghiyoung Im

Computer Information Systems Dissertations

A growing body of research investigates the role that organizational learning plays in generating superior firm performance. Researchers, however, have given limited attention to this learning effect in the context of long-term interorganizational relationships. This paper focuses on a specific aspect of learning, that is, explorative and exploitative knowledge sharing, and examines its impacts on sustained performance. We examine interorganizational design mechanisms and digitally-enabled knowledge representation as antecedents of knowledge sharing. The empirical context is dyadic relationship between a supply chain solutions vendor and its customers for two major classes of supply chain services. Our theoretical predictions are tested by …


Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston Dec 2006

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Reputation systems are ubiquitously employed in the online marketplaces to provide information on users’ abilities and trustworthiness. We focus particularly on the problem of reputation stretching, the extension of an established reputation into a new market. By examining various factors—market size, the expected performance in the expanding market, and the risk of performance in the expanding market—we characterize conditions that affect bidder’s stretching decision in the expanding market. Moreover, we analyze both the short-term and the long-term expanding cases, and obtain contrasting results in the two settings.


Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston Dec 2006

Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain characterized by N geographically distributed retailers who order a homogeneous product from one manufacturer. Each retailer's demand risk consists of two parts: a systematic risk part that affects all retailers and an idiosyncratic risk part that only has a local effect. We propose a macro prediction market to effectively elicit and aggregate useful information about systematic demand risk. We show that such information can be used to achieve accurate demand forecast sharing and better channel coordination …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan Dec 2006

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From An Approach-Avoidance Process Model, Gary Pan, Shan Ling Pan

Research Collection School Of Accountancy

We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. This paper outlines an approach-avoidance process model for describing and analyzing escalation and de-escalation of commitment in information systems projects. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding …


Enhancing Decision Analysis Models With Web Agents, Jeffrey M. Keisler, Wei Zhang Oct 2006

Enhancing Decision Analysis Models With Web Agents, Jeffrey M. Keisler, Wei Zhang

Jeffrey Keisler

No abstract provided.


Public Healthcare: Changes Introduced When Implementing E-Procurement, Tommaso Federici Oct 2006

Public Healthcare: Changes Introduced When Implementing E-Procurement, Tommaso Federici

Federici Tommaso

The large and growing size of the healthcare public spending for goods and services worries the institutions of many European countries, including Italy, and asks for rationalization initiatives. In parallel, e-procurement solutions spread into Public Administrations (PA's) and introduce innovative processes, primarily in the purchasing phase.

In this scenario, e-procurement has the potential to enable significant efficiency improvements in the public healthcare sector, with the reduction of purchasing and administrative costs. However, most e-procurement initiatives met difficulties and did not fully delivered the expected benefits so far. This is mainly due to the healthcare procurement complexity, specific characteristics and peculiar …


Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury Oct 2006

Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury

Management Science and Information Systems Faculty Publication Series

Examining the extent and nature of adoption of technologies by micro, small, and medium-sized manufacturing firms in the greater Boston area.


Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera Oct 2006

Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera

Liana Napalkova

The paper describes the algorithm, which is developed to solve scheduling tasks in Flexible Manufacturing Systems. The algorithm is a combination of Genetic Algorithm and Coloured Petri Nets. It is proposed to use Coloured Petri Nets to tackle the encoding problem in Genetic Algorithm. The objective is to minimize the total make-span subject to different constraints obtained in Flexible Manufacturing Systems.


Information Technology, Production Process Outsourcing, And Manufacturing Plant Performance, Indranil Bardhan, Jonathan W. Whitaker, Sunil Mithas Oct 2006

Information Technology, Production Process Outsourcing, And Manufacturing Plant Performance, Indranil Bardhan, Jonathan W. Whitaker, Sunil Mithas

Management Faculty Publications

What is the role of information technology (IT) in enabling the outsourcing of manufacturing plant production processes? Do plant strategies influence production outsourcing? Does production process outsourcing influence plant performance? This research addresses these questions by investigating the role of IT and plant strategies as antecedents of production outsourcing, and evaluating the impact of production outsourcing and IT investments on plant cost and quality. We develop a theoretical framework for the antecedents and performance outcomes of production outsourcing at the plant level. We validate this theoretical framework using cross-sectional survey data from U.S. manufacturing plants. Our analysis suggests that plants …


Serviceorientierte Architekturen: Vom Konzept Zum Einsatz In Der Praxis, Roger Heutschi, Christine Legner, Hubert Oesterle Sep 2006

Serviceorientierte Architekturen: Vom Konzept Zum Einsatz In Der Praxis, Roger Heutschi, Christine Legner, Hubert Oesterle

Hubert Oesterle

Serviceorientierte Architekturen (SOA) werden gegenwärtig als Ansatz für eine einfachere und flexiblere inner- und zwischenbetriebliche Integration heterogener Anwendungssysteme diskutiert. Dieser Beitrag entwickelt ein SOA-Architekturmodell und untersucht seine Ausprägung in vier Praxisbeispielen. Er identifiziert aus den Fallstudien ausserdem typische Architekturtreiber, Einsatzziele, Nutzenpotenziale und Architekturmassnahmen einer SOA-Umsetzung in der Praxis.


Investigating Barriers To Knowledge Management: A Case Study Of The Air Force Center Of Excellence For Knowledge Management, Edgar L. Myers Iv Sep 2006

Investigating Barriers To Knowledge Management: A Case Study Of The Air Force Center Of Excellence For Knowledge Management, Edgar L. Myers Iv

Theses and Dissertations

Knowledge is becoming recognized as an organization's most valuable and powerful resource. As a resource, knowledge is used to improve an organization's efficiency and effectiveness, to create innovative solutions, and to enhance decision making capabilities. Being such an important resource, it stands to reason that an organization's knowledge resources must be effectively managed. However, while an organization attempts to manage its knowledge, its efforts are constrained by a variety of influences acting as barriers. Using Holsapple and Joshi's (2000) "influences on the management of knowledge" framework, the purpose of this research is to identify those barriers which are acting as …


Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn Sep 2006

Escalation And De-Escalation Of Commitment To Information Systems Projects: Insights From A Project Evaluation Model, Shan Ling Pan, Gary S. C. Pan, Michael Newman, Donal Flynn

Research Collection School Of Accountancy

This paper outlines a project evaluation model for examining escalation and de-escalation of commitment to information systems projects. We view escalation and de-escalation of commitment as processes involving recurring instances of approach-avoidance conflict. In the model, the sequential mapping of project events is integrated with a model of approach-avoidance conflict that identifies periods of gradual evolution at two separate levels of social analysis (project and work) that are punctuated by sudden, revolutionary periods of rapid change. By conceiving the processes of commitment escalation and de-escalation as sequences of events involving approach-avoidance conflicts, researchers may develop a deeper understanding of how …


The Boundary Spanner’S Role In Organisational Learning: Unleashing Untapped Potential, Siu Loon Hoe Sep 2006

The Boundary Spanner’S Role In Organisational Learning: Unleashing Untapped Potential, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

PurposeThe organizational behavior and management literature has devoted a lot attention on processes and technology in organizational learning. There has been little work to examine the role of boundary spanners in organizational learning. The purpose of this paper is to highlight the importance of boundary spanners in enhancing organizational learning.Design/methodology/approachThe existing boundary spanning literature was reviewed and the salient points on their role in organizational learning discussed.Practical implicationsThe paper offers a view on tapping the hidden potential of boundary spanners in organizations in order to enhance the organization's learning capacity form the external environment. Practicing manager would then be able …


The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Case Study Röhm Gmbh & Co. Kg - Consignment Depot Between Degussa Business Unit “Röhm“ And Basf Coatings Ag, Enrico Senger, Hubert Oesterle Jun 2006

Case Study Röhm Gmbh & Co. Kg - Consignment Depot Between Degussa Business Unit “Röhm“ And Basf Coatings Ag, Enrico Senger, Hubert Oesterle

Hubert Oesterle

Röhm produces special plastics, for, among others, the paint industry. In collaboration with BSAF Coatings, Röhm developed an extended Vendor Managed Inventory system that operates a consignment depot, takes on the actual and exact filling of tanks at the customer locations via telemetrics as well as advance forecasts, and passes on quality-related information to designated recipients, and includes the electronic billing of deliveries. The early access to data relevant to the planning process and process simplifications compensated for the additional operating costs. The closer relationship with the customer and their processes, as in the case of L’Oréal, is considered to …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Outsourcing Information Technology To India: Explaining Patterns Of Foreign Direct Investment And Contracting In The Software Industry, Michael J. Meehan May 2006

Outsourcing Information Technology To India: Explaining Patterns Of Foreign Direct Investment And Contracting In The Software Industry, Michael J. Meehan

Brigham Young University International Law & Management Review

No abstract provided.


Global Data Synchronization – Hype Oder Lösung Für Das Überbetriebliche Produktstammdatenmanagement Zwischen Konsumgüterindustrie Und Handel?, Jan Schemm, Christine Legner, Hubert Oesterle May 2006

Global Data Synchronization – Hype Oder Lösung Für Das Überbetriebliche Produktstammdatenmanagement Zwischen Konsumgüterindustrie Und Handel?, Jan Schemm, Christine Legner, Hubert Oesterle

Hubert Oesterle

Abgestimmte Produktstammdaten bilden die Grundlage elektronischer Geschäftsbeziehungen zwischen Handels- und Industrieunternehmen. Sie sind damit ein Erfolgsfaktor für die Realisierung innovativer Geschäftsmodelle, die zu Umsatzsteigerungen und Kostenreduzierung entlang der Wertschöpfungskette führen. Obwohl Handel und Industrie sich schon vergleichsweise lange mit dem elektronischen Austausch von Produktdaten beschäftigen, konnten sich weder der EDI-basierte, bilaterale Stammdatenaustausch noch der multilaterale Ansatz über Datenpools durchsetzen. Seit Mitte 2004 verfolgt das Global Data Synchronization Network (GDSN) einen neuen Lösungsansatz, mit dem Ziel, einen m:n-fähigen elektronischen Produktstammdatenaustausch zu etablieren. Die Ankündigungen von führenden Handelsunternehmen wie Wal-Mart, Ahold oder Tesco sowie Konsumgüterherstellern wie Nestlé, Procter Gamble oder Kraft Foods …


Geschäftsmodelle & Stammdaten, Hubert Oesterle May 2006

Geschäftsmodelle & Stammdaten, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Transformation Des Unternehmens Zu Intelligenteren Geschäftskonzepten, Hubert Oesterle Apr 2006

Transformation Des Unternehmens Zu Intelligenteren Geschäftskonzepten, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Business Engineering – Value Chain Redesign, Hubert Oesterle Apr 2006

Business Engineering – Value Chain Redesign, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu Apr 2006

Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu

Research Collection School Of Computing and Information Systems

In this paper, we describe our work on using the Tycoon system developed by HP Labs to provide a market-based resource allocation and bidding framework for a grid. We discuss how we intend to evaluate the feasibility of the Tycoon system by measuring its economic performance using agent-based simulation experiments for a particular type of grid usage scenario, namely, the digital media market scenario. We will also discuss a related effort in collecting and using real grid data from the National Grid Pilot Platform in Singapore and how we will be using real data collected to derive actual usage patterns …


Business Engineering – Innovation Und Individualisierung Statt Commoditisierung, Hubert Oesterle Mar 2006

Business Engineering – Innovation Und Individualisierung Statt Commoditisierung, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Enabling Agile Adoption Practices Through Network Organizations, Dirk S. Hovorka, Kai R. Larsen Mar 2006

Enabling Agile Adoption Practices Through Network Organizations, Dirk S. Hovorka, Kai R. Larsen

Dirk Hovorka

As distributed organizations increasingly rely on technological innovations to enhance organizational efficiency and competitiveness, interest in agile practices that enable adoption of information technology (IT) based innovations has grown. This study examines the influence of a network organization environment on the ability to develop agile adoption practices. An exploratory case study design was used to investigate the interactions between network structure, social information processing, organizational similarity (homophily), and absorptive capacity during the adoption of a large-scale IT system in two network organization environments within New York State. The data suggest that network organization characteristics and communication processes that reinforced social …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Evaluating Km Journal Content: An Assessment Of Trends (2000-2005), Donnie O. Harp Mar 2006

Evaluating Km Journal Content: An Assessment Of Trends (2000-2005), Donnie O. Harp

Theses and Dissertations

Knowledge management (KM) has been receiving ever increasing attention from researchers and practitioners, especially over the last 5 years. Consequently, some researchers and practitioners now believe that KM should be its own discipline and have established KM-specific journals in an effort to further this idea. Many of these journal founders believe that KM has emerged as a mixture of many disciplines and have written the goal of being interdisciplinary into their charters. This research reviews the KM literature published in KM-specific journals from 2000 to 2005. Specifically, using a content analysis methodology, this research reviews and analyzes the body of …


Geschäftmodelle 2010 - Wie Ceos Unternehmen Transformieren, Hubert Oesterle Mar 2006

Geschäftmodelle 2010 - Wie Ceos Unternehmen Transformieren, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Geschäftsmodelle Der Fertigungsindustrie Für Das Jahr 2010, Hubert Oesterle Mar 2006

Geschäftsmodelle Der Fertigungsindustrie Für Das Jahr 2010, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Soa Als Enabler In Der B2b-Kooperation: Erfahrungen Aus Der Automobilindustrie, Hubert Oesterle, Rainer Schaaf Mar 2006

Soa Als Enabler In Der B2b-Kooperation: Erfahrungen Aus Der Automobilindustrie, Hubert Oesterle, Rainer Schaaf

Hubert Oesterle

No abstract provided.


Unternehmenserfolg Durch Service-Innovation Und Individualisierung - Barrieren Und It-Enabler, Hubert Oesterle Mar 2006

Unternehmenserfolg Durch Service-Innovation Und Individualisierung - Barrieren Und It-Enabler, Hubert Oesterle

Hubert Oesterle

No abstract provided.