Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2007

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 48

Full-Text Articles in Management Information Systems

Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula Dec 2007

Management By Interruptions (Mbi): Mini Not Micro Management, Andrew Sikula Sr., John Sikula

Management Faculty Research

Do you want to affirmatively continue your and Tom Peters's Search for Excellence? Then practice MBI. A corollary to Ken Blanchard's idea of the One Minute Manager is the concept of Management by Interruptions (MBI). Although we do not want to overly manage the details of work, usually called micro management, we are often called upon as leaders and managers to supply frequent small segments of data and information. Mini management is good; micro management is not.


Measuring Organizational Usage Of Information Technology, Anand Jeyaraj Dec 2007

Measuring Organizational Usage Of Information Technology, Anand Jeyaraj

ISSCM Faculty Publications

Organizations make considerable investments in information technology to support their internal and external operations. For instance, a recent research report by Gartner Inc. indicates that worldwide spending on information technology will reach United States $3.3 trillion for the year 2008.


A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen Dec 2007

A Study Of Intention On Continuous Use Of Online Financial Services: The Mediated Effects Of Website Trust, Shih Ming Pi, Shih Hua Lit, Tsang Yao Chen, Hui Min Chen

Business and Information Technology Faculty Research & Creative Works

The lack of trust is one of the most frequently cited reasons for customer's not returning to Internet service providers. As a new form of commercial activity, online financial services and stock trading involve more uncertainty and risk than traditional financial services. Trust is therefore a relatively influential factor of customer behavior in online financial services. The purpose of this study is to propose a framework of Intention to continuously adopt online financial services. Furthermore, the mediated effects of website trust are trusted. The main method of data collection for this study is a survey instrument designed by the author. …


An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz Dec 2007

An Integrated Social Actor And Service Oriented Architecture (Soa) Approach For Improved Electronic Health Record (Ehr) Privacy And Confidentiality In The Us National Healthcare Information Network (Nhin), Gondy Leroy, Elliot Sloane, Steven Sheetz

CGU Faculty Publications and Research

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to a patient. A Social Actor framework is suggested to organize and manage these legal roles, but the Social Actor framework would be very difficult to implement in today’s NHIN. Social Actor Security Management could, however, be effectively implemented using Service Oriented Architectures (SOAs), which are rapidly becoming …


A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman Dec 2007

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …


Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard Dec 2007

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard

Research Collection School Of Computing and Information Systems

The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh Nov 2007

The Dynamics Of Implementing And Managing Modularity Of Organizational Routines During Capability Development: Insights From A Process Model, Shan Ling Pan, Gary Shan Chi Pan, Adela Chen, Ming Huei Hsieh

Research Collection School Of Accountancy

Past research using the resource-based view of a firm suggests that it is important to consider how firms develop, manage, and deploy resources and capabilities to influence the overall process of strategy formation and implementation. Relatively little research has been conducted in conceptualizing how firms implement and manage modularity of organizational routines during capability development. Yet, most companies would benefit from implementing modularity in organizational routines when competing in dynamic market conditions. Such implementations may require fundamental organizational reorientation that incurs significant coordination costs, and in some cases, such modularization attempts may fail, costing organizations significant amounts of valuable resources. …


Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller Nov 2007

Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …


A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible Oct 2007

A Longitudinal Study On The Number Of Graduates From U.S. Colleges And University It Programs, Rick Weible

Management Information Systems Faculty Research

This paper examines the graduation rates for all types of degrees earned by students majoring in information technologies at U.S. colleges and universities. The numbers used in this report are based on graduation numbers reported to the U.S. Department of Education. These numbers show a growth in the total number of graduates between 1995 and 2005 from 103,039 to 187,237 with a peak in 2003 of 240,862. There is a sharp decline between 2003 and 2005. This decline can be linked to major events: the burst of the IT bubble and the terrorist attacks of September 11, 2001. And there …


Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo Oct 2007

Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo

Research Collection School Of Computing and Information Systems

In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …


Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs Oct 2007

Product Complexity: A Definition And Impacts On Operations, Mark A. Jacobs

MIS/OM/DS Faculty Publications

The difficulty for organizations arises because neither complexity nor its impacts on performance are well understood (Fisher & Ittner, 1999b). The mechanisms through which it affects cost, quality, delivery, and flexibility need to be explained (Ramdas, 2003). However, this cannot happen until complexity can be explained theoretically. But, to build theory there must first be a common understanding about the construct of interest (Wacker, 2004). Only then can researchers operationalize it and search for meaningful relationships. In light of this, I develop a definition of complexity below. A sampling of the operations management literature is then presented within the context …


The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr. Sep 2007

The Greater Dayton It Alliance Strategic Plan, Donald H. Hopkins Jr.

ISSCM Faculty Publications

The Greater Dayton IT Alliance 2008-11 Strategic Plan is the product of tactical collaboration by the Board of Trustees and members. This team developed the key elements of the plan which were then individually examined to create required actions, programs and metrics.


A Survey Of Schema Matching Research, Roger Blake Sep 2007

A Survey Of Schema Matching Research, Roger Blake

College of Management Working Papers and Reports

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan Sep 2007

A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan

Management Faculty Publications

Radio Frequency Identification (RFID) technology promises to transform supply chain management. Building on previous research in information systems and supply chain management, this paper proposes a theoretical framework for RFID adoption and benefits, and tests the framework using data on U.S. firms. Our analysis suggests that there is a positive association between information technology (IT) application deployment and RFID adoption. We find that RFID implementation spending and partner mandate are associated with an expectation of early return on RFID investment, and a perceived lack of industry-wide standards is associated with an expectation of delayed return on RFID investment. These results …


The Effects Of Web-Based Technologies On Knowledge Transfer, Waymond Rogers, Solomon Negash Jul 2007

The Effects Of Web-Based Technologies On Knowledge Transfer, Waymond Rogers, Solomon Negash

Faculty Articles

The article discusses the effects of Web-based technologies on knowledge transfer, specifically examining whether the use of Web-based services can increase problem-solving skills. Because knowledge transfer has shown a direct correlation with industrial productivity, many organizations are actively trying to create services that encourage it. The authors present a study of the effects of Internet technology on knowledge transfer and the ways that organizations can use technology related to knowledge transfer.


Enterprise Resource Planning (Erp) Systems And The Manufacturing-Marketing Interface: An Information Processing Theory View, Thomas F. Gattiker Jul 2007

Enterprise Resource Planning (Erp) Systems And The Manufacturing-Marketing Interface: An Information Processing Theory View, Thomas F. Gattiker

IT and Supply Chain Management Faculty Publications and Presentations

The manufacturing-marketing (MM) interface has received substantial consideration in the operations management literature; however, relatively little attention has been paid to the role of information systems in facilitating MM integration. As integrated cross-functional systems, enterprise resource planning systems (ERP) are well-suited to provide MM integration. Based on information processing theory, the central proposition of this paper is the greater the interdependence between manufacturing and marketing, the greater the benefit of ERP. Specifically, H1 states that the greater ERP-enabled coordination between manufacturing and marketing, the greater the benefit of ERP to the plant. H2 states that the degree to which ERP-enabled …


Shared Vision: A Development Tool For Organisational Learning, Siu Loon Hoe Jul 2007

Shared Vision: A Development Tool For Organisational Learning, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

PurposeThe organizational behavior and management literature has devoted a lot attention to processes and technology in organizational learning. There has been little work to examine the effect of shared vision on organizational learning. The purpose of this paper is to highlight the importance of shared vision as a development tool to build an organizational learning capability.Design/methodology/approachThe existing shared vision and organizational learning literature was reviewed, and the salient points on how shared vision promotes organizational learning discussed.Practical implicationsThe paper offers a view on how leaders can use shared vision to develop organizational learning capability. Practicing managers would then be able …


The Business Model Of "Software-As-A-Service", Dan Ma Jul 2007

The Business Model Of "Software-As-A-Service", Dan Ma

Research Collection School Of Computing and Information Systems

The emergence of the software-as-a-service (SaaS) business model has attracted great attentions from both researchers and practitioners. SaaS vendors deliver on-demand information processing services to users, and thus offer computing utility rather than the standalone software itself. In this work, the author propose an analytical model to study the competition between the SaaS and the traditional COTS (commercial off-the-shelf) solutions for software applications. The author show that when software applications become open, modulated, and standardized, the SaaS business model will take a significant market share. In addition, under certain market conditions, offering users an easy exit option through the software …


Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo Jul 2007

Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo

Research Collection School Of Computing and Information Systems

Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson’s Correlation Coefficient to measure user similarities based on their previous ratings on different items. Users will then be grouped into different neighborhood depending on the calculated similarities. Finally, the system will generate predictions on how a user would rate a specific item by aggregating ratings on the item cast by the identified neighbors of his/her. However, current memory-based CF method only measures user similarities …


Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe Jul 2007

Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organisational behaviour and management literature has devoted a lot attention on various factors affecting organisational learning. While there has been much work done to examine trust in promoting organisational learning, there is a lack of consensus on the specific type of trust involved. The purpose of this paper is to highlight the importance of interpersonal trust in promoting organisational learning and propose a research agenda to test the extent of interpersonal trust on organisational learning. This paper contributes to the existing organisational learning literature by specifying a specific form of trust, interpersonal trust, which promotes organisational learning and proposing …


Organisational Learning: Conceptual Links To Individual Learning, Learning Organisation And Knowledge Management, Siu Loon Hoe Jul 2007

Organisational Learning: Conceptual Links To Individual Learning, Learning Organisation And Knowledge Management, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Organisational learning has over the years been subject of much study by scholars and managers. In the process, the organisational learning concept has been linked to many other knowledge concepts such as individual learning, learning organisation, and knowledge management. This paper draws from existing literature in organisational behaviour, human resource management, marketing, and information management, to further develop the conceptual links between organisational learning and these knowledge concepts. The paper discusses the characteristics of organisational learning and emphasises its link to individual learning, the learning organisation, and knowledge management. It contributes to the conceptual and theoretical understanding of organisational learning …


Information Systems (Is) Connectivity As A Moderator Of The Effects Of Is Support For Information Interpretation On Firm Performance: An Empirical Study, Michael J. Zhang Jun 2007

Information Systems (Is) Connectivity As A Moderator Of The Effects Of Is Support For Information Interpretation On Firm Performance: An Empirical Study, Michael J. Zhang

WCBT Faculty Publications

This study examined and tested the roles of information systems (IS) connectivity in influencing the performance impacts of IS support for information sharing and IS support for information interpretation. Using data collected from a survey of large U.S. firms and the Research Insight (Compustat) database, the results showed that when IS connectivity was high, IS support for information sharing was positively related to profitability whereas IS support for information interpretation was negatively associated with profitability. These findings suggest that a high level of IS connectivity is a two-end sword for firms which rely on both IS support for information sharing …


Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard May 2007

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

Research Collection School Of Computing and Information Systems

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr. Apr 2007

Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr.

Publications (YM)

This procedure establishes the responsibilities and provides direction for developing and evaluating the adequacy of process controls on specific uses of electronically stored information. These uses include, but are not limited to, information used in design input, developed as design output, or developed as input to or output from scientific investigation or performance assessment modeling and analysis. This pertains to information that resides in an electronic information management system or on electronic media.


Impact Of Information Technology Innovations On Resources And Services Of Management Institute Libraries In Mumbai: A Librarians’ Approach, Satish Kanamadi, B. D. Kumbar Apr 2007

Impact Of Information Technology Innovations On Resources And Services Of Management Institute Libraries In Mumbai: A Librarians’ Approach, Satish Kanamadi, B. D. Kumbar

E-JASL 1999-2009 (Volumes 1-10)

Abstract

Management libraries are facing a piquant situation and unforeseen challenges in this age of information technology. They are reeling under pressure to fulfill their obligation of meeting the diverse information needs of clientele. IT has brought in sweeping changes in the traditional way libraries are functioning. Libraries need to evaluate, measure the impact of information technology on them. This will equip them with the knowledge of turning this information Technology into a boon for improving their services. This paper is one such attempt with reference to management libraries affiliated to University of Mumbai, Mumbai City, India.


Evaluation Of An Expanded Satellite Based Mobile Communications Tracking System, Maciek Nowak, Alan L. Erera Apr 2007

Evaluation Of An Expanded Satellite Based Mobile Communications Tracking System, Maciek Nowak, Alan L. Erera

Information Systems and Operations Management: Faculty Publications & Other Works

Since the terrorist events in the United States on September 11, 2001, the Federal Motor Carrier Safety Administration has been testing and evaluation cargo tracking technologies to improve the safety, security and efficiency of commercial motor vehicle operations. While satellite-based systems used for tracking vehicles and cargo provide sufficient geographic coverage in the majority of the United States, there remain several vital regions that are uncovered and difficult to monitor. One such region is Alaska, where officials are particularly concerned with the hazardous materials shipments that are transported parallel to the Trans-Alaska Pipeline. This article analyzes the risks and benefits …


How Cios Can Effectively Use Influence Behaviors, Harvey Enns, Dean B. Mcfarlin, Sid L. Huff Mar 2007

How Cios Can Effectively Use Influence Behaviors, Harvey Enns, Dean B. Mcfarlin, Sid L. Huff

MIS/OM/DS Faculty Publications

To accomplish their objectives, Chief Information Officers (CIOs) must rely on their abilities to influence members of top management. Effective use of influence behaviors can make the difference between successful and less successful CIOs. But aspiring senior managers are rarely formally taught how to influence others. They learn informally on the job.

This article explores influence behaviors and their appropriate use by CIOs. It first describes 11 common influence behaviors—rational persuasion (logical arguments), apprising (emphasizing expected benefits), inspirational appeal, consultation, collaboration, personal appeal, ingratiation, exchange, legitimating (connected to precedent), coalition (asking others to persuade), and pressure. Then this article discusses …


Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr. Mar 2007

Cultural Implications Of "Excellent Employees": Comparing American And Korean Workers, Chong W. Kim, Yung-Ho Cho, Andrew Sikula Sr.

Management Faculty Research

As noted in Kim & Sikula (2003, 2005), there are three types of people in the workplace: "Necessities", "Commoners," and "Parasites". A necessity (excellent employee) is irreplaceable and crucial to the functioning of an organization. A Commoner (average laborer) is a person of normal ability and talent who has no significant impact on organizational success. Lastly, Parasites (problem workers) are detrimental freeloaders who damage the functioning of an organization.

In the 2005 paper, we analyzed the survey responses of 25 students in an MBA Organizational Behavior class and 13 working managers, all in the United States. In this paper, we …


Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March Mar 2007

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March

Research Collection School Of Computing and Information Systems

Decisions to invest in information technology (IT) infrastructure are often made based on an assessment of its immediate value to the organization. However, an important source of value comes from the fact that such technologies have the potential to be leveraged in the development of future applications. From a real options perspective, IT infrastructure investments create growth options that can be exercised if and when an organization decides to develop systems to provide new or enhanced IT capabilities. We present an analytical model based on real options that shows the process by which this potential is converted into business value, …