Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Management Information Systems

Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle Dec 2007

Geschäftsmodelle 2010 – Wie Sie Ihr Unternehmen Erfolgreich Transformieren, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Silent Processes For Independent Living, Hubert Oesterle Dec 2007

Silent Processes For Independent Living, Hubert Oesterle

Hubert Oesterle

No abstract provided.


It-Basierte Geschäftsmodelle, Hubert Oesterle Nov 2007

It-Basierte Geschäftsmodelle, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle Sep 2007

Kooperative Geschäftsmodelle – Auf Dem Weg Zu Silent Processes, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Geschäftsmodelle 2010 - Kundenwert Aus Kundenprozess, Hubert Oesterle Aug 2007

Geschäftsmodelle 2010 - Kundenwert Aus Kundenprozess, Hubert Oesterle

Hubert Oesterle

No abstract provided.


User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu Jun 2007

User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu

Qing Hu

The Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) are widely used in the information systems (IS) literature to explain and predict user technology acceptance behavior. Although these models have been utilized separately in the earlier studies, to increase the richness and predictive power of their studies, scholars have combined both theories in more recent studies. However, few studies have compared these models directly using the same empirical data. The justification for using various hybrid models is mostly anecdotal and convenient rather than based on strong theoretical arguments. Thus the question remains: when studying user technology acceptance behavior, …


Lettre Recommandée Électronique, Jacob Johnsen Jun 2007

Lettre Recommandée Électronique, Jacob Johnsen

Jacob Johnsen, MSc

Les principes et les avantages quand on se sert du courrier hybride pour les lettres recommandées.


Networkability Of Organizations And Business Networks, Rainer Alt, Martin Smits Apr 2007

Networkability Of Organizations And Business Networks, Rainer Alt, Martin Smits

Hubert Oesterle

No abstract provided.


Geschäftsmodellinnovation In Der Bankenindustrie, Hubert Oesterle Feb 2007

Geschäftsmodellinnovation In Der Bankenindustrie, Hubert Oesterle

Hubert Oesterle

No abstract provided.


The Challenges Of Inter-Organizational Business Process Design – A Research Agenda, Christine Legner, Kristin Wende Feb 2007

The Challenges Of Inter-Organizational Business Process Design – A Research Agenda, Christine Legner, Kristin Wende

Hubert Oesterle

Given the increasing importance of value chain collaboration, business processes need to be more closely aligned across organizational boundaries. Hence, business process modeling and design have to be enhanced and extended to cope with inter-organizational business relationships. Among the challenges that arise are interdependencies between internal and external processes, different process logic and terminology, missing clarification of responsibilities and confidentiality issues. This paper analyzes existing approaches to business process modeling, workflow management and B2B standardization with regard to the specific requirements concerning inter-organizational business process design. It extracts the relevant concepts addressing these requirements and draws up an agenda for …


Soa Adoption In Practice - Findings From Early Soa Implementations, Christine Legner, Roger Heutschi Feb 2007

Soa Adoption In Practice - Findings From Early Soa Implementations, Christine Legner, Roger Heutschi

Hubert Oesterle

Despite the wide range of advantages which many authors associate with the introduction of a service-oriented architecture (SOA), comprehensive SOA implementations continue to be scarce in practice. Consequently, questions arise as to how the concept is adapted in practice. This paper compares the scientific view of SOA concepts with initial practical experience from first SOA implementations. Based on an SOA model which is derived from recent SOA publications it examines SOA realization in four case studies. From the cross-case analysis, the authors derive three focus areas of SOA adoption, a prioritization of SOA design principles as well as typical steps …


Geschäftsmodelle 2010 - Trends Und Schritte, Hubert Oesterle Feb 2007

Geschäftsmodelle 2010 - Trends Und Schritte, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci Jan 2007

Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci

Journal of International Technology and Information Management

The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …


Menedżerowie W Oczach Informatyków, Dariusz Jemielniak Jan 2007

Menedżerowie W Oczach Informatyków, Dariusz Jemielniak

Dariusz Jemielniak

Niniejszy artykuł prezentuje wyniki jakościowej, etnograficznej analizy relacji menedżerowie-programiści w projektach informatycznych. Opisuje percepcję przełożonych w oczach informatyków.


Zarządzanie Wiedzą W Powiązaniu Z Hpws: Zastosowanie W Spółkach High-Tech, Dariusz Jemielniak Jan 2007

Zarządzanie Wiedzą W Powiązaniu Z Hpws: Zastosowanie W Spółkach High-Tech, Dariusz Jemielniak

Dariusz Jemielniak

No abstract provided.


Managers As Lazy, Stupid Careerists? Contestation And Stereotypes Among Software Engineers, Dariusz Jemielniak Jan 2007

Managers As Lazy, Stupid Careerists? Contestation And Stereotypes Among Software Engineers, Dariusz Jemielniak

Dariusz Jemielniak

Purpose – The purpose of this paper is to present the results of a qualitative study of software engineers' perception of dress code, career, organizations, and of managers. Design/methodology/approach – The software engineers interviewed work in three European and two US companies. The research is based on ethnographic data, gathered in two longitudinal studies during the period2001-2006 . The methods used in the study include open-ended unstructured interviews, participant observation, collection of stories, and shadowing. Findings – It was found that the majority of software engineers denounce formal dress-codes. The notion of career was defined by them mostly in terms …


(Dis)Trust In Software Projects: A Thrice Told Tale: On Dynamic Relationships Between Software Engineers, It Project Managers, And Customers, Dariusz Jemielniak, Dominika Latusek Jan 2007

(Dis)Trust In Software Projects: A Thrice Told Tale: On Dynamic Relationships Between Software Engineers, It Project Managers, And Customers, Dariusz Jemielniak, Dominika Latusek

Dariusz Jemielniak

Software development traditionally has been a field particularly prone to delays, exceeding budgets, and misunderstandings (May 1998; Connel, 2001; Humphrey, 2002; Goodwin, 2002; Kesteloot, 2003). Only 1/4 of IT projects is completed successfully – i.e. in time, with the assumed cost, and fulfilling the promised functionality (Smith and Keil, 2003). Although there is some improvement over the last years, software creation is still one of the most unpredictable businesses in the world. It should not be surprising then that high-tech environment often is described as stressful an demanding (Kunda, 1992; Hochschild, 1997; Perlow, 1998; Cooper, 2000; Jemielniak, 2005). It is …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams Jan 2007

Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams

Journal of International Technology and Information Management

Discovering patterns that indicate software reliability provides valuable information to software project managers. Software Quality Classification (SQC) modeling is a methodology that can be used to discover reliability patterns of large software projects. However, the patterns found by SQC modeling may not be accurate and robust owing to insufficient information used in the training process. This study compares two genetic programming-based SQC models using different volumes of data. These data were extracted from seven different NASA software projects. The results demonstrate that combining data from different projects can produce more accurate and reliable patterns.


Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash Jan 2007

Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash

Journal of International Technology and Information Management

The paper reports the development of an e-monitoring and maintenance system based on web technology and mobile device, PDA. Rarity of experts led to the application of artificial intelligence and later, distributed artificial intelligence for condition monitoring and diagnosis of machine condition. Recently, web technology along with wireless communication is emerging as a potent tool in maintenance. It facilitates obtaining of the desired information by the relevant personnel at any time wherever he may be. The paper first describes the web and mobile architecture that formed the basis of the system and ICT tools used to communicate among the different …


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides Jan 2007

Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides

Journal of International Technology and Information Management

The mobile telephony market is a very competitive market. Mobile telephony companies try to expand by forming strategic alliances with companies from various industries. The objective of this paper is to analyze the motives, the actions and the results of the collaborations and alliances of two Greek mobile telephony companies (Cosmote and Vodafone Hellas). In addition, this paper illustrates examples of how the technology change and the technological convergence (Internet, computers, and mobile telephony) affected and activated the proliferation of these alliances. The entry of I-mode and Vodafone Live! in the Greek market caused an increase in the number of …


Improving Credit Card Operations With Data Mining Techniques, Malini Krishnamurthi Jan 2007

Improving Credit Card Operations With Data Mining Techniques, Malini Krishnamurthi

Journal of International Technology and Information Management

Consumer credit is ubiquitous and lending poses credit risk – the risk of economic loss due to the failure of a borrower to repay according to the terms of his or her contract with the lender. And so, managing credit risk entails estimating the potential ability of borrowers to repay their debts. Researchers have sought to identify factors that contribute to consumer risk, by using quantitative models. However, the presence of data mining techniques to identify credit risk cannot be ignored. There is a paucity of research to demonstrate the use of data mining techniques in this context, and such …


Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava Jan 2007

Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava

Journal of International Technology and Information Management

UML is widely used as an industry standard for modeling any system. In this paper will be dealing with simple UML diagrams and show that low it can be transformed into process algebra models specially designated to model urban traffic systems. The model capture functionality at the level of mesoscopic as well as microscopic level and it is merged with process algebra’s producer consumer theory. The model is also formalized using Process algebra equations. This paper focuses on complex situational activity diagrams enhancing the expressivity by refining at the abstraction levels. Performance requirement is annotated by the UML profile for …


Organizational Adoption Of Web-Enabled Services For Information Dissemination, Pamila Dembla, Prashant Palvia, Lloyd Brooks Jan 2007

Organizational Adoption Of Web-Enabled Services For Information Dissemination, Pamila Dembla, Prashant Palvia, Lloyd Brooks

Faculty and Research Publications

Although communication, collaboration, and transaction processing are some of the important business functions facilitated by the web, timely dissemination of information is critical for ultimate customer satisfaction and potential profitability. The purpose of this study is to determine the affect that contextual factors such as IS maturity, organizational attributes, and environmental characteristics have on perceived usefulness and adoption of web-enabled services for information dissemination in organizations. The key focus of this article is "organizational adoption" as opposed to individual acceptance for which there have been numerous studies. A research model and eight hypotheses were developed based on past literature. Data …


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier Jan 2007

A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier

Journal of International Technology and Information Management

This paper develops a framework and model for building trust by combining research on the creation of trust with the dimensions of trust: ability, benevolence and integrity. By combining these dimensions in a matrix with the types of trust production based on characteristics, process and institutions, the paper develops a robust 3 x 3 matrix with which to categorize and understand trust production. The framework is developed and analyzed in the light of literature on consumer trust. This framework can help researchers, practitioners and consumers understand trust creation and assist businesses in developing a comprehensive strategy for managing trust.