Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Management Information Systems

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz Dec 2007

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz

CGU Faculty Publications and Research

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …


A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman Dec 2007

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …


Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard Dec 2007

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard

Research Collection School Of Computing and Information Systems

The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller Nov 2007

Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …


Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova Oct 2007

Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Yuri Merkuryev, Liana Napalkova

Liana Napalkova

No abstract provided.


Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo Oct 2007

Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo

Research Collection School Of Computing and Information Systems

In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …


Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs Oct 2007

Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs

MIS/OM/DS Faculty Publications

The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …


Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova Sep 2007

Development Of Simulation-Based Environment For Multi-Echelon Cyclic Planning And Optimisation, Galina Merkuryeva, Liana Napalkova

Liana Napalkova

This paper focuses on the development of simulation-based environment for multi-echelon cyclic planning and optimisation in the product maturity phase. It is based on integration of analytical and simulation techniques. Analytical techniques are used to obtain initial planning decisions under conditions of stochastic demand and lead time, whereas simulation techniques extend these conditions to backlogging and capacity constraints. Simulation is used to analyse and improve cyclical decisions received from the analytical model. The proposed environment includes four components, such as database, process, optimisation and procedural one. Database component defines a supply chain network and its input parameters. Procedural component generates …


A Survey Of Schema Matching Research, Roger Blake Sep 2007

A Survey Of Schema Matching Research, Roger Blake

College of Management Working Papers and Reports

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Mobile Information Communication Technology For Crisis Management : Understanding User Behavior, Response And Training, Elizabeth Avery Gomez Aug 2007

Mobile Information Communication Technology For Crisis Management : Understanding User Behavior, Response And Training, Elizabeth Avery Gomez

Dissertations

SMS text-messaging is an interoperable communication vehicle known to be dependable for mass media alert notifications in crisis management. SMS text-messaging also offers potential as one viable two-way communication alternative for field responders in crisis response. Both continuously changing mobile information communication technologies and the importance of precise information exchange constitute a need for communication protocol training and practice. This study introduces a technology-mediated training technique based on speech act and communicative action theories. These theories are used to inform the design of a baseline measure for task performance improvement and to suggest a model to predict communication readiness. Because …


Designing Multimodal Interaction For The Visually Impaired, Xiaoyu Chen Aug 2007

Designing Multimodal Interaction For The Visually Impaired, Xiaoyu Chen

Dissertations

Although multimodal computer input is believed to have advantages over unimodal input, little has been done to understand how to design a multimodal input mechanism to facilitate visually impaired users' information access.

This research investigates sighted and visually impaired users' multimodal interaction choices when given an interaction grammar that supports speech and touch input modalities. It investigates whether task type, working memory load, or prevalence of errors in a given modality impact a user's choice. Theories in human memory and attention are used to explain the users' speech and touch input coordination.

Among the abundant findings from this research, the …


Research On Multi-Agent-Based Shipping Information System, Kai Wang Aug 2007

Research On Multi-Agent-Based Shipping Information System, Kai Wang

World Maritime University Dissertations

No abstract provided.


The Business Model Of "Software-As-A-Service", Dan Ma Jul 2007

The Business Model Of "Software-As-A-Service", Dan Ma

Research Collection School Of Computing and Information Systems

The emergence of the software-as-a-service (SaaS) business model has attracted great attentions from both researchers and practitioners. SaaS vendors deliver on-demand information processing services to users, and thus offer computing utility rather than the standalone software itself. In this work, the author propose an analytical model to study the competition between the SaaS and the traditional COTS (commercial off-the-shelf) solutions for software applications. The author show that when software applications become open, modulated, and standardized, the SaaS business model will take a significant market share. In addition, under certain market conditions, offering users an easy exit option through the software …


Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo Jul 2007

Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo

Research Collection School Of Computing and Information Systems

Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson’s Correlation Coefficient to measure user similarities based on their previous ratings on different items. Users will then be grouped into different neighborhood depending on the calculated similarities. Finally, the system will generate predictions on how a user would rate a specific item by aggregating ratings on the item cast by the identified neighbors of his/her. However, current memory-based CF method only measures user similarities …


Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe Jul 2007

Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organisational behaviour and management literature has devoted a lot attention on various factors affecting organisational learning. While there has been much work done to examine trust in promoting organisational learning, there is a lack of consensus on the specific type of trust involved. The purpose of this paper is to highlight the importance of interpersonal trust in promoting organisational learning and propose a research agenda to test the extent of interpersonal trust on organisational learning. This paper contributes to the existing organisational learning literature by specifying a specific form of trust, interpersonal trust, which promotes organisational learning and proposing …


People-Search : Searching For People Sharing Similar Interests From The Web, Quanzhi Li May 2007

People-Search : Searching For People Sharing Similar Interests From The Web, Quanzhi Li

Dissertations

On the Web, there are limited ways of finding people sharing similar interests or background with a given person. The current methods, such as using regular search engines, are either ineffective or time consuming. In this work, a new approach for searching people sharing similar interests from the Web, called People-Search, is presented. Given a person, to find similar people from the Web, there are two major research issues: person representation and matching persons. In this study, a person representation method which uses a person's website to represent this person's interest and background is proposed. The design of matching process …


Sifting Customers From The Clickstream : Behavior Pattern Discovery In A Virtual Shopping Environment, Peishih Chang May 2007

Sifting Customers From The Clickstream : Behavior Pattern Discovery In A Virtual Shopping Environment, Peishih Chang

Dissertations

While shopping online, customers' needs and goals may change dynamically, based on a variety of factors such as product information and characteristics, time pressure and perceived risk. While these changes create emergent information needs, decisions about what information to present to customers are typically made before customers have visited a web site, using data such as purchase histories and logs of web pages visited. Better understanding of customer cognition and behavior as a function of various factors is needed in order to enable the right information to be presented at the right time. One approach to achieving this understanding is …


Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard May 2007

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

Research Collection School Of Computing and Information Systems

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr. Apr 2007

Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr.

Publications (YM)

This procedure establishes the responsibilities and provides direction for developing and evaluating the adequacy of process controls on specific uses of electronically stored information. These uses include, but are not limited to, information used in design input, developed as design output, or developed as input to or output from scientific investigation or performance assessment modeling and analysis. This pertains to information that resides in an electronic information management system or on electronic media.


An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp Apr 2007

An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this paper is to provide an exploratory study on the implementation and issues regarding Quality Management Systems as defined by ISO 9001 :2000 using the architecture of ISO/IEC 15504. The recently published ISO/IEC 15504 series of standards provides a framework to assess processes and determine levels of capability. With the use of this framework, the study will focus on the assessment and identification of problem areas requiring focus for continual improvement within an ISO 9001 :2000 quality management system.

The structure of this paper is as follows: Section 1 provides a background discussion of ISO 9001 :2000. …


Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March Mar 2007

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March

Research Collection School Of Computing and Information Systems

Decisions to invest in information technology (IT) infrastructure are often made based on an assessment of its immediate value to the organization. However, an important source of value comes from the fact that such technologies have the potential to be leveraged in the development of future applications. From a real options perspective, IT infrastructure investments create growth options that can be exercised if and when an organization decides to develop systems to provide new or enhanced IT capabilities. We present an analytical model based on real options that shows the process by which this potential is converted into business value, …


A Collaborative, Hierarchical, Incremental, And Problem Solving Information Systems Development Model, Timothy Joseph Burns Jan 2007

A Collaborative, Hierarchical, Incremental, And Problem Solving Information Systems Development Model, Timothy Joseph Burns

Dissertations

The "software crisis" has been a much discussed and debated topic in Information Systems research. A core cause of the crisis is often identified as the methodologies and approaches used to develop information systems. Thus, over the years a multitude of methodologies have emerged in support of quality software. While many of these methodologies have been effective, research has shown that system development is a highly circumstantial process, and that no one methodology can be optimal in every context of every project. It is also a fact that system development practitioners have employed ad hoc approaches to modify formal methodologies …


Ontology Development For Context-Sensitive Decision Support, Shah Jahan Miah Jan 2007

Ontology Development For Context-Sensitive Decision Support, Shah Jahan Miah

Dr Shah Jahan Miah

Semantics have become acceptable techniques for data integration, data interoperability and data visualization in many software engineering domains and web developments over the past few years. This paper describes a software development where semantic ontology techniques have been used for developing a generic knowledge model applicable across rural industries. This technique enables us to outline a single access point for building end-user specific knowledge based systems. We have called the new solution prototype an End-User Enabled Design Environment (EUEDE) where the knowledge components from the problem ontology is used in building specific decision systems that are contextsensitive to end-user factors. …


Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad Jan 2007

Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, and contract duration. Information technology (IT) services vendors manage portfolios of contracts in which parameters, decided at inception, are often subject to future risks. The contract profit maximization decision may adversely affect the risk position of the firm's portfolio of services contracts. We propose a model to inform vendors on setting optimal parameters for IS contracts subject to acceptable levels of risk. The analytic model presented draws from IS economics research and the principles of value-at-risk (VaR) …


Predicting Crime Reporting With Decision Trees And The National Crime Victimization Survey, Gondy Leroy, Juliette Gutierrez '13 Jan 2007

Predicting Crime Reporting With Decision Trees And The National Crime Victimization Survey, Gondy Leroy, Juliette Gutierrez '13

CGU Faculty Publications and Research

Crime reports are used by law enforcement to find criminals, prevent further violations, identify problems causing crimes and allocate government resources. Unfortunately, many crimes go unreported. This may lead to an incorrect crime picture and suboptimal responses to the existing situation. Our goal is to use a data mining approach to increase understanding of when crime is reported or not. An increased understanding could lead to new, more effective programs to fight crime or changes to existing programs. We use the National Crime Victimization Survey (NCVS) which comprises data collected from 45,000 households about incidents, victims, suspects and if the …


Revealing The Antecedents And Benefits Of Kms Use: An Exploratory Study In A Petroleum Company In Oman, Kamla Al-Busaidi '05, Lorne Olfman, Terry Ryan, Gondy Leroy Jan 2007

Revealing The Antecedents And Benefits Of Kms Use: An Exploratory Study In A Petroleum Company In Oman, Kamla Al-Busaidi '05, Lorne Olfman, Terry Ryan, Gondy Leroy

CGU Faculty Publications and Research

This pilot study aimed to explore technical and social antecedents and benefits of KMS use in a petroleum company in Oman. Data was collected through questionnaire given to KMS users. From the technical perspective, results uncovered that both knowledge utilizers and contributors were concerned about the system ease of use, speed and integration. Knowledge utilizers also valued knowledge richness in terms of relevancy and timeliness. From the social perspective, both knowledge utilizers and contributors considered time/availability as the major determinant of their behaviors. The results also suggested that knowledge utillizers valued the technical factors more than the social factors, whereas, …


Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo Jan 2007

Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo

Research Collection School Of Computing and Information Systems

Real-time supply chain management in a rapidly changing environment requires reactive and dynamic collaboration among participating entities. In this work, we model supply chain as a multi-agent system where agents are subject to an adjustable autonomy. The autonomy of an agent refers to its capability to make and influence decisions within a multi-agent system. Adjustable autonomy means changing the autonomy of the agents during runtime as a response to changes in the environment. In the context of a supply chain, different entities will have different autonomy levels and objective functions as the environment changes, and the goal is to design …