Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Argument roles (1)
- Auction mechanisms (1)
- Corporate Social Responsibility (1)
- Design (1)
- Disagreement management (1)
-
- E-Waste (1)
- Enterprise Sustainability (1)
- Environmental Regulations (1)
- Fracking (1)
- Green IT (1)
- IT Asset Disposition (1)
- IT Audit (1)
- IT Governance (1)
- Institutions (1)
- Macroscopes for argumentation (1)
- Natural language processing (1)
- Organizational communication (1)
- Polylogue (1)
- Practice (1)
- Procurement (1)
- Recycling (1)
- Reverse Logistics (1)
- Social network analysis (1)
- Sourcing. (1)
- Publication
- Publication Type
Articles 1 - 29 of 29
Full-Text Articles in Management Information Systems
Isscm Newsletter, Volume 15, December 20, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 15, December 20, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
An eight page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 14, November 15, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
An eleven page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Isscm, Master Of I.S. Cohort, Fall 2016, Raj Soin College Of Business, Wright State University
Isscm, Master Of I.S. Cohort, Fall 2016, Raj Soin College Of Business, Wright State University
ISSCM Master Cohort Posters
Poster of the 2016 Cohort from the Master of Information Systems Program.
Isscm, M.S. In Logistics & Scm Cohort, Fall 2016, Raj Soin College Of Business, Wright State University
Isscm, M.S. In Logistics & Scm Cohort, Fall 2016, Raj Soin College Of Business, Wright State University
ISSCM Master Cohort Posters
Poster of the Fall 2016 Cohort from the Master of Science in Logistics and Supply Chain Management Program.
Isscm Newsletter, Volume 13, September 28, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 13, September 28, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A ten page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs
Mark A. Jacobs
The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …
Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs
Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs
Mark A. Jacobs
Business leaders are concerned about the impacts of increasing levels of product portfolio complexity since many sense that complexity related costs such as order management, procurement, and inventory threaten to undermine operational efficiencies and consume profits. Even so, managers do not fully understand the extent and breadth of the impacts of product portfolio complexity. A more complete understanding of the operational effects of product portfolio complexity is lacking partially because researchers have not yet offered a robust theoretical perspective or studied it in a focused controlled way; until now. Herein, measures of product portfolio complexity are developed and related to …
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
Paul B. Sweeney
Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …
Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman
Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman
Michael F. Gorman
We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function. Our results from test cases show with high confidence that current prices are not optimal, as indicated by a …
Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman
Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman
Michael F. Gorman
In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.
Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.
The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt
The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt
Donald Wynn
In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Donald Wynn
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Donald Wynn
Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Donald Wynn
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
Harvey Enns
Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Harvey Enns
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney
Harvey Enns
Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
William D Salisbury PhD
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn
Thomas Ferratt
Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
Thomas Ferratt
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Thomas Ferratt
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
Isscm Newsletter, Volume 12, May 20, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 12, May 20, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A fifteen page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Argumentation In Large, Complex Practices, Mark Aakhus, Paul Ziek, Punit Dadlani
Argumentation In Large, Complex Practices, Mark Aakhus, Paul Ziek, Punit Dadlani
OSSA Conference Archive
Differences arise in macro-activities, such as the production of energy, food, and healthcare, where the management of these differences happens in polylogues as many actors pursue scores of positions on a variety of issues in numerous venues. Polylogues are essential to the large-scale practices that organize macro-activities but present significant challenges for argumentation theory and research. Key to the challenge is conceptualizing the variety of argumentative roles that go beyond the classic normative definition of protagonist and antagonist. A macroscope is devised for identifying argumentative roles in the communicative work of organizations, and the communicative work of the network of …
Isscm Newsletter, Volume 11, March 23, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 11, March 23, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A ten page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Isscm Newsletter, Volume 10, February 15, 2016, Raj Soin College Of Business, Wright State University
Isscm Newsletter, Volume 10, February 15, 2016, Raj Soin College Of Business, Wright State University
ISSCM Newsletters
A ten page newsletter from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Department Of Information Systems & Supply Chain Management Annual Report, 2015-2016, Raj Soin College Of Business, Wright State University
Department Of Information Systems & Supply Chain Management Annual Report, 2015-2016, Raj Soin College Of Business, Wright State University
ISSCM Annual Reports
A fifty-nine page 2015-2016 annual report from the Department of Information Systems and Supply Chain Management in the Raj Soin College of Business at Wright State University.
Isscm Scholarship And Awards 2016, Raj Soin College Of Business, Wright State University
Isscm Scholarship And Awards 2016, Raj Soin College Of Business, Wright State University
ISSCM Awards & Scholarships
Scholarships and Awards presented in the ISSCM Department. This document includes photos of recipients receiving awards.
Enterprise It Asset Disposition: An Overview And Tutorial, Shu Z. Schiller, Jeff Merhout, Rike Sandlin
Enterprise It Asset Disposition: An Overview And Tutorial, Shu Z. Schiller, Jeff Merhout, Rike Sandlin
ISSCM Faculty Publications
Enterprise IT Asset Disposition (ITAD) addresses the recovery and recycling of an enterprise’s IT assets that are near or at the end of their lifecycle. The aim of ITAD is to maximize the value of investment over the IT asset’s entire lifecycle while guaranteeing data security and protecting against environmental liability. Regulatory requirements mandate specific disposal methods for computing assets, and enterprises face significant risks if they fail to comply. Despite the critical importance of ITAD, many enterprises lack a clear understanding of ITAD and its regulations and struggle with the management of ITAD processes. One solution to this challenge …
Can Contracts Replace Qualification In A Sourcing Process With Competitive Suppliers And Imperfect Information?, Yue Jin, Jennifer K. Ryan
Can Contracts Replace Qualification In A Sourcing Process With Competitive Suppliers And Imperfect Information?, Yue Jin, Jennifer K. Ryan
Department of Supply Chain Management and Analytics: Faculty and Staff Publications
This paper considers a manufacturer who outsources the production of a product to multiple competing suppliers, who differ in their cost structures and in their capabilities for producing high-quality products. The manufacturer must design the sourcing process to ensure that the selected supplier has sufficient quality capability, while encouraging competition among the suppliers. We develop and analyze a mathematical model of performance-based contracting, a sourcing method that is appropriate when the manufacturer has imperfect information regarding the suppliers’ costs and capabilities. We compare the performance of performance-based contracting with that of a two-stage sourcing process, an alternative sourcing method that …