Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2014

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 83

Full-Text Articles in Management Information Systems

Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman Dec 2014

Reorienting The Information Systems Function To Support Increasing Levels Of Business Service, Magno Queiroz, Tim Coltman

Magno Queiroz

Business scholars and practitioners are becoming increasingly aware of the opportunities that exist when service is added to traditional product offerings. However, the literature has not previously explored the question of how the IS function is responding to greater emphasis on service. In this paper, we employ a multi-case research design to investigate the role of the IS function in supporting increasing levels of service. Our study contributes to the literature by showing that differences in IS service orientation and collaborative capabilities affect the ability of firms to support service. The implications for IS and managerial practice are discussed by …


Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons Dec 2014

Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons

C. Jason Woodard

Recent literature on sociotechnical systems has employed the concept of generativity to explain the remarkable capacity for digital artifacts to support decentralized innovation and the emergence of rich business ecosystems. In this paper, we propose agent-based computational modeling as a tool for studying the evolution of generativity, and offer a set of building blocks for constructing agent-based models in which generativity evolves. We describe a series of models that we have created using these building blocks, and summarize the results of our computational experiments to date. We find in several different settings that key features of generative systems can themselves …


Predicting Patients’ Use Of Provider-Delivered E-Health: The Role Of Facilitating Conditions, E. Vance Wilson, Nancy K. Lankton Oct 2014

Predicting Patients’ Use Of Provider-Delivered E-Health: The Role Of Facilitating Conditions, E. Vance Wilson, Nancy K. Lankton

Nancy K. Lankton

This chapter presents a new rational-objective (R-O) model of e-health use that accounts for effects of facilitating conditions as well as patients’ behavioral intention. An online questionnaire measured patients’ behavioral intention to use a new e-health application as well as proxy measures of facilitating conditions that assess prior use of and structural need for health services. A second questionnaire administered three months later collected patients’ self-reported use of e-health during the intervening period. The new model increased predictions of patients’ e-health use (measured in R2) by more than 300% over predictions based upon behavioral intention alone, and all measured factors …


Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R.T. Larsen Oct 2014

Explanation In Information Systems, Dirk S. Hovorka, Matt Germonprez, Kai R.T. Larsen

Kai R.T. Larsen

Developing explanations of observed phenomenon is one of the major functions of research in Information Systems (IS). But what is an explanation? What types of explanation can IS research provide and what do they mean? The objectives of this research are to develop a shared language, to increase understanding of the meaning of research results and to stimulate discussion of explanation in Information Systems research. Four years of articles published in two top-ranked IS journals over a period of ten years were sampled based on four explanation types defined in modern philosophy: covering-law, statistical-relevance, pragmatic and functional. Explanation types, sub …


Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall Sep 2014

Bit.Ly, Your Tinyurl Is Awe.Sm! Reinforcing Your Brand With A Custom Url Shortener, Robert L. Nunez Ii, Rebecca J. Hall

Robert L Nunez II

After migrating to the campus hosted CMS the UW-Milwaukee, School of Information Studies web team quickly realized that they needed a service that would allow them to create custom shortened URLs for marketing. Within 1 day, the team was able to produce a service that was equivalent to that of Bit.ly, that not only allows them to create shortened URLs, but also track their clicks, the audience reached, reinforce their brand, and much, much more. This poster will show the teams efforts in meeting this goal and the benefits of not relying on a 3rd party service.


Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson Sep 2014

Electronic Health Record (Ehr) Adoption: Failure Or Success?, Madison Ngafeeson

Madison Ngafeeson

Electronic Health Record (EHR) is hailed as a health information technology with great potential to significantly boost healthcare outcomes, reduce medical errors, increase legibility and minimize healthcare costs. The implementation of EHRs is expected to be completely mandatory in the United States by 2015. While evidence of EHR system implementation in research goes back over fifteen years ago, and is continually increasingly being adopted, it would seem be a good time to pause and take critical look down the years. Can it be said that EHR implementation has been a success, or, perhaps a failure? This study explores the subject …


E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi Sep 2014

E-Government Diffusion: Evidence From The Last Decade., Madison Ngafeeson, Mohammad Merhi

Madison Ngafeeson

The use of technology to offer goods and services by governments to citizens has been a growing phenomenon in the last decade. Many projects have been recorded across nations in an effort to encourage the adoption and diffusion of e-government. However, these studies have been rather isolated project reports than a com- prehensive global picture. This study examines the e-government diffusion across 192 countries in the last decade. The panel data obtained is analyzed to evaluate the current state of e-government diffusion. Evidence in the last decade suggests that the difference in e-government diffusion is wider from country to country, …


Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson Sep 2014

Examining Success In Health Information Technology Implementation Research, Madison Ngafeeson

Madison Ngafeeson

The implementation of health information systems (IS) is rapidly increasing. In the United States, $70 billion will be invested by the government to facilitate the adoption of the electronic health record over a ten-year period. However, IS acceptance is not success. We use content analysis to investigate the success component.


Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui Sep 2014

Meaningful Use And Meaningful Curricula: A Survey Of Health Informatics Programs In The U.S., Kai Koong, Madison Ngafeeson, Lai Lui

Madison Ngafeeson

The introduction of the US government’s Meaningful Use criteria carries with it many implications including the training curriculum of healthcare personnel. This study examines 108 health informatics degree programmes across the USA. First, the courses offered are identified and classified into generic classes. Next, these generic groupings are mapped to two important frameworks: the Learning to Manage Health Information (LMHI) academic framework; and the Meaningful Use criteria policy framework. Results suggest that while current curricula seemed acceptable in addressing Meaningful Use Stage 1 objective, there was insufficient evidence that these curricula could support Meaningful Use Stage 2 and Stage 3. …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha Aug 2014

An Exploratory Study Of User Resistance In Healthcare It, Madison Ngafeeson, Vishal Midha

Madison Ngafeeson

The US healthcare system is clearly experiencing a major transition. By 2015, the healthcare sector is expected to have migrated from a paper record system to a completely electronic health record (EHR) system. The adoption and use of these systems are expected to increase legibility, reduce costs, limit medical errors and improve the overall quality of healthcare. Hence, the US government is investing $70 billion over a 10-year period to facilitate the transition to an electronic system. However, early reports show that physicians and nurses among other health professionals continue to resist the full use of the system. This paper …


How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer Aug 2014

How To Arrive At Computer Integrated Manufacturing: A 3-Year Survey, Arnoud De Meyer

Arnoud DE MEYER

The large majority of modern production companies have at their disposal a multitude of computer systems. The immediate challenge for these companies consists of integrating these computer systems and databases. How will one arrive at this integration? On the basis of a questionnaire administered in 1985, 1986 and 1987 among a group of large European manufacturers, one comes to the conclusion that this integration is one of the immediate priorities for this group of companies. They do not intend to implement turnkey systems. but instead will integrate the different databases and computer systems gradually. One can see emerging islands of …


The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka Aug 2014

The Potential Of Neuroscience For Human-Computer Interaction Research, René Riedl, Adriane B. Randolph, Jan Vom Brocke, Pierre-Majorique Léger, Angelika Dimoka

Adriane B. Randolph

Due to the increased availability of both neuroscience methods and theories, Information Systems (IS) scholars have begun to investigate the potential of neuroscience for IS research. This new field of research is referred to as NeuroIS. Moreover, large technology companies (e.g., Microsoft and Philips) started research programs to evaluate the potential of neuroscience for their business. The application of neuroscientific approaches is also expected to significantly contribute to advancements in human-computer interaction (HCI) research. Against this background, a panel debate is organized to discuss the potential of neuroscience for HCI studies. The panel hosts an intellectual debate from different perspectives, …


Triangulating System Requirements For Users With Severe Motor Disabilities, Adriane Randolph Aug 2014

Triangulating System Requirements For Users With Severe Motor Disabilities, Adriane Randolph

Adriane B. Randolph

By giving a voice to users in the design process of information systems, they often feel more empowered and engaged. The inclusion of users with disabilities in the design process, however, can be markedly more difficult. User profiling allows a user's preferences and interests to be captured and represented. However, for a user with severe motor disabilities, information related to his or her user profile must be obtained through a variety of means. Because feedback from a person with a severe motor disability may be limited and, at times, unreliable, system requirements must be triangulated using multiple sources to help …


User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph Aug 2014

User Profiles For Facilitating Conversations With Locked-In Users, Melody Moore, Veda Storey, Adriane Randolph

Adriane B. Randolph

The loss of communication is one of the most profound disabilities a human being can experience, inhibiting social contact and complicating medical and personal care. Locked-in patients are paralyzed and unable to speak, but cognitively intact. Developments in biometric technology provide non-muscular channels of control and provide opportunities to restore some communication for people with little or no muscle movement. Although these biometric devices have been effective, the input rate is very slow for the requirements of interactive communication. Prediction techniques increase the speed of communication in assistive technology. However, the user’s context (time of day, location, presence of conversational …


Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson Aug 2014

Towards Predicting Control Of A Brain-Computer Interface, Adriane Randolph, Saurav Karmakar, Melody Jackson

Adriane B. Randolph

Individuals suffering from locked-in syndrome are completely paralyzed and unable to speak but otherwise cognitively intact. Traditional assistive technology is ineffective for this population of users due to the physical nature of input devices. Brain-computer and biometric interfaces offer users with severe motor disabilities a non-muscular input channel for communication and control, but require that users be able to harness their appropriate electrophysiological responses for effective use of the interface. There is currently no formalized process for determining a user’s aptitude for control of various biometric interfaces without testing on an actual system. This study presents how basic information captured …


Security Risk Management At A Fortune 500 Firm: A Case Study, Humayun Zafar Jul 2014

Security Risk Management At A Fortune 500 Firm: A Case Study, Humayun Zafar

Humayun Zafar

Information security is a naturally intrusive topic that has not been researched to its full extent in IS. Taking note of a previous information security study that failed and lessons learned from it, we successfully carry out a study of our own with some modifications. The purpose of the study was to successfully identify critical success factors for an effective security risk management program at a Fortune 500 firm. In this paper we detail the modified critical success factor method that was used, which we hope will prove beneficial for academic researchers. The study has practical implications in regard to …


Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya Jul 2014

Risky Decisions And Decision Support - Does Stress Make A Difference?, Gloria Phillips-Wren, Monica Adya

Monica Adya

Studies of human decision making have demonstrated that stress exacerbates risk taking. Since all decisions involve some element of risk, stress has critical impact on decision quality. Decisions are found to improve with stress up to an optimal threshold beyond which deterioration is observed. However, few studies have examined the psychological experiences underlying risk-taking behavior in conjunction with stress creators. In this paper we propose a research framework that integrates pre-conditions of stress (perceptions of high gain/loss, risk, complexity, and organizational pressure) with observed psychological experiences (time pressure, uncertainty, information overload, and dynamism) that potentially result in risky decision making. …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Alberto Coustasse, DrPH, MD, MBA, MPH

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Andrew Sikula, Sr.

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Jun 2014

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Doohee Lee

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs). Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs. Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances. Principal Findings: Results reveal that the TL model was positively linked to workplace injury in …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2014

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong Jun 2014

Information Security As A Determinant Of Nations's Network Readiness: A Country Level Analysis, Manal Yunis, Madison Ngafeeson, Kai Koong

Madison Ngafeeson

In a digital era where Information and Communication Technologies (ICT) play a pivotal role in driving forward the competitiveness of nations, it is imperative to understand the factors influncing the successful diffusion and deployment of this resource. ICT has become a global resource influncing the competitiveness of not only companies, but also nations. Previous research discussed the factors \ influncing ICT effectiveness and networked readiness; nevertheless, the impact of a country´s secure communications, competitiveness, and ICT laws on global IT effectiveness has yet to be addressed. Using country-level data generated by World Bank, World Economic Forum, and UNDP, this study …


Transformational Leadership In China: The Role Of Trust And Harmony, Wai Kwan (Elaine) Lau Jun 2014

Transformational Leadership In China: The Role Of Trust And Harmony, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

Transformational leadership attracted a significant amount of scholarly attention in the past few decades. This study is designed to develop an effective transformational leadership model that works in the Chinese context. A model is proposed to clarify the mediating effects of trust and harmony on the relationship between transformational leadership and its effectiveness. The model provides a new perspective on leadership in the Chinese context that is ignored in the Western leadership literature. It also offers a clearer understanding of how best transformational leadership practice combines with traditional Chinese wisdom to do a better job in accounting for the leader-follower …


Success Mass Customization: The Role Of Market Segment Favorableness, Wai Kwan (Elaine) Lau Jun 2014

Success Mass Customization: The Role Of Market Segment Favorableness, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

Mass customization (MC) emerged as a new paradigm that shifted from mass production. It achieves both volume and cost efficiency of mass production and customization capabilities at the same time. The challenge for manufacturing managers is to find ways to cope with the market and increase product variety through MC without affecting lead-time, cost or quality. Based on the previous literature review, a conceptual summary of MC is discussed. According to the conceptual summary, a model is built to discuss how each of the elements associated with MC contributes to improved firm performance. It further proposed that the market segment …


The Impacts Of Personality Traits And Goal Commitment On Employees' Job Satisfaction, Wai Kwan (Elaine) Lau Jun 2014

The Impacts Of Personality Traits And Goal Commitment On Employees' Job Satisfaction, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

The present research investigates the effects of personality traits, such as self-efficacy and locus of control, on job satisfaction. It also examines the mediating impact of goal commitment on relationships between personality and job satisfaction. The results indicate that both self-efficacy and locus of control are positively associated with goal commitment. In addition, locus of control is found positively related to job satisfaction. However, self-efficacy does not have the same positive relationship with job satisfaction. The study further confirms the mediating effect of goal commitment on relationships between personality traits and job satisfaction.


The Effects Of Leadership Style On Employee’S Perception Of Justice: The Role Of Employee’S Participation, Wai Kwan (Elaine) Lau Jun 2014

The Effects Of Leadership Style On Employee’S Perception Of Justice: The Role Of Employee’S Participation, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

The present research examines the effect of leadership style (classical, transactional, transformational, and dynamic) and employee’s participation on employee’s perception of justice (distributive, procedural, and interactional justice). It is proposed that different leadership styles are expected to display different effects on employee’s participation and perceptions of justice. Moreover, employee’s participation in decision making process is predicated to positively influence his/her perception of justice.


Quantitative Analysis Of Impacts Of Employee Engagement On Continuance And Normative Commitment, Daniel A. Cernas Ortiz, Hong Qin, Wai Kwan (Elaine) Lau Jun 2014

Quantitative Analysis Of Impacts Of Employee Engagement On Continuance And Normative Commitment, Daniel A. Cernas Ortiz, Hong Qin, Wai Kwan (Elaine) Lau

Wai Kwan (Elaine) Lau

A positive relationship between employee engagement and affective commitment is already documented in the literature. However, we do not adequately know how engagement is associated with continuance and normative commitment. Using survey methodology we find that while engagement has a non–significant positive association with continuance commitment; it has a positive association with normative commitment. No negative association was found between engagement and continuance commitment. These results advance prior findings about the effect of employee engagement on different types of commitment and provide understandings in setting effective performance standards in the organization.