Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Business

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield Dec 2012

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield

Dr Akemi Chatfield

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Use Centric Hci Requirements Elicitation, Robert Brown Dec 2012

Use Centric Hci Requirements Elicitation, Robert Brown

Dr Robert Brown

Among persistent issues in HCI are its separation from the other disciplines involved in the construction of Information Systems, any coherently extensive methodology and straight forward techniques for clustering interface elements for best effect. An approach to HCI which encompasses the full context of use (rather than just of usage) and entails more traditional SA&D within a single framework could be of some value. This paper introduces the HCI values of the Activity Theoretic System Architecture (ATSA) Method.


A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford Dec 2012

A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford

Associate Professor Rajeev Sharma

The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria for the selection of the marker variable proposed in the literature. Our findings show that the conclusions that can be drawn under different criteria are significantly and substantially different, raising doubts about the validity of the marker variable technique. Proposals for developing theoretically grounded criteria for …


Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus Dec 2012

Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus

Associate Professor Rajeev Sharma

Organisational culture is an important influence in shaping the organisational impacts of Information Systems. However, the conceptualisation and operationalisation of culture in empirical studies does not reflect the richness of the theoretical literature. In particular, our review finds that the dynamic, emergent and reciprocal nature of the IS-culture relationship has not been adequately examined in the empirical literature. This is partly due to the methodologies employed in existing research. Suggestions for enriching empirical research into the IS- culture relationship are discussed.


The Value Relevance Of Enterprise Resource Planning Information, Jayantha Wickramasinghe, Raymond Mcnamara Oct 2012

The Value Relevance Of Enterprise Resource Planning Information, Jayantha Wickramasinghe, Raymond Mcnamara

Ray McNamara

This paper examines whether ERP systems contribute to enterprise value. An ERP Value Relevance Model is developed and tested with data from 60 matched pairs of ERP–adopter/ non–adopter firms. Two classes of tests are designed: performance relevance and value relevance. Tests of performance relevance show ERP–adopter firms do not achieve significant positive abnormal earnings until year four of the five–year test period. Tests of value relevance show the market responds significantly to ERP adoption in year two only. This early response in the year following the year of adoption suggests a significant early market expectation of these systems. However, this …


Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard Aug 2012

Circos: Tapping Into Social Media (A), Kevin W. Sproule, C. Jason Woodard

C. Jason Woodard

Social media was a topic that had entered into the daily vocabulary of teenagers and business executives alike. With this surge in popularity and influence worldwide the open question was what this new way of interacting would mean for businesses and whether or not social media could really be a driver of company profitability or just a nice way to share photos with friends? Circos, a Singapore-based company, developed a business that it hoped would help to answer those questions. By using a proprietary sentiment analysis tool, Circos had mined the vast world of online reviews available on various social …


Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard Aug 2012

Circos: Tapping Into Social Media (B), Kevin W. Sproule, C. Jason Woodard

C. Jason Woodard

After a successful presentation in the (A) case, Frederic Langlois, Circos.com general manager in Singapore, headed back to the company headquarters. He brought back not only the possibility of a new client, but also a specific request. The Raffles Hotel had asked him to provide new functionality beyond the existing social media analytics dashboard Circos had become known for. The Raffles Hotel manager had asked, “It would be great to have a simple and meaningful analysis of what people are saying about our property online. What would be really great, though, would be to know who is saying what. I …


Do You Know What I Know? A Shared Understandings Perspective On Text-Based Communication, Michael Dickey, Molly Wasko, Katherine Chudoba, Jason Thatcher May 2012

Do You Know What I Know? A Shared Understandings Perspective On Text-Based Communication, Michael Dickey, Molly Wasko, Katherine Chudoba, Jason Thatcher

Jason Bennett Thatcher

This article illustrates how the hermeneutic analysis of text illuminates how shared understandings affect our interpretations of lean communication in distributed work environments. It is proposed that in contrast to the pessimistic conclusions of media richness theory that lean communication channels cannot support complex or equivocal work tasks, miscommunications are not the result of technology, but rather occur due to a lack of shared understandings among the individuals communicating. An illustrative case study based on fieldwork in franchise organizations is presented to demonstrate the possibilities for how the hermeneutic analysis of coherence, invention, intention, and reference can be used to …


Architectural Control Points, C. Jason Woodard Apr 2012

Architectural Control Points, C. Jason Woodard

C. Jason Woodard

System designers and technology strategists have long recognized the concept of an architectural control point as a way to identify parts of a system that have particular strategic importance. Despite the vast body of work on system architecture in the engineering design literature, however, few authors have attempted to define architectural control points or study them systematically. Moreover, some industry participants have questioned whether architectural control is still a valuable or achievable goal in an era of increasingly open standards. This paper offers tentative definitions of architectural control, architectural control points, and architectural strategy. In a longer version of the …


Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard Apr 2012

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

C. Jason Woodard

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Do I Matter?: The Impact Of Individual Differences On Training Process, Saurabh Gupta, Robert Bostrom, Robert Anson Feb 2012

Do I Matter?: The Impact Of Individual Differences On Training Process, Saurabh Gupta, Robert Bostrom, Robert Anson

Saurabh Gupta

The increasing investment in technology for training and learning in organizations underscores the fundamental importance for researchers to understand and investigate technology-mediated learning (TML). Currently, a great deal of Information Systems (IS) training for both IS professionals and end-users has a TML component. With the continuing growth of TML and advances in information technology, there will be a likely increate in TML-based IS training in the future. Advances in technology have created opportunities to deliver mass training as well as to personalize learning. To facilitate understanding in this area, this research analyzes the impact of individual differences on end-user training …


Collaborative E-Learning: Information Systems Research Directions, Saurabh Gupta, Robert Bostrom Feb 2012

Collaborative E-Learning: Information Systems Research Directions, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

No abstract provided.


Advances In Information Systems Development: New Methods And Practice For The Networked Society, Gabor Magyor, Wita Wojtkowski, Gregory Wojtkowski Jan 2012

Advances In Information Systems Development: New Methods And Practice For The Networked Society, Gabor Magyor, Wita Wojtkowski, Gregory Wojtkowski

Wita Wojtkowski

A monograph that details the proceedings of the 15th International Conference on Information Systems Development.


Individual Relationships With Technology, Christopher Scott Dec 2011

Individual Relationships With Technology, Christopher Scott

Christopher L. "Kit" Scott

In this paper, we explore the nature of the relationships that people develop with technology. In particular, we examine social exchange theory, the norm of reciprocity, and attachment theory to begin to explain how individuals develop, or do not develop, relationships with computers and technology. The theories are summarized, hypotheses are presented, proposed methods for empirical work are presented, and brief discussion is offered suggesting that the reference theories identified provide a novel way to examine the relationship between people and the technologies they interact with.


Decision Support For It Service Investments Under Uncertainty, Magno Queiroz, Jacques Sauvé Dec 2011

Decision Support For It Service Investments Under Uncertainty, Magno Queiroz, Jacques Sauvé

Magno Queiroz

No abstract provided.


Laptops On Trolleys: Lessons From A Mobile-Wireless Hospital Ward, Stephen Weeding, Linda Dawson Dec 2011

Laptops On Trolleys: Lessons From A Mobile-Wireless Hospital Ward, Stephen Weeding, Linda Dawson

Associate Professor Linda Dawson

Most hospital-based staff can be considered to be mobile but many hospital information systems (HIS) are based on fixed desk top computers. Wireless networks allow HIS to be brought to the point of care using mobile devices such as laptops on trolleys thus providing data which can aid in clinical decision-making. The research objective of this project focusses on the collaborative design of a laptop solution for providing data at the point of care. The research approach was based on a combination of action research and design science. Action research techniques including participant observation and informal oneto- one discussions were …


Financial Impact Of Information Security Breaches On Breached Firms And Their Non-Breached Competitors, Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson Dec 2011

Financial Impact Of Information Security Breaches On Breached Firms And Their Non-Breached Competitors, Humayun Zafar, Myung Ko, Kweku-Muata Osei-Bryson

Humayun Zafar

Information security breaches pose a growing threat to organizations and individuals, particularly those that are heavily involved in e-business/e-commerce. An information security breach can have wide-ranging impacts, including influencing the behaviors of competitors and vice versa within the context of a competitive marketplace. Therefore, there is a need for further exploration of implications of information security breaches beyond the focus of the breached firm. This study investigates the financial impact of publicly announced information security breaches on breached firms and their non-breached competitors. While controlling for size and the industry the firm operates in, the authors focus on specific types …


Evaluating The Impact Of Ehr On Clinical Reasoning Performance: A Ttf Perspective, Matthew Wills, Omar El-Gayar, Amit Deokar Dec 2011

Evaluating The Impact Of Ehr On Clinical Reasoning Performance: A Ttf Perspective, Matthew Wills, Omar El-Gayar, Amit Deokar

Amit Deokar

The proliferation of Electronic Health Records (EHR) as a backbone for healthcare delivery necessitates adequate tools for evaluating and improving the efficacy of such investments particularly as it relates to clinical reasoning performance. However, a thorough review of the literature indicates lack of a tested, validated instrument for evaluating and predicting the impact of EHR use on clinical reasoning performance. Despite successful application to a variety of other industries, TTF has not been adequately adapted to healthcare, EHR technology or the clinical reasoning task. Accordingly, the objectives of this research are to: 1) produce a valid instrument with diagnostic and …