Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

PDF

Management Information Systems

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 258

Full-Text Articles in Business

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra Dec 2015

Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra

Shahriar Akter

Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win Dec 2012

The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win

Dr Khin Win

This research explores users’ intention to use teleconsultation technology. The study also explores the influence of facilitating conditions on the acceptance of the technology in the health care environment in Malaysia. Further, the study compares the level of user acceptance in two organizational settings: (1) between emergency and non-emergency environment, and (2) between referring and referral hospital. This research presumes on the basis of exploratory and descriptive study engaging a survey of healthcare providers who practice in public hospitals in Malaysia. The study reports a high level of acceptance and acceptable extent of facilitating conditions of teleconsultation technology. Thus, some …


Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung Dec 2012

Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung

Dr Khin Win

The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of “Triangulation research method” and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …


Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win Dec 2012

Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win

Dr Khin Win

The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …


A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher Dec 2012

A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher

Dr Khin Win

Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …


Towards A Typology Of Green Is Strategies: Insights From Case Study Research, Fabian Loeser Dec 2012

Towards A Typology Of Green Is Strategies: Insights From Case Study Research, Fabian Loeser

Fabian Loeser

Presentation held @ ICIS 2012, Orlando Track 9: Green IS and Sustainability Session: Green IS/IT Initiatives December 19, 10:30 am – 12:00 pm, Salon 10


Distributed Development And Product Line Decisions, Ram Bala, V. Krishnan, Wenge Zhu Dec 2012

Distributed Development And Product Line Decisions, Ram Bala, V. Krishnan, Wenge Zhu

Information Systems and Analytics

Distributed product development is becoming increasingly prevalent in a number of industries. We study how the global distribution of product development impacts the profit-maximizing product line that a firm offers. Specifically, we formulate a model to understand the linkage between cost arbitrage as a driver of distributed development and consequent market implications such as customer perceived quality loss to remotely developed products. Analysis of the model reveals that a firm should expand the product line for a development-intensive good only at intermediate values of cost advantage and quality loss. We modify the base model to include development capacity constraints as …


Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain Dec 2012

Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain

Business Administration Faculty Publications

Existing web service repositories are not well suited to handle the multi-layered representation of web services, nor are they able to support multiple development methodologies. We describe the design and development of a repository called Web Service Crawler that supports both a traditional development methodology for the initial design of services, and an agile approach for the design of composite applications. Web Service Crawler is developed based on a set of theory-based design characteristics, and includes novel facets to represent multi-layered web services, such as workflow, composition, and layer. The positive evaluation results indicate that Web Service Crawler can be …


Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain Dec 2012

Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain

Business Administration Faculty Presentations

Existing web service repositories are not well suited to handle the multi-layered representation of web services, nor are they able to support multiple development methodologies. We describe the design and development of a repository called Web Service Crawler that supports both a traditional development methodology for the initial design of services, and an agile approach for the design of composite applications. Web Service Crawler is developed based on a set of theory-based design characteristics, and includes novel facets to represent multi-layered web services, such as workflow, composition, and layer. The positive evaluation results indicate that Web Service Crawler can be …


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Dec 2012

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Dr Akemi Chatfield

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell Dec 2012

Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell

Associate Professor Ghassan Beydoun

Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …


Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun Dec 2012

Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun

Associate Professor Ghassan Beydoun

Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …


Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell Dec 2012

Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell

Dr Glenn Bewsell

This research investigates mechanisms that impact trust and trust as an organising principle at online auctions using data collected from a community website. Qualitative analysis is used to make sense of the data collected and to identify key factors that impact trust and organising for trust. As a result of the discussion, I attempt to explore key factors that impact trust at online auctions and relate the discussion to previous research. This research adds to the understanding of trust theory and online auction trust, and this research can be used by practitioners to better support users and improve the design …


Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety Dec 2012

Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety

Dr Ping Yu

This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell Dec 2012

Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell

Dr Holly Tootell

Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Dec 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Dr Holly Tootell

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …


Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma Dec 2012

Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma

Professor Rajeev Sharma

Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.


The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds Dec 2012

The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds

Professor Rajeev Sharma

Business analytics involves interpreting organizational data to improve decision-making and to optimise business processes. It has the potential to improve firm performance and increase competitive advantage. Although many case studies have been reported that describe business analytics applications and speculate about how they might contribute to firm performance, there is no clearly articulated and theoretically grounded model in the literature. This paper proposes a theoretical framework for understanding how and why business analytics technology and capabilities can lead to value-creating actions that lead to improved form performance and competitive advantage. We focus particularly on how strategy and maturity impact business …


The Role Of Confirmation In Is Continuance Theory: A Comprehensive Meta-Analysis, John Laugesen Dec 2012

The Role Of Confirmation In Is Continuance Theory: A Comprehensive Meta-Analysis, John Laugesen

Publications and Scholarship

This paper provides a meta-analysis of Information Systems Continuance (ISC) theory, specifically focusing on the relationships that Confirmation has with Satisfaction, Perceived Usefulness and Continuance Intention. A comprehensive literature review for the years 2001 to 2012 revealed 75 ISC studies from 72 papers. The results of this meta-analysis indicate the robustness of ISC theory and model, with large effect sizes for the three key relationships. Moderator analyses indicate larger effect sizes for nonconvenience samples (versus convenience samples) and educational/eLearning Information Systems and personal Information Systems (versus corporate Information Systems). Implications of the results are discussed, along with implications for researchers …


Amazon.Com: Offering Everything From A To Z, Stephanie Lang, Logan Tinder, Jarett Zimmerman, Jeffrey S. Harrison Dec 2012

Amazon.Com: Offering Everything From A To Z, Stephanie Lang, Logan Tinder, Jarett Zimmerman, Jeffrey S. Harrison

Robins Case Network

Amazon’s focus on customer service has led to an impressive record of growth and profitability. However, late in 2012, the company posted a quarterly loss. This asks whether the company may be sacrificing profits in the interest of growing rapidly. It also explores the incredibly competitive environment Amazon faces.


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Dec 2012

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

MIS/OM/DS Faculty Publications

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Innovation Dans La Livraison, Jacob Johnsen Nov 2012

Innovation Dans La Livraison, Jacob Johnsen

Jacob Johnsen, MSc

A summary of the status of postal volumes, the current decline in volumes and the compelling strategies to position posts for the future based on their delivering ability.


Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr. Nov 2012

Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.

Chong W. Kim

As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization. In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …


On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose Nov 2012

On Business Services Representation – The 3 X 3 X 3 Approach, Lam-Son Lê, Hoa Khanh Dam, Aditya Ghose

Dr Lam-Son Le

The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …


Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê Nov 2012

Services For Business Processes In Ea – Are They In Relation?, Lam-Son Lê

Dr Lam-Son Le

Business services arguably play a central role in service-based information systems as they would fill in the gap between the technicality of Service-Oriented Architecture and the business processes captured in Enterprise Architecture. Business services have distinctive features that are not typically observed in plain Web services. The representation of business services requires that we view human activity and human-mediated functionality through the lens of computing and systems engineering. We give insights into the modeling of business services and relationships between them. This work sheds light on the analysis, design and reusability of business-aware services that business owners, entrepreneurs and business …


Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland Nov 2012

Enterprise Soa Implementation Readiness: A Case Study In Malaysia, Mahshitah Abdul Manan, Peter Hyland

Associate Professor Peter Hyland

Many vendors have acclaimed Service Oriented Architecture (SOA) as a better way to design and build enterprise-wide software. While these claims may be true in the private sector, there is scant evidence in the literature for the same success in the public sector. The adoption of SOA as the dominant development paradigm within an organisation often requires significant organisational changes, which are difficult to achieve in the public sector, with its strict hierarchies and departmental independence. Indeed, many government departments are not ready to adopt this new paradigm. However, the literature does not provide a suitable SOA readiness framework for …


Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland Nov 2012

Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland

Associate Professor Peter Hyland

While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …