Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2013

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 77

Full-Text Articles in Management Information Systems

Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz Dec 2015

Mhealth Technologies For Chronic Diseases And Elders: A Systematic Review, Giovanni Chiarini, Pradeep Ray, Shahriar Akter, Cristina Masella, Aura Ganz

Shahriar Akter

mHealth (healthcare using mobile wireless technologies) has the potential to improve healthcare and the quality of life for elderly and chronic patients. Many studies from all over the world have addressed this issue in view of the aging population in many countries. However, there has been a lack of any consolidated evidence-based study to classify mHealth from the dual perspectives of healthcare and technology. This paper reports the results of an evidence-based study of mHealth solutions for chronic care amongst the elderly population and proposes a taxonomy of a broad range of mHealth solutions from the perspective of technological complexity. …


The Nature Of Project Success, Michael J. Cuellar Dec 2013

The Nature Of Project Success, Michael J. Cuellar

Michael J. Cuellar

This paper investigates the ontological status of project success. The literature shows that success has historically been considered to be an objective property of a project, one that can be assessed and the status of the project as a success or failure determined. However, this approach is shown to have serious deficiencies in dealing with certain project results. As an alternative, this paper suggests that following the subjective view of project success; success should be considered as a politically determined social construction. The paper advocates using Archer’s Morphogenetic Social Theory (Archer 1995; Cuellar 2010b) to explanatory mechanism. Under that theory, …


Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha Dec 2013

Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha

Joseph Shrestha

The term “big data” is associated with one or more of the four characteristics: volume, variety, and velocity. The technologies associated with the big data has already been proven in other sectors. Internet giants like Google, Facebook, Netflix, etc. uses big data collected from their users to present advertisements, friend recommendations, and TV shows and movies relevant to the specific user. Big data is also used for insurance fraud detection, improving bus system by reducing congestion, predictive flight arrival time, weather forecast, and genomic analysis.
For the construction industry, volume and variety becomes particularly relevant. From project planning to the …


Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa Nov 2013

Developing An Is Quality Culture With Iso 9001: Hopefully, A Never Ending Story, João Barata, Paulo Rupino Da Cunha, Cristina Chuva Costa

João Barata

We present an approach to develop IS Quality Culture, in the context of ISO 9001. The research design begins with semi-structured interviews with eight auditors, followed by action research. We confirmed that auditors recognize the importance of five distinct IS Quality dimensions: information/data, software, administrative, service, and infrastructure. However, the audit practice reveals the risk of considering IS as mere support, disregarding the cultural aspects of IS Quality. Our contribution addresses this gap by providing an audit checklist and an approach accessible to IS non-experts. An IS Quality Culture is vital in regulatory environments, and may raise the audit effectiveness …


Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar Oct 2013

Information Sharing In Innovation Networks, Jennifer Priestley, Subhashish Samaddar

Jennifer L. Priestley

No abstract provided.


The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar Oct 2013

The Role Of Ambiguity In The Transfer Of Knowledge Within Multi-Organizational Networks, Jennifer Priestley, Subhashish Samaddar

Jennifer L. Priestley

Organizations join multi-organizational networks in part to mitigate environmental uncertainties and to access knowledge. However, the transfer of knowledge cannot be assumed simply as a function of network membership. Researchers in the area of knowledge management have identified several factors that have been found to affect the transfer of knowledge within, between, and among organizations. This chapter investigates specifically how organizational ambiguity impacts the transfer of knowledge within multi-organizational networks. The authors explore the effects of casual ambiguity, defined as the ambiguity relateaad to imputs and factors, in a multi-organizational context, and discuss the existence of a previously undefined ambiguity, …


Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley Oct 2013

Knowledge Transfer Within Interorganizational Networks, Jennifer Priestley

Jennifer L. Priestley

No abstract provided.


Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma Oct 2013

Does Privacy Still Matter In The Era Of Web 2.0? A Qualitative Study Of User Behavior Towards Online Social Networking Activities, Qing Hu, Shuo Ma

Qing Hu

In this study, we attempt to understand one frequently observed paradox in user social networking behavior – highly concerned about privacy issues on social networking sites, yet actively participating in social networking activities. Based on qualitative analysis of student essays on their social networking activities and perceptions, we propose a theory for user online social networking behavior – the adaptive cognition theory (ACT). The main argument of the theory is that user behavior toward social networking is dynamic and adaptive primarily influenced by the perceived benefits and risks. More often than not, the perceived benefits dominate the perceived risks in …


The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu Oct 2013

The Impact Mechanism Of Transformational Leadership Style On Exploitative And Exploratory Learning Of Erp Systems, Zhen Shao, Yuqiang Feng, Qing Hu

Qing Hu

Transformational leadership has been identified as one of the most critical factors in ERP success. However, few studies have explored how transformational leadership impacts ERP success, especially in the assimilation phase. Drawing from organizational learning and leadership theories, we submit that transformational leadership is positively related to exploitative and exploratory learning, mediated by three types of organizational learning culture. We developed a theoretical model and collected data from top and middle managers of 101 organizations in China that have used ERP systems for at least one year. Our results suggest that (1) transformational leadership is positively related with psychological safety, …


The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie Oct 2013

The Role Of Guanxi In Information Technology Enabled Organizations: A Structuration Theory Perspective, Qing Hu, Jinghua Xiao, Kang Xie

Qing Hu

Firms in China, and in Asia-Pacific countries to a certain degree, cannot escape from two institutional characteristics of modern organizations: the uniquely Eastern practice of guanxi and the uniquely Western artifact of information technology. While both constructs have been extensively studied in organizational contexts, few have examined how these two constructs interact with each other and how such interaction impact organizational processes, norms, and other institutional properties. From the lens of structuration theory, we attempt to understand this interesting and important phenomenon. We submit that guanxi is neither a cultural artifact of the Chinese society, nor a product of weak …


Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla Oct 2013

Why College Students Commit Computer Hacks: Insights From A Cross Culture Analysis, Qing Hu, Zhengchuan Xu, Ali Alper Yayla

Qing Hu

Computer hacking committed by young adults has become an epidemic that threatens the social and economic prosperity brought by information technology around the world. In this study, we extend previous studies on computer hackers with a cross cultural approach by comparing sources of influence on computer hacking in two countries: China and the United States. This comparative study yielded some significant insights about the contributing factors to the computer hacking phenomenon in these two countries. While some factors are consistent, others are distinctly different, across the two samples. We find that moral beliefs about computer hacking are the most consistent …


Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling Oct 2013

Why Individuals Commit Computer Offences In Organizations: Investigating The Roles Of Rational Choice, Self-Control, And Deterrence, Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling

Qing Hu

Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using …


Green It And Green Is: Definition Of Constructs And Overview Of Current Practices, Fabian Loeser Aug 2013

Green It And Green Is: Definition Of Constructs And Overview Of Current Practices, Fabian Loeser

Fabian Loeser

Presentation held @ AMCIS 2013, Chicago Track: Green IS and Sustainability Minitrack: Organizations and Green IS 1:30 – 3:00 pm, Room 4D


Student Adoption & Development Of Digital Learning Media: Action Research And Recommended Practices, Sharon Tabor, Robert Minch Jul 2013

Student Adoption & Development Of Digital Learning Media: Action Research And Recommended Practices, Sharon Tabor, Robert Minch

Robert P. Minch

Digital technologies offer many opportunities for creating engaging course content. In this study we captured student perceptions and adoption choices related to creating and using digital media as learning tools. Podcasts, video and other media were integrated in a variety of contexts and tasks in two undergraduate information technology (IT) courses in a college of business. During the fall semesters of 2009 and 2010, faculty members teaching a junior-level IT and networking concepts course and a senior-level information security course, produced video-captured lectures, recorded fine-grained conceptual tutorials and podcasts, developed software simulations, and provided media for ad-hoc learning assistance. Students …


Do They Tweet Differently? A Cross-Cultural Group Study Of Twitter Use On Mobile Communication Devices, Kyungsub S. Choi, Il Im, Jason Danely Jul 2013

Do They Tweet Differently? A Cross-Cultural Group Study Of Twitter Use On Mobile Communication Devices, Kyungsub S. Choi, Il Im, Jason Danely

Jason Danely

Culture is one of the classic and most widely studied topics in the field of technology. People of different cultural backgrounds interpret, consume, and disseminate technology differently. One conspicuous aspect of culture is communication. The expression, conversational patterns, and contextual nuances of different languages make communication a distinct cultural experience. Culture influences how communication functions between different people in different social contexts. It is also an underlying feature of encoded messages; a knowledge of the sender’s culture helps to discern his or her intention. Communication technology is also susceptible to the influence of culture. The mobile and social aspects of …


Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof Jul 2013

Economic Aspects Of Internet Security, Henk Lm Kox, Bas Straathof

Henk LM Kox

An economic perspective on Internet security is useful not only for identifying weak spots, but also for finding solutions to security problems. It focuses on the behaviour and economic incentives of both infrastructure providers and end users. Individual parties may have insufficient incentives to invest in cybersecurity. The free play of markets markets may not deliver a socially optimal level of security on the Internet for at least three reasons: information asymmetry, externalities and market power. Information asymmetry might occur in various situations. For example, end users are not able to verify whether an Internet Service Provider (ISP) correctly informs …


A Performance Measurement Framework For It Service Management, Francis Gacenga Dr. Jun 2013

A Performance Measurement Framework For It Service Management, Francis Gacenga Dr.

Francis Gacenga Dr.

The use of Information Technology (IT) has become more pervasive and, progressively, there has been a shift from a technology focus to a service focus in managing IT. The performance measurement of IT service management (ITSM) is a major challenge faced by organisations adopting best practice frameworks. The extensive adoption of ITSM frameworks by organisations may point to the acceptance by IT service managers that best practice frameworks such as Information Technology Infrastructure Library (ITIL®) and standards such as ISO/IEC 20000 can deliver real operational efficiencies, ultimately translating into business benefits. Some organisations implementing ITSM initiatives have reported realisation of …


Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier Jun 2013

Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier

Craig Napier

The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …


Classroom Design And Teachers’ Performance In Selected Secondary Schools In Ogun State, Nigeria, Olukunle Saheed Oludeyi Jun 2013

Classroom Design And Teachers’ Performance In Selected Secondary Schools In Ogun State, Nigeria, Olukunle Saheed Oludeyi

Olukunle Saheed, OLUDEYI

Studies on classroom design, most especially in Nigerian secondary schools, are seriously lacking. With particular focus on selected teachers in Ogun State, this ex-post facto research examined classroom design and its influence on teachers’ performance in teaching job. A total of 128 participants were randomly selected from 16 secondary schools in Ijebu Ode and 128 questionnaires titled ‘Scale on Classroom Design and Teachers Performance’ (SCDTP) with reliability co-efficient of 0.82 obtained through cronbach alpha method was developed and administered on the target participants. 96 instruments, constituting 75% of the total administered, were however returned and analysed. Simple percentage and Chi-square …


Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe May 2013

Exploring Sales Techniques Through The Minds Of Novice And Expert Salespersons, Adriane Randolph, A. Leila Borders, Terry Loe

Adriane B. Randolph

No abstract provided.


Building Organizational Knowledge Quality: Investigating The Role Of Social Media And Social Capital, Pratyush Bharati, Abhijit Chaudhury, Wei Zhang May 2013

Building Organizational Knowledge Quality: Investigating The Role Of Social Media And Social Capital, Pratyush Bharati, Abhijit Chaudhury, Wei Zhang

Pratyush Bharati

To the extent that knowledge is the most strategically important resource for sustainable competitive advantage, organizations must consciously and systematically manage their knowledge asset. In this paper, we explore how social media and social capital at organizational level help organizations benefit from their knowledge management initiatives through improving organizational knowledge quality. A research model was developed and survey data were used to test the model. The preliminary results show that social media helps to provide the technical environment conducive to knowledge exchange and social capital enables the actual knowledge sharing between businesses. Both facilitate an organizational emphasis on knowledge management, …


Blending Information Systems Security And Forensics Curricula, Jason Ferguson May 2013

Blending Information Systems Security And Forensics Curricula, Jason Ferguson

Jason Connor Ferguson

This paper describes the process of developing an Information Security and Forensics curriculum for a master’s degree. The vision for this degree program is to offer a curriculum that differentiates Friends University in the marketplace from established security degrees by including courses in computer forensics. These are courses rarely seen in a security degree but supported by the regional marketplace that the university serves.


Cybersecurity In The Perspective Of Internet Traffic Growth, Henk Lm Kox Apr 2013

Cybersecurity In The Perspective Of Internet Traffic Growth, Henk Lm Kox

Henk LM Kox

Private and public concern about digital security, cybercrime and data privacy is growing the last few years. If Internet-related markets are flexible enough to cope with security concerns, given time, one would expect that - per unit of Internet traffic - the number and costs of cybersecurity incidents fall over time. This paper is a first attempt to assess empirically whether overall Internet traffic growth has grown faster than the number of cybersecurity incidents. The conclusion is that, overall, the Internet has over time has become a safer place when measured by the number of security incidents per unit of …


Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald Apr 2013

Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

Purpose – This study aims to analytically develop a reference model for engineering (i.e. analysis, design, development, evaluation, delivery, maintenance, modification, and management) powerful value networks capable of creating innovative mobile data services. Design/methodology/approach – The paradigm followed is that of Design-Science Research (DSR) which incorporates two main iterative processes: build and evaluate. For building the model (i.e. the design science artifact in this research), we followed three iterations: (1) Literature Review Analysis; (2) Semi-Structured Interviews analyzed through content analysis; and (3) examination of real-life case studies. But for evaluating the model, we utilized the NTT DoCoMo’s i-mode case. Findings …


Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar Mar 2013

Collaboration Process Patterns And Integrated Assessment In E-Learning Environments, Dawn Dittman, Amit V. Deokar

Amit Deokar

Collaboration activities are particularly difficult in e-learning environments, where the intention is to provide students with valuable learning experiences through working in teams and sharing a common goal. These activities are often conducted in an ad hoc manner with lack of proper assessment and control over learning outcomes. In this article, we propose the idea of enhancing the effectiveness of collaborative e-learning practices through structured collaborative e-learning processes and integrated assessment mechanisms. The structuring of collaboration processes is suggested through the application of successful collaboration process patterns, while the integrated assessment is suggested through assessing not just the end learning …


Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters Mar 2013

Information Security Policy Compliance: An Ethical Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit V. Deokar, Jack Walters

Amit Deokar

Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasoned Action (TRA) and ethics theories; deontology and teleology, to examine users’ behavioral intention to comply with ISPs. This is a research in progress, and an instrument is under development to conduct a survey study to gather data from employees in the banking sector in …


Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs Mar 2013

Panel: Future Directions For Mwais, Gaurav Bansal, Amit Deokar, Martina Greiner, Daniel Power, Ilze Zigurs

Amit Deokar

The Midwest chapter of the Association for Information Systems (MWAIS) was authorized as an official chapter of AIS during Fall of 2005. MWAIS is hosting its 7th research conference. Overall the Chapter has been successful in providing a forum to share ideas in traditional ways. As we broaden our leadership team and move to empower new leaders, this meeting is an excellent venue to share novel program ideas and discuss future directions.


A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar Mar 2013

A Knowledge-Based Approach For Business Process Risk Management, Paul Weist, Amit Deokar

Amit Deokar

In order to support effective and efficient business process management, it is imperative that the process management lifecycle be integrated with risk management knowledge. In this regard, this article presents a knowledge-based approach to integrating risk management with business process management. The adopted approach is based on conversational case-based reasoning (CCBR) with the objective to provide support in developing an appropriate risk management strategy for an ongoing workflow instance. This approach builds on the notion of integrating risks within business process models. A prototype is currently under development, which will assess the feasibility of this approach. We then intend to …


Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar Mar 2013

Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari, Omar El-Gayar, Amit Deokar

Amit Deokar

Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behavioral intention to comply with ISPs. The impact of information security awareness on behavioral intentions to comply is also considered in the research model. This is a research in progress, and an instrument is being developed to conduct a survey study to gather data from employees …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …