Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Physical Sciences and Mathematics (8)
- Operations and Supply Chain Management (6)
- Business Administration, Management, and Operations (4)
- Management Sciences and Quantitative Methods (4)
-
- Organizational Behavior and Theory (4)
- Social and Behavioral Sciences (4)
- Business Intelligence (3)
- Education (3)
- Technology and Innovation (3)
- Finance and Financial Management (2)
- Library and Information Science (2)
- Other Business (2)
- Accounting (1)
- Business Analytics (1)
- Business Law, Public Responsibility, and Ethics (1)
- Business and Corporate Communications (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Engineering (1)
- Curriculum and Instruction (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Educational Technology (1)
- Engineering (1)
- Entrepreneurial and Small Business Operations (1)
- Health Information Technology (1)
- Health and Medical Administration (1)
- Institution
-
- Singapore Management University (9)
- Wright State University (8)
- San Jose State University (5)
- Kennesaw State University (4)
- Marshall University (4)
-
- Butler University (3)
- Missouri University of Science and Technology (3)
- Santa Clara University (2)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Loyola University Chicago (1)
- Montclair State University (1)
- Old Dominion University (1)
- The University of Maine (1)
- University of Connecticut (1)
- University of Massachusetts Boston (1)
- Keyword
-
- Refereed Articles (5)
- Knowledge management (2)
- Pricing (2)
- Aesthetic (1)
- Airplane engines (1)
-
- Analytical hierarchy process; expert choice; multiple objective decision making; supply chain management software (1)
- Attitude toward using (1)
- B2C (1)
- Behavioral intention (1)
- Behavioral intentions (1)
- Business Process Reengineering (BPR) (1)
- Business conditions (1)
- Business education (1)
- C2C (1)
- CMS (1)
- Capital market information (1)
- Case study (1)
- Channel strategy (1)
- Classroom activities (1)
- Communication (1)
- Competition (1)
- Complex information systems, innovations, diffusion, influence models, event-history analyses (1)
- Computer Proficiency Exam (1)
- Computer Science (1)
- Computer Skill Assessment (1)
- Computer Skill Development (1)
- Computer networks (1)
- Container assignment (1)
- Container terminal (1)
- Content management systems (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (6)
- Faculty Publications, Information Systems & Technology (5)
- ISSCM Faculty Publications (5)
- Faculty Articles (4)
- Business and Information Technology Faculty Research & Creative Works (3)
-
- Scholarship and Professional Work - Business (3)
- Information Systems and Analytics (2)
- Management Faculty Research (2)
- Master of Information Systems Capstone Executive Summary (2)
- Research Collection Lee Kong Chian School Of Business (2)
- Accounting Faculty Research (1)
- Business Faculty Publications (1)
- CGU Faculty Publications and Research (1)
- CMP Research (1)
- Department of Information Management and Business Analytics Faculty Scholarship and Creative Works (1)
- Distance Learning Faculty & Staff Publications (1)
- Finance Faculty Scholarship (1)
- Honors Scholar Theses (1)
- ISSCM Master Cohort Posters (1)
- Information Systems and Operations Management: Faculty Publications & Other Works (1)
- Library Faculty Publications & Presentations (1)
- Management Information Systems Faculty Research (1)
- Management Science and Information Systems Faculty Publication Series (1)
- Publications and Research (1)
Articles 1 - 30 of 48
Full-Text Articles in Management Information Systems
Developing An Assessment Model For Evaluating Software Tools In Education, Vedant Jain, Hong Sheng, Richard H. Hall, Mike (Michael) Gene Hilgers
Developing An Assessment Model For Evaluating Software Tools In Education, Vedant Jain, Hong Sheng, Richard H. Hall, Mike (Michael) Gene Hilgers
Business and Information Technology Faculty Research & Creative Works
This Paper Presents a Research Model to Evaluate the Usability of Computer-Mediated Learning Technology, User Acceptance of the Technology, and the Effect of the Technology on Learning Outcomes. We Also Introduce the Use of Innovative Research Techniques for the Evaluation, Including Eye Tracking and Think-Aloud Protocol. Think-Aloud Protocol Allows Us to Understand a User's State of Mind While He/she is Interacting with the System. Eye Tracking Also Provides Additional Insights into a User's Cognitive State While using the System. Both Qualitative and Quantitative Data Can Be Collected Following the Research Model, Thus Providing More In-Depth Understanding on the Effect of …
Designing Motorcycles Via The Web: Improved Aesthetics And Consumer Preference, Michael Gene Hilgers, Hong Sheng, Richard H. Hall
Designing Motorcycles Via The Web: Improved Aesthetics And Consumer Preference, Michael Gene Hilgers, Hong Sheng, Richard H. Hall
Business and Information Technology Faculty Research & Creative Works
The Purpose of This Research Was to Examine How Manipulation of the Aesthetic Appeal of a Motorcycle's Image on a Web Page Might Elucidate Trends in Consumer Preference. to This End, Website Visitors Were Encouraged to Reconfigure a Blueprint of Motorcycle to Make It More Appealing. These Alterations to its Confirmation Were Analyzed to Identify Patterns of Preference that Were Then Compared to the Marketplace in General. It Was Observed that Aesthetic Preferences Recognized by the Design Method Were Similar to Trends within the Motorcycle Building/buying Public.
The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim
The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim
CMP Research
Research in Critical Success Factors (CSFs) of Enterprise Systems (ES) projects has identified numerous practitioner governance mechanisms for ensuring project success. However, such research has not developed a theory of why certain critical success factors encourage project success. Our research develops such theory on a case study where even though the levels of several critical success factors were weak, the project nevertheless succeeded. Specifically, the logistics ES project succeeded even though there was (1) only marginal top management support, (2) low key user commitment, and (3) change management, training and other critical aspects of user management and communication were not …
Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau
Personality Traits Effects On Job Satisfaction: The Role Of Goal Commitment, Wai Kwan (Elaine) Lau
Management Faculty Research
The present research investigates the effects of personality traits, self-efficacy and locus of control, on job satisfaction. It also examines the mediating impact of goal commitment on relationships between personality and job satisfaction. The results indicate that self-efficacy and locus of control are positively related to goal commitment. Goal commitment is positively associated with job satisfaction. In addition, locus of control is fund positively related to job satisfaction while self-efficacy does not have such relationship with job satisfaction.
Hospitality Marketing Mix And Service Marketing Principles, David Bojanic
Hospitality Marketing Mix And Service Marketing Principles, David Bojanic
Business and Information Technology Faculty Research & Creative Works
The Concept of Marketing is based on the Premise that Firms Should Determine Consumer Wants and Needs Before Designing Products and Services. This Consumer-Orientation Results in Greater Demand for a Firm's Products and Services and Higher Levels of Customer Satisfaction after the Purchase. Marriott International Followed This Approach in Developing their Courtyard and Residence Inns Hotels. for Example, the Courtyard Concept is Supposed to Attract Business Travelers and Transient Customers Who Do Not Really Like Staying at Hotels (Wind Et Al, 1992; Hart, 1986). the Researchers Recruited Individuals for Focus Groups Representing These Two Market Segments to Determine the Hotel …
Optimal Reserve Prices In Name-Your-Own-Price Auctions With Bidding And Channel Options, Gangshu (George) Cai, Xiuli Chao, Jianbin Li
Optimal Reserve Prices In Name-Your-Own-Price Auctions With Bidding And Channel Options, Gangshu (George) Cai, Xiuli Chao, Jianbin Li
Information Systems and Analytics
Few papers have explored the optimal reserve prices in the name-your-own-price (NYOP) channel with bidding options in a multiple channel environment. In this paper, we investigate a double-bid business model in which the consumers can bid twice in the NYOP channel, and compare it with the single-bid case. We also study the impact of adding a retailer-own list-price channel on the optimal reserve prices. This paper focuses on achieving some basic understanding on the potential gain of adding a second bid option to a single-bid system and on the potential benefits of adding a list-price channel by the NYOP retailer. …
Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao
Why It Managers Don't Go For Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao
Faculty Articles
Despite positive expectations, cyber-insurance products have failed to take center stage in the management of IT security risk. Market inexperience, leading to conservatism in pricing cyber-insurance instruments, is often cited as the primary reason for the limited growth of the cyber-insurance market. In contrast, here we provide a demand-side explanation for why cyber-insurance products have not lived up to their initial expectations. We highlight the presence of information asymmetry between customers and providers, showing how it leads to overpricing cyber-insurance contracts and helps explain why cyber insurance might have failed to deliver its promise as a cornerstone of IT security-management …
An Empirical Study On The Benefit Of Split Loads With The Pickup And Delivery Problem, Maciek Nowak, Chelsea C. White, Ozlem Ergun
An Empirical Study On The Benefit Of Split Loads With The Pickup And Delivery Problem, Maciek Nowak, Chelsea C. White, Ozlem Ergun
Information Systems and Operations Management: Faculty Publications & Other Works
Splitting loads such that the delivery of certain loads is completed in multiple trips rather than one trip has show to have benefit for both the classic Vehicle Routing Problem and the Pickup and Delivery Problem. However, the magnitude of the benefit may be affected by various problem characteristics. In this paper, we characterize those real world environments in which split loads are most likely to be beneficial. Based on practitioner interest, we determine how the benefit is affected by the mean load size and variance, number of origins relative to the number of destinations, the percentage of origin-destination pairs …
Using Decision Analysis To Value R&D Projects, Bert De Reyck
Using Decision Analysis To Value R&D Projects, Bert De Reyck
Research Collection Lee Kong Chian School Of Business
Project portfolio management, the equivalent of financial portfolio management but focused on R&D projects rather than financial assets, often relies on decision analysis methods to value projects rather than traditional financial valuation methods such as net present value (NPV). In finance, the idea of managing portfolios of assets goes back a long time, with the first formal methods being developed in the 1950s. Simply put, assembling a portfolio of stocks, bonds, and other financial instruments balances the risk a manager is taking with any one of the investments. Over time, this same idea has also taken hold for managing a …
Implementing An Enterprise Information System To Reengineer And Streamline Administrative Processes In A Distance Learning Unit, M'Hammed Abdous, Wu He
Implementing An Enterprise Information System To Reengineer And Streamline Administrative Processes In A Distance Learning Unit, M'Hammed Abdous, Wu He
Distance Learning Faculty & Staff Publications
During the past three years, we have developed and implemented an enterprise information system (EIS) to reengineer and facilitate the administrative process for preparing and teaching distance learning courses in a midsized-to-large university (with 23,000 students). The outcome of the implementation has been a streamlined and efficient process which has delivered higher faculty satisfaction at a substantial cost reduction. In this paper, we propose a new conceptual and operational framework for process reengineering (PR) in higher education institutions. We also share our practical experience gained while designing, developing, and integrating three subsystems into an EIS. We hope that our experience, …
Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma
Evaluating Straddle Carrier Deployment Policies: A Simulation Study For The Piraeus Container Terminal, Eleni Hadjiconstantinou, Nang Laik Ma
Research Collection School Of Computing and Information Systems
Most container terminals in the world today are operating up to their capacities. In this paper, we have developed a decision support system to optimise yard operations by considering all container flows (import, export and transshipment) through the yard with the view to improving the terminal performance and efficiency. In another paper, we proposed an optimisation model that determines optimal container locations and straddle carrier (SC) movements with the objective of minimising the overall storage and handling cost of containers. In this paper, a discrete event simulation tool for container terminal operations has been developed with three objectives: (i) to …
Workplace Management And Employee Misuse: Does Punishment Matter? Journal Of Computer Information Systems, Qinyu Liao, Xin Luo, Anil Gurung, Long Li
Workplace Management And Employee Misuse: Does Punishment Matter? Journal Of Computer Information Systems, Qinyu Liao, Xin Luo, Anil Gurung, Long Li
Management Information Systems Faculty Research
With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern for organizations. Research has demonstrated employee reactions to monitoring systems and how they are implemented. However, little is known about the impact of punishment-related policies on employee intention to misuse Internet. To extend this line of research beyond prior studies, this paper proposes an integrated research model applying Theory of Planned Behavior, Deterrence Theory, and Theory of Ethics to examine the impact of punishment-related policy on employees’ Internet misuse intentions. The results indicate that perceived importance, perceived behavioral control and subjective norms have significant influence on employee …
Mis 799 Capstone: 2009 Summer Cohort List, Raj Soin College Of Business, Wright State University
Mis 799 Capstone: 2009 Summer Cohort List, Raj Soin College Of Business, Wright State University
Master of Information Systems Capstone Executive Summary
Available for download is a list of the 2009 Summer Cohorts, complete with student names, project titles, and faculty advisor names.
Ktr: An Efficient Key Management Scheme For Secure Data Access Control In Wireless Broadcast Services Recovery, Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu
Ktr: An Efficient Key Management Scheme For Secure Data Access Control In Wireless Broadcast Services Recovery, Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu
Research Collection School Of Computing and Information Systems
Wireless broadcast is an effective approach for disseminating data to a number of users. To provide secure access to data in wireless broadcast services, symmetric-key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. With regard to various subscriptions, an efficient key management for distributing and changing keys is in great demand for access control in broadcast services. In this paper, we propose an efficient key management scheme, namely, key tree reuse (KTR), to handle key distribution with regard to complex subscription options and user activities. KTR has the following advantages. First, …
A Case Of Voip Implementation Using Open Source, Russell J. Roysden
A Case Of Voip Implementation Using Open Source, Russell J. Roysden
ISSCM Faculty Publications
Voice over Internet Protocol (VoIP) has progressed from a limited, untested technology to a feature-rich service that continues to find a place in all types of businesses. Companies such as Vonage and Skype have built successful business models based on VoIP services, and major telecommunications companies such as AT&T and Time Warner have followed suit with bundled offerings of phone, cable, and Internet services. Research has suggested that the Small-to-Medium Business (SMB) marketplace is quickly moving towards VoIP for productivity and efficiency benefits, convenience, and cost savings (Frost & Sullivan Company, 2006).
The Data-Information-Knowledge-Wisdom Hierarchy And Its Antithesis, Jay H. Bernstein
The Data-Information-Knowledge-Wisdom Hierarchy And Its Antithesis, Jay H. Bernstein
Publications and Research
The now taken-for-granted notion that data lead to information, which leads to knowledge, which in turnleads to wisdom was first specified in detail by R. L. Ackoff in 1988. The Data-Information-Knowledge-Wisdom hierarchy is based on filtration, reduction, and transformation. Besides being causal and hierarchical,the scheme is pyramidal, in that data are plentiful while wisdom is almost nonexistent. Ackoff’s formulalinking these terms together this way permits us to ask what the opposite of knowledge is and whether analogous principles of hierarchy, process, and pyramiding apply to it. The inversion of the Data-Information-Knowledge-Wisdom hierarchy produces a series of opposing terms (including misinformation,error, …
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
Architectural Dualities In Complex Systems: Components, Interfaces, Technologies And Organizations, C. Jason Woodard, Joel West
Research Collection School Of Computing and Information Systems
Research on technological innovation and product development has long recognized the importance of product architecture, and many scholars have explored its relationship to the organizational structure of the product development process. Product architecture, in turn, has long encompassed both the allocation of functionality to components and the pattern of linkages between them. In this paper, we forge new connections among these established ideas by examining them as two pairs of dual relationships. First, we draw attention to the duality between components and interfaces. While innovation and product development researchers have historically emphasized the partitioning of products and systems into components, …
Lost In Translation: Emotion And Expression Through Technology, Shaylyn Joy
Lost In Translation: Emotion And Expression Through Technology, Shaylyn Joy
Honors Scholar Theses
My Thesis study was designed to bring to topic certain issues involved with CMC (computer-mediated communication.) Often we are presented with confusing or misleading situations when it comes to expressing our emotions through technological means. It is important that we are aware of certain issues such as the use of emoticons, expressing sarcasm, and the ongoing trend of Internet slang. These various aspects can create confusion in CMC, leading to a loss in translation. My survey study was designed to probe deeper into these issues by asking general questions and by analyzing sample CMC scenarios.
Oracle E-Business Suite In The Enterprise Systems Course At The Raj Soin College Of Business, Anand Jeyaraj
Oracle E-Business Suite In The Enterprise Systems Course At The Raj Soin College Of Business, Anand Jeyaraj
ISSCM Faculty Publications
Enterprise Resource Planning (ERP) systems, or simply enterprise systems, are enterprise-wide information systems that enable core activities underlying business processes in organizations. Enterprise systems incorporate several standalone information systems ranging from marketing, purchasing, sales, distribution, scheduling, human resources, customer relationship, financials and decision support through a single integrated central database that captures data relating to the various activities and business processes in organizations.
Introduction: Can We Bridge The Rigour-Relevance Gap?, Robin Fincham, Timothy Adrian Robert Clark
Introduction: Can We Bridge The Rigour-Relevance Gap?, Robin Fincham, Timothy Adrian Robert Clark
Research Collection Lee Kong Chian School Of Business
The following series of articles emanate from a session held at the first Journal of Management Studies Conference on the theme of ‘Beyond knowledge management: advancing the organizational knowledge research agenda’. The conference was concerned to advance academic understanding of this broad topic and in addition to reflect on the role of management scholars as creators, commodifiers and disseminators of management and organizational knowledge. The latter theme arose from debates in relation to the apparent marginality of business school academics in the production of management knowledge (Barley et al., 1988; Gibson and Tesone, 2001; Spell, 2001) and their consequent (in)ability …
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
The Relationships Among Gender, Work Experience, And Leadership Experience In Transformational Leadership, Jennifer Y. Mak, Chong W. Kim
Management Faculty Research
Transformational leadership is an organizational leadership theory centered around "the ability to inspire and motivate followers to achieve results greater than originally planned and for internal reward" The investigation into transformational leadership began in the mid-1980s with a number of influential publications by Bass (1985), Bennis and Nanus (1985), Kouzes and Posner (1987) and Tichy and Devanna (1986). In the 1980s, the study of transformational leadership was focused on case-based research (Conger, 1999). By late 1990s, a substantial body of empirical investigations on transformational leadership had been conducted.
Undergraduate Course On Business Intelligence At The Wright State University Raj Soin College Of Business, Anand Jeyaraj
Undergraduate Course On Business Intelligence At The Wright State University Raj Soin College Of Business, Anand Jeyaraj
ISSCM Faculty Publications
Business intelligence (BI) tools enable senior, middle, and line managers to better understand their current operations and determine future strategies. There is a growing recognition among business professionals that the practices relating to BI are crucial for evaluating organizational performance, charting new directions, and everyday decision-making. According to Ziff Davis Enterprise, BI experts are ranked as the #1 job in the information technology sector for 2009.
Implementing Cms: Academic, Jonathan M. Smith, David Bietila
Implementing Cms: Academic, Jonathan M. Smith, David Bietila
Library Faculty Publications & Presentations
This session presents two case studies of the use of open source content management systems (CMSs) in academic libraries. It includes an overview of the benefits and features of CMSs, demonstrates implementations of CMSs at both public sites and staff intranets, and provides a comparison of the two CMS software platforms used (Joomla and Plone) and deployment processes, detailing experiences in such areas as selecting a CMS, identifying resources for support and training, and encouraging staff adoption.
Optimal Digital Content Distribution Strategy In The Presence Of Consumer-To-Consumer Channel, Yunfang Feng, Zhiling Guo, Wei-Yu Kevin Chiang
Optimal Digital Content Distribution Strategy In The Presence Of Consumer-To-Consumer Channel, Yunfang Feng, Zhiling Guo, Wei-Yu Kevin Chiang
Research Collection School Of Computing and Information Systems
Although the online business-to-consumer (B2C) channel is the primary selling channel for digital content (e.g., videos, images, and music), modern digital technology has made possible the legal dissemination of such content over the consumer-to-consumer (C2C) channel through personal computing devices, such as PCs, mobile phones, and portable media players. This paper investigates the optimal channel structure and the corresponding pricing and service strategies for digital content distribution in order to understand the business value of introducing the C2C channel alongside the prevailing B2C channel. We identify conditions under which it is more profitable to use both B2C and C2C channels …
Pricing Software Upgrades: The Role Of Product Improvement & User Costs, Ram Bala, Scott Carr
Pricing Software Upgrades: The Role Of Product Improvement & User Costs, Ram Bala, Scott Carr
Information Systems and Analytics
The computer software industry is an extreme example of rapid new product introduction. However, many consumers are sophisticated enough to anticipate the availability of upgrades in the future. This creates the possibility that consumers might either postpone purchase or buy early on and never upgrade. In response, many software producers offer special upgrade pricing to old customers in order to mitigate the effects of strategic consumer behavior. We analyze the optimality of upgrade pricing by characterizing the relationship between magnitude of product improvement and the equilibrium pricing structure, particularly in the context of user upgrade costs. This upgrade cost (such …
Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta
Document Sql (Dsql) - An Accessible Yet Comprehensive Ad-Hoc Querying Frontend For Xquery, Arijit Sengupta
ISSCM Faculty Publications
This article presents a declarative query language, Document SQL (DSQL) that has the same look and feel as SQL and was designed by updating the semantics of SQL operations in the structured document domain. At the same time, DSQL was designed such that all queries written in it have equivalent counterparts in XQuery. Thus, by using such a language, users can take advantage of their existing SQL knowledge when writing ad-hoc queries without losing the expressive power of XQuery.
A Life Cycle Perspective On Online Community Success, Alicia Iriberri '06, Gondy Leroy
A Life Cycle Perspective On Online Community Success, Alicia Iriberri '06, Gondy Leroy
CGU Faculty Publications and Research
Using the information systems lifecycle as a unifying framework, we review online communities research and propose a sequence for incorporating success conditions during initiation and development to increase their chances of becoming a successful community, one in which members participate actively and develop lasting relationships. Online communities evolve following distinctive lifecycle stages and recommendations for success are more or less relevant depending on the developmental stage of the online community. In addition, the goal of the online community under study determines the components to include in the development of a successful online community. Online community builders and researchers will benefit …
An Automation Algorithm For Harvesting Capital Market Information From The Web, Pankaj Agrrawal
An Automation Algorithm For Harvesting Capital Market Information From The Web, Pankaj Agrrawal
Finance Faculty Scholarship
The purpose of this paper is to develop an algorithm to harvest user specified information on finance portals and compile it into machine‐readable datasets for quantitative analysis. The Visual Basic macro language in Microsoft Excel is applied to develop code that is not constrained by the single‐query function of Excel. The core of the algorithm is built around the splitting of the URL connector line and the placement of a continuously updating variable into which are looped as many tickers as there are in the input list. The output is then written to non‐overlapping cells. Numerical information placed on major …
A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling
A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling
Scholarship and Professional Work - Business
One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and network implementation exercise that can be completed in one or two class periods in any classroom with Internet access. The objective of the exercise is for students to solve a business problem by applying concepts related to basic network configuration, local area networks …
The Impact Of A Computer Proficiency Exam On Business Students' Admission To And Performance In A Higher-Level It Course, Patrick Rondeau, Li Xiaolin
The Impact Of A Computer Proficiency Exam On Business Students' Admission To And Performance In A Higher-Level It Course, Patrick Rondeau, Li Xiaolin
Scholarship and Professional Work - Business
Many colleges of business now assume incoming freshmen arrive on campus possessing high levels of computer skill and ability. Students are frequently offered the opportunity to take and pass a computer proficiency exam (CPE) in lieu of a freshman information technology (IT) course. While promoted as an efficient alternative, our analysis of the implementation of a CPE as a replacement for the freshman IT course at a small, Midwestern university revealed mixed results. As expected, we found those students who took and passed the CPE generally scored higher in their follow-on, sophomore IT course than those who passed the prerequisite, …