Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Management Information Systems

Socio-Economic Management Theory Related To Bpm: A Case Study Of Dysfunctions In Digital Transformation Strategy, Yanfei Zhang, Emmanuel Monod, Gerard Beenen, Yuewei Jiang, Chris H. Willis Jan 2023

Socio-Economic Management Theory Related To Bpm: A Case Study Of Dysfunctions In Digital Transformation Strategy, Yanfei Zhang, Emmanuel Monod, Gerard Beenen, Yuewei Jiang, Chris H. Willis

Management Faculty Publications

This research claims that dynamic strategies demanded by today’s digital environment exacerbate inconsistency between an organization’s digital transformation efforts and its enterprise architecture (EA) planning process. This phenomenon leads to redundant investments, delayed implementation, and frequent failures in digital transformation projects. In order to investigate this inconsistency, we apply the socioeconomic approach to management (SEAM) theory. Through critical analysis of four case studies in a large manufacturing organization, we clarify the relationship between digital transformation and EA and reveal the dysfunction in strategic implementation from a SEAM and business process management (BPM) perspective. In practice, this research integrates digital transformation …


The “Right” Recipes For Security Culture: A Competing Values Model Perspective, Hwee-Joo Kam, Thoma Mattson, Dan J. Kim Sep 2020

The “Right” Recipes For Security Culture: A Competing Values Model Perspective, Hwee-Joo Kam, Thoma Mattson, Dan J. Kim

Management Faculty Publications

This study argues that the effect of perceived organizational culture on the formation of security-related subjective norms and the level of compliance pressure will vary based on how the employees perceive their organization’s cultural values. These perceptions reflect on the assumptions and principles that organizations use to guide their security-related behaviors. To make these arguments, we adopt the competing values model (CVM), which is a model used to understand the range of organizational values and resulting cultural archetypes.


Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu Jan 2018

Beauty Is In The Eye Of The Beholder: Toward A Contextual Understanding Of Compensation Of It Professionals Within And Across Geographies, Jonathan W. Whitaker, Sunil Mithas, Chewei Liu

Management Faculty Publications

How do multinational corporations (MNCs) and domestic firms compensate technical and managerial skills of knowledge workers within and across geographies? This paper answers this question by examining how developed economy MNCs and emerging economy firms value MBA education and firm-specific IT experience of IT professionals in India; and how developed economy MNCs value MBA education and firm-specific IT experience differently across India and the U.S. Our analyses of archival data on more than 20,000 IT professionals reveal two important findings. First, for IT professionals in India, the marginal effect of firm-specific IT experience on compensation is greater for developed economy …


How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson Jan 2017

How Multinational Corporations Use Information Technology To Manage Global Operations, Jonathan W. Whitaker, Peter Ekman, Steven M. Thompson

Management Faculty Publications

Despite a generally-acknowledged importance of information technology (IT) in enabling global strategy and a broad understanding of the manner in which IT enhances coordination and reduces cost, few studies have focused precisely on how multinational corporations (MNCs) use IT to facilitate globalization. To address this gap in the literature, we conduct a case study across four large MNCs, and use primary data to develop theoretical propositions on the characteristics of products, processes and customers that impact the ways in which MNCs use IT to manage their global operations.


Department Chairs As Leaders: A Model Of Social Intelligence And Creative Performance In A State University, Afzal Rahim, Ismail Civelek, Feng Helen Liang Jan 2015

Department Chairs As Leaders: A Model Of Social Intelligence And Creative Performance In A State University, Afzal Rahim, Ismail Civelek, Feng Helen Liang

Management Faculty Publications

This study presents a structural equations model that represents relationships between department chairs’ social intelligence (SI) and their creative performance (CP) at a public university in the United States. SI was defined as the ability to be aware of relevant social situations, to manage situational challenges effectively, to understand others’ concerns and feelings, and to build and maintain positive relationships in social settings. Four components of SI were examined: situational awareness, situational response, cognitive empathy, and social skills. The model was tested with questionnaire data from 406 faculty members belonging to 43 departments in a state university. The data analyses …


A Model To Support It Infrastructure Planning And The Allocation Of It Governance Authority, Steven M. Thompson, Peter Ekman, Daniel Selby, Jonathan W. Whitaker Mar 2014

A Model To Support It Infrastructure Planning And The Allocation Of It Governance Authority, Steven M. Thompson, Peter Ekman, Daniel Selby, Jonathan W. Whitaker

Management Faculty Publications

Information technology (IT) requires a significant investment, involving up to 10.5% of revenue for some firms. Managers responsible for aligning IT investments with their firm's strategy seek to minimize technology costs, while ensuring that the IT infrastructure can accommodate increasing utilization, new software applications, and modifications to existing software applications. It becomes more challenging to align IT infrastructure and IT investments with firm strategy when firms operate in multiple geographic markets, because the firm faces different competitive positions and unique challenges in each market.

We discussed these challenges with IT executives at four Forbes Global 2000 firms headquartered in Northern …


A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan Sep 2007

A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan

Management Faculty Publications

Radio Frequency Identification (RFID) technology promises to transform supply chain management. Building on previous research in information systems and supply chain management, this paper proposes a theoretical framework for RFID adoption and benefits, and tests the framework using data on U.S. firms. Our analysis suggests that there is a positive association between information technology (IT) application deployment and RFID adoption. We find that RFID implementation spending and partner mandate are associated with an expectation of early return on RFID investment, and a perceived lack of industry-wide standards is associated with an expectation of delayed return on RFID investment. These results …


Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson Feb 2007

Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson

Management Faculty Publications

The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the …


Information Technology, Production Process Outsourcing, And Manufacturing Plant Performance, Indranil Bardhan, Jonathan W. Whitaker, Sunil Mithas Oct 2006

Information Technology, Production Process Outsourcing, And Manufacturing Plant Performance, Indranil Bardhan, Jonathan W. Whitaker, Sunil Mithas

Management Faculty Publications

What is the role of information technology (IT) in enabling the outsourcing of manufacturing plant production processes? Do plant strategies influence production outsourcing? Does production process outsourcing influence plant performance? This research addresses these questions by investigating the role of IT and plant strategies as antecedents of production outsourcing, and evaluating the impact of production outsourcing and IT investments on plant cost and quality. We develop a theoretical framework for the antecedents and performance outcomes of production outsourcing at the plant level. We validate this theoretical framework using cross-sectional survey data from U.S. manufacturing plants. Our analysis suggests that plants …