Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Management Information Systems

Managing Risk And Uncertainty In Supply Chains In The Face Of The Current Global Realities, Gurkan Ibrahim Akalin Jan 2016

Managing Risk And Uncertainty In Supply Chains In The Face Of The Current Global Realities, Gurkan Ibrahim Akalin

Information Systems & Operations Management Dissertations

For the last two decades, there has been an increasing academic and practitioner interest in understanding uncertainty and risks, identifying their sources, and managing, reducing and mitigating them in supply chains (SCs). Many sources of risk are already identified and grouped, and some good methods to reduce or cope with them have been described as well. However, literature has not been profound yet. Indeed, certain types of risk sources lack practical definitions and/or effective management techniques (Prater, 2005; Simangunsong et al., 2012). The financial crises of national economies in the late 2000s followed by a global recession (2008-2012) have escalated …


Data Visualization In Exploratory Data Analysis: An Overview Of Methods And Technologies, Yingsen Mao Dec 2015

Data Visualization In Exploratory Data Analysis: An Overview Of Methods And Technologies, Yingsen Mao

Information Systems & Operations Management Theses

Exploratory data analysis (EDA) refers to an iterative process through which analysts constantly ‘ask questions’ and extract knowledge from data. EDA is becoming more and more important for modern data analysis, such as business analytics and business intelligence, as it greatly relaxes the statistical assumption required by its counterpart—confirmation data analysis (CDA), and involves analysts directly in the data mining process. However, exploratory visual analysis, as the central part of EDA, requires heavy data manipulations and tedious visual specifications, which might impede the EDA process if the analyst has no guidelines to follow. In this paper, we present a framework …


Disruption Of Information Technology Projects: The Reactive Decoupling Of Project Management Methodologies, Kurt W. Schmitz Mar 2014

Disruption Of Information Technology Projects: The Reactive Decoupling Of Project Management Methodologies, Kurt W. Schmitz

Information Systems & Operations Management Dissertations

Information Technology projects have migrated toward two dominant Project Management (PM) methodologies. Plan-driven practices provide organizational control through highly structured plans, schedules, and specifications that facilitate oversight by hierarchical bureaucracies. In contrast, agile practices emphasize empowered teams using flexible methods aligned to organizational values reinforced by cultural controls and rituals. While project teams mix and combine practices from both traditions, a stylistic bias remains in the initial project management practices established at the onset of IT projects. A review of existing literature on IT project management serve as a filter on the stylistic biases of these dominant PM paradigms that …


Matching Inventory Replenishment Heuristics To Demand Patterns: A Cost/Benefit Approach, Randall A. Napier Mar 2014

Matching Inventory Replenishment Heuristics To Demand Patterns: A Cost/Benefit Approach, Randall A. Napier

Information Systems & Operations Management Dissertations

Behavioral research indicates that bounded rationality and resource constraints support the use of "fast and frugal heuristics" that intentionally exclude some available information from decision models. Inventory replenishment decisions must be made quickly and efficiently, and as such are a promising realm for the use of fast and frugal heuristics. This research includes a simulation study to identify significant relationships among heuristics and demand patterns, yielding inferences regarding the advantages of selecting replenishment models to match demand patterns. Findings from the simulation are validated against three years of actual usage data for 278 independent demand items from a single industrial …


The Fox Is Guarding The Henhouse: Can Interpersonal Conflict Damage An Organization's Information Security?, Ammar Nurbhai Jan 2014

The Fox Is Guarding The Henhouse: Can Interpersonal Conflict Damage An Organization's Information Security?, Ammar Nurbhai

Information Systems & Operations Management Theses

As computer networks grow ever more interconnected, securing an organization's information is becoming increasingly vital. At the forefront of this threat is that of the insider, an individual who is already behind the firewall. Extant literature related to the causes and motivation behind malicious insider behavior is lacking.This study examines whether workplace interpersonal conflict can motivate an individual to retaliate against an organization's digital information assets. The moderating effects of organizational justice and anger control are also explored to determine whether these constructs can mitigate the risk of retaliatory behavior. The link between Anger and subsequent aggression are also examined. …


Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang Oct 2013

Balancing Acquisition And Sorting Policies Of Remanufacturing, Taeuk Kang

Information Systems & Operations Management Dissertations

A remanufacturer struggles with uncertainty of returns and quality of products. With regard to the remanufacturing process, this study focuses on the determination of the following policies: a) Acquisition policy and b) Sorting policy. The purpose of this study is to find the optimality of both acquisition and sorting which, to meet demand with the maximization of profits over time, may need to be changed. More specific research questions are as follows: a) How much product returns should be obtained to meet demand through remanufacturing?, b) What level of sorting discrimination should be used for disassembly to meet demand at …


An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House Oct 2013

An Assessment Of User Response To Phishing Attacks: The Effects Of Fear And Self-Confidence, Deanna House

Information Systems & Operations Management Dissertations

Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential or sensitive. Individuals are targeted to take action by clicking on a link or providing information. At present, phishing research is lacking in both theory and actual behavioral data. This research aims to fill that gap by introducing a new model and collecting data from multiple sources (including an …


The Competitive Dynamics Of A Firm's Capacity Position And Inventory Leanness Activities: Evidence From Us Manufacturing Industries, Rajat Mishra Oct 2013

The Competitive Dynamics Of A Firm's Capacity Position And Inventory Leanness Activities: Evidence From Us Manufacturing Industries, Rajat Mishra

Information Systems & Operations Management Dissertations

The notion of `perennial gale of creative destruction' by Schumpeter and Austrian economics has been researched in the field of strategic management to study the competitive dynamics among firms' rivalrous activities. However, its application is sparse in operations management. With the advancement of the field and the increasing pressure on the firms, the strategies regarding operations planning and control are argued to be not just internal according to the conventional norms of operations management, but these strategic moves will be impacted by the moves of their immediate rivals. This competitive imitation is studied in the areas of inventory management and …


Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen Jul 2013

Effects Of Institutional Pressure And Dynamic Capabilities On Operational Performance Of U.S. Long-Term Healthcare Providers, Hui-Chuan Chen

Information Systems & Operations Management Dissertations

Long Term Care facilities are a highly regulated industry due to funding sources being subject to Medicare and Medicaid reimbursement. The demand for nursing homes is increasing significantly with anticipation of the Baby Boomers reaching age 65. Most research studies of the long-term care industry are focused on quality improvement and reduced deficiencies. This study provides a different view of how strategic capabilities (adaptive, absorptive, and innovative) and Baldrige Health Care Criteria affect financial returns, operational efficiency, and quality for long-term care providers. The findings indicate that facilities' capabilities are associated with Baldrige criteria and performance. However, the relationship between …


Capacity Position And Financial Performance: Longitudinal Evidence From U.S. Manufacturers, Carol J. Cagle Apr 2012

Capacity Position And Financial Performance: Longitudinal Evidence From U.S. Manufacturers, Carol J. Cagle

Information Systems & Operations Management Dissertations

This research synthesizes research from the strategy, organization theory and operations management streams in exploring the competitive implications of firms' capacity over time. Data from archival sources are analyzed via Hierarchical Linear Modeling in exploring: 1) systematic relationships between capacity and financial performance that they obtain over time; and 2) the role of strategic and environmental covariates in these relationships.


Building A Foundation For Knowledge Management Research: Developing, Validating, And Applying The Knowledge Internalization Construct, Kamphol Wipawayangkool Oct 2011

Building A Foundation For Knowledge Management Research: Developing, Validating, And Applying The Knowledge Internalization Construct, Kamphol Wipawayangkool

Information Systems & Operations Management Dissertations

The notion of knowledge internalization (KI), albeit a critical link in Nonaka's (1994) organizational knowledge creation theory, has not been rigorously conceptualized and defined, let alone operationalized. To strengthen the foundation for knowledge management (KM) research, we attempt to fulfill the following research objectives in the three essays of this dissertation. In the first essay, by drawing from Anderson (1983)'s ACT (adaptive control of thought) theory and Glaser et al. (1985)'s framework on the dimensions of cognitive skills, we develop the construct of KI and demonstrate its nomological validity by examining its role in knowledge sharing phenomenon through its relationships …


Data Mining In Financial Markets, Stephen Evans Jan 2011

Data Mining In Financial Markets, Stephen Evans

Information Systems & Operations Management Theses

Momentum in financial markets can cause securities prices to continue trending upward/downward based on the recent performance. This paper reviews a study that attempts to discover how much daily returns in the stock market can be explained by financial momentum. This study uses classification data mining to attempt to predict the direction of daily returns of randomly selected stocks from the Russell 1000 and Russell 2000 stock indexes. The study uses moving averages of historical daily stock prices as attributes, along with different data mining classifiers, to attempt to make these predictions. A secondary goal of this study is to …


Is Benefit For Individuals: Expanded Conceptualization And Comprehensive Construct Development, Jonghak Sun Nov 2010

Is Benefit For Individuals: Expanded Conceptualization And Comprehensive Construct Development, Jonghak Sun

Information Systems & Operations Management Dissertations

Information systems benefits for individuals (ISBI) has been a key construct for the IS success model, which has evolved over the years to strengthen the theoretical foundation for the IS field. However, relatively little research has been done to explore, develop and validate the underlying theoretical dimensions for this crucial construct. Moreover, extant research related to this construct in particular, and to the IS success model in general, has been conducted in the context of individual IS application instead of the overall IS in the organization. This study fulfills four research objectives: (1) Develop a theory-based extended conceptualization of IS …


Reconceptualizing Technology Use And Information System Success: Developing And Testing A Theoretically Integrated Model, Keng-Jung Yeh Sep 2009

Reconceptualizing Technology Use And Information System Success: Developing And Testing A Theoretically Integrated Model, Keng-Jung Yeh

Information Systems & Operations Management Dissertations

Technology Acceptance Model (TAM) research, which pertains to how an information system can be initially adopted by members of an organization, was born two decades ago and grows into one of the pivotal theoretical foundations of the information systems (IS) discipline. However, many IS scholars indicate that recent TAM research fail to break the 20-years-old confinement and provide little intellectual value.To respond to this call for more intellectual depth in TAM research, this dissertation suggests multiple ways to rejuvenate the research stream. First, Bhattacherjee's IS use continuance model (2001), which is based on the Expectation-Disconfirmation Theory, was adopted as the …


To Test Before Or To Test After - An Experimental Investigation Of The Impact Of Test Driven Development, Vikram Singh Bhadauria Sep 2009

To Test Before Or To Test After - An Experimental Investigation Of The Impact Of Test Driven Development, Vikram Singh Bhadauria

Information Systems & Operations Management Dissertations

Test driven development (TDD) requires the developer to create the test suite before designing and writing the application program. Unlike traditional software development practices, in TDD test development precedes application development. Such a practice also redefines the role of the developer. Lately, TDD is growing in popularity as a part of Agile methodologies. There is a critical need for rigorous empirical research to understand the role and impact of TDD as a software development practice. The goal of this dissertation research is to fill this gap. We conducted a Laboratory Experiment to understand the influence of TDD on the outcomes …


Servicescape And Customer Satisfaction: The Role Of Strategy, Patti Lynn Collett Sep 2009

Servicescape And Customer Satisfaction: The Role Of Strategy, Patti Lynn Collett

Information Systems & Operations Management Dissertations

The purpose of this research is to determine if the corporate strategy theory base may be useful in advancing the understanding of service characteristics; specifically, the relationship between particular service industries, competitive strategy and a firm's choice of servicescape dimensions. The design and methodology of this research combines two distinct literature streams with respect to service operations: competitive strategy and operations strategy. First, the operations strategy literature and its evolution into service operations are reviewed to provide a historical foundation for the research and to identify possible research gaps. Next, the strategy literature is reviewed as a possible remedy to …


Acceptance Of Systems Development Methodologies: Testing A Theoretically Integrated Model, Nancy A. Bonner Sep 2008

Acceptance Of Systems Development Methodologies: Testing A Theoretically Integrated Model, Nancy A. Bonner

Information Systems & Operations Management Dissertations

Industry reports continue to portray a dismal picture of software development project success. Software projects continue to be over budget, overdue and lacking in quality and desired functionality. A variety of innovative methodologies and tools have been introduced to aid in improving the software development process. However, there has been reluctance to commit to their usage. The goal of this research is to examine the reasons a software developer makes a commitment to use a given development methodology. We used a theoretically integrated approach to study this phenomenon, drawing on theories from the fields of marketing as well as psychology. …


Why Do People Engage In Social Computing? A Need Fulfillment Perspective, Vishal Sachdev Aug 2008

Why Do People Engage In Social Computing? A Need Fulfillment Perspective, Vishal Sachdev

Information Systems & Operations Management Dissertations

With the trend towards social interaction over the Internet and the popularity of websites such as Myspace, Facebook and Youtube among others, practitioners and researchers are motivated to explain the sudden surge in user interest, in a phenomenon that we term, Social Computing. We seek to research the question: "Why do people engage in Social Computing?" The motivation is to determine some of the underlying human psychological factors that are driving this phenomenon. Towards this end, we propose a reformulation of the interactivity construct by suggesting new dimensions of interactivity that are unique to social computing. With this reformulated interactivity …


The Effect Of Leadership Style On Cio Effectiveness, Kishen Parthasarathy Iyengar Apr 2008

The Effect Of Leadership Style On Cio Effectiveness, Kishen Parthasarathy Iyengar

Information Systems & Operations Management Dissertations

While IS researchers have often opined that leadership is important, a theoretical examination of leadership in the CIO context is lacking. We examine Leadership style in the light of the transformational leadership theory and its impact on organizational level variables such as CIO Role Effectiveness and IT ambidexterity, and individual level variables such as Leader-Member Exchange Relationship and the subordinate's general job satisfaction. Results indicate that contingent rewarding style impacted CIO role effectiveness, which in turn predicted IT ambidexterity. Transformational leadership was the strongest predictor of Leader-Member Exchange relationship, which in turn impacted job satisfaction.


An Adaptive Reputation-Based Trust Model For Intelligent Agents In E-Marketplace, Liangjun You Apr 2008

An Adaptive Reputation-Based Trust Model For Intelligent Agents In E-Marketplace, Liangjun You

Information Systems & Operations Management Dissertations

In the emerging Electronic Marketplace, intelligent agents that are reactive, proactive and social will become the major players. These intelligent agents will search for good deals, evaluate trading partners and eventually provide advice on or even make decisions on transactions for their principals. To this end, it is vitally important for the agents to be able to precisely estimate the trust of the business partners to make successful deals. This dissertation proposes an adaptive reputation-based trust model which can be utilized by intelligent agents in an open Electronic Marketplace, where the seller agents and buyer agents can enter and leave …


The Impact Of Information Technology On Small, Medium, And Large Hospitals: Quality, Safety, And Financial Metrics, Stacy Alicia Bourgeois Roberts Apr 2008

The Impact Of Information Technology On Small, Medium, And Large Hospitals: Quality, Safety, And Financial Metrics, Stacy Alicia Bourgeois Roberts

Information Systems & Operations Management Dissertations

This study focuses on the role of information technologies in healthcare, and investigates the relationship of IT sophistication to patient safety, healthcare quality, and financial performance in Texas acute care hospitals. A value/supply chain perspective guides the development of a general model that integrates hospitals' IT sophistication with their patient and financial outcomes. From the model emerge hypotheses that are tested using the structural equation modeling approach, taking into account differences in outcomes across small, medium, and large hospitals. Our testing and comparisons give insight into the dynamics of health information technology and provide specific direction for practitioners and future …


A Comparison Of Traditional And Active Learning Methods: An Empirical Investigation Utilizing A Linear Mixed Model, David Weltman Apr 2008

A Comparison Of Traditional And Active Learning Methods: An Empirical Investigation Utilizing A Linear Mixed Model, David Weltman

Information Systems & Operations Management Dissertations

This research aims to understand what types of learners (business school students) benefit most and what type of learners may not benefit at all from active learning methods. It is hypothesized that different types of students will achieve different levels of proficiency based on the teaching method. Several types of student characteristics are analyzed: grade point average, learning style, age, gender, and ethnicity. Three topics (in the introductory business statistics course) and five instructors covering seven class sections are used with three different experimental teaching methods. Method topic combinations are randomly assigned to class sections so that each student in …


A Two-Order Effect Model Of It Business Value: Theoretical Development And Empirical Test, Vishnu Vinekar Sep 2007

A Two-Order Effect Model Of It Business Value: Theoretical Development And Empirical Test, Vishnu Vinekar

Information Systems & Operations Management Dissertations

A new model for IT Business Value is proposed and empirically validated from longitudinal panel data. We posit that IT has a first-order effect that includes automating, and a second-order effect that is more dependent on informating. Our empirical results demonstrate that IT's contribution to firm performance is mediated via its impacts on productivity, which corresponds to the first-order effect. We further developed and validated a complex but parsimonious moderated-mediation model to show that these paths to business value from IT vary depending on industry information intensity, environmental dynamism, and environmental munificence.


Empirical Investigation Of The Relationship Of Privacy, Security And Trust With Behavioral Intention To Transact In E-Commerce, Anil Gurung Aug 2007

Empirical Investigation Of The Relationship Of Privacy, Security And Trust With Behavioral Intention To Transact In E-Commerce, Anil Gurung

Information Systems & Operations Management Dissertations

Privacy and security concerns of consumers have been touted as one of the hindrances in the growth of e-commerce. These concerns increase risk perception of consumers. Understanding the consequences of privacy and security concerns, and their relationship to risk perceptions may provide a solution. The relationship between privacy and security is investigated using the Theory of Planned Behavior. The model proposed in this study, investigates the relationship of trust, privacy and security concerns to the risk perception adoption of e-commerce. The results from a field study validate the model.


Determinants Of Knowledge Sharing Behaviors: Developing And Testing An Integrated Theoretical Model, Anitha Chennamaneni Aug 2007

Determinants Of Knowledge Sharing Behaviors: Developing And Testing An Integrated Theoretical Model, Anitha Chennamaneni

Information Systems & Operations Management Dissertations

Knowledge sharing has been identified as the key enabler of knowledge management. To leverage knowledge resources and to support knowledge sharing, organizations are employing knowledge management systems. While knowledge management systems are important, practical implementations have found that technology alone cannot guarantee that knowledge will be shared. The objective of this research study was to examine factors that promote or discourage knowledge sharing behaviors of knowledge workers in the organizational context. Drawing from multiple streams of research including social psychology, organizational learning, knowledge management, information systems and so forth, this research developed an integrated theoretical model and unveiled three sets …


A Typology Of Cluster Concentrations Based On Factor Conditions Of Production And Evolution Of Supply Chain Infrastructures, Pamela J. Zelbst Aug 2007

A Typology Of Cluster Concentrations Based On Factor Conditions Of Production And Evolution Of Supply Chain Infrastructures, Pamela J. Zelbst

Information Systems & Operations Management Dissertations

If the reader would imagine a 500 piece picture puzzle of which only one single piece is available for research, then it is obvious that any conclusions concerning the puzzle as a whole would at the very best be limited to what the researcher could extrapolate from that single piece of the puzzle. This study contends that to comprehend the puzzle it must be viewed as a whole picture, admittedly comprised of different pieces, but nonetheless only accurately understandable in regard to interaction and interconnectivities when viewed from a macro perspective. Accordingly, concentrations should be viewed from a holistic, macro …


An Empirical Examination Of The Influence Of Information Technology And Trust On Supply Chain Dyad Relationships And Performance, Anil Singh Aug 2007

An Empirical Examination Of The Influence Of Information Technology And Trust On Supply Chain Dyad Relationships And Performance, Anil Singh

Information Systems & Operations Management Dissertations

Reacting to increased competition, companies are adopting inter-organizational information systems (IOS) that share information across the supply chain partners. This sharing requires trust. To better understand the phenomenon of trust between partners, we develop an integrated model of trust in supply chains with theoretical underpinnings of transaction cost economics and environmental factors like Information Technology and Power. The framework also takes into consideration; the association between trust and final outcome measures such as performance and satisfaction through supply chain relationship. By assessing the interconnectedness of trust in inter-organizational information systems, with environmental factors, our research model will help researchers as …


Towards A Systemic View Of Organizational Dynamic It Capability: An Empirical Assessment, Anurag Jain Aug 2007

Towards A Systemic View Of Organizational Dynamic It Capability: An Empirical Assessment, Anurag Jain

Information Systems & Operations Management Dissertations

In an increasingly complex world characterized by hyper-competition and turbulence, an organization's ability to sustain its competitive advantages depends not only on how it acquires its capabilities, but also on how it orchestrates the relationships among them. While the resource based view of the firm and the literature on dynamic capabilities have provided strategic insights to the successful deployment and expeditious management of scarce resources, there is very little research on dynamic capabilities from an IT perspective. In particular, there is no common understanding of what the phrase "dynamic IT capability" means or how it can be achieved. This study …


Data Mining And Statistics: Examining Critical Patterns Of Research And Practice, Ailing Wang Aug 2007

Data Mining And Statistics: Examining Critical Patterns Of Research And Practice, Ailing Wang

Information Systems & Operations Management Dissertations

Data Mining (DM) has gained increasing attention in academia and growing importance in business over past decades. This is a study to examine the current status of DM in both research and practice with a focus on the role of statistics for the advancement of the field. Being multi-disciplinary in nature, DM challenges researchers to work together and be aware of the progress made in other fields in order to contribute towards the development of the field. By employing citation analysis techniques and using publicly available citation data, I empirically examine how DM reference fields, such as statistics, machine learning, …


Task Complexity And Effectiveness Of Pair Programming: An Experimental Study, Venugopal Balijepally Aug 2007

Task Complexity And Effectiveness Of Pair Programming: An Experimental Study, Venugopal Balijepally

Information Systems & Operations Management Dissertations

Extreme Programming, which is recently gaining popularity as an alternate software development methodology, involves two programmers working collaboratively to develop software. This study examined the efficacy of pair programming by comparing the effectiveness of collaborating pairs with those of programmers working individually. Student subjects participated in a controlled laboratory experiment. Two factors were manipulated in the experiment: programming task complexity (high vs. low) and programmers working individually vs. in pairs. The performance of programmer pairs was compared with those of the best performer and the second best performer from among nominal pairs. An important finding of the study is that …