Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2011

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 56

Full-Text Articles in Management Information Systems

The Impact Of Internet Health Information On Patient Compliance: The Role Of Perceived Information Asymmetry, John Laugesen, Khaled Hassanein, Yufei Yuan Dec 2011

The Impact Of Internet Health Information On Patient Compliance: The Role Of Perceived Information Asymmetry, John Laugesen, Khaled Hassanein, Yufei Yuan

Publications and Scholarship

In recent years, patients have been increasingly seeking and using Internet Health Information (IHI) to become more active in managing their own health in a partnership with their physicians. This trend has both positive and negative effects on the interactions and trust between the patient and physician. This study will examine the impact of patients’ use of IHI on various elements that characterize the interactions between a patient and her/his physician through the lens of Principal-Agent Theory. Specifically information asymmetry between the patient and physician and its relationships with the patient’s trust in and use of IHI, the patient’s trust …


Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Dec 2011

Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …


Comparing The Understandability Of Alternative Data Warehouse Schemas: An Empirical Study, David Schuff, Karen Corral, Ozgur Turetken Dec 2011

Comparing The Understandability Of Alternative Data Warehouse Schemas: An Empirical Study, David Schuff, Karen Corral, Ozgur Turetken

IT and Supply Chain Management Faculty Publications and Presentations

An easily understood data warehouse model enables users to better identify and retrieve its data. It also makes it easier for users to suggest changes to its structure and content. Through an exploratory, empirical study, we compared the understandability of the star and traditional relational schemas. The results of our experiment contradict previous findings and show schema type did not lead to significant performance differences for a content identification task. Further, the relational schema actually led to slightly better results for a schema augmentation task. We discuss the implications of these findings for data warehouse design and future research.


Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne Dec 2011

Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne

Research Collection School Of Computing and Information Systems

Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …


Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang Dec 2011

Alignment Within The Software Development Unit: Assessing Structural And Relational Dimensions Between Testing And Development, Jasbir Dhaliwal, Colin Onita, Robin Poston, Xihui Zhang

Faculty Publications

Just as business-IT alignment has received significant focus as a strategic concern in the IS literature, it is also important to consider internal alignment between the diverse subunits within the IT organization. This study investigates alignment between developers and testers in software development to understand alignment within the IT unit. Prior evidence of tension between these sub-groups (and others as well) suggests that all is not necessarily well within the IT organization. Misalignment within the IT unit can certainly make it difficult for the IT unit to add strategic value to the organization. This study is an important initial step …


New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn Dec 2011

New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …


Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo Nov 2011

Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo

Research Collection School Of Computing and Information Systems

Frequent new product release and technological uncertainty about the release time pose significant challenges for firms to manage successive generation of products. On the one hand, strategic consumers may delay their purchase decision and substitute the earlier generation with the newer generation product. On the other hand, the firm must fully anticipate consumer reactions and take into account the effect of their strategic behavior on product pricing and successive generation product diffusion. This paper proposes a prediction market to forecast new product release. We show that the market information aggregation mechanism can improve forecast accuracy of new product launch. Better …


Joint Logistics And Financial Services By A 3pl Firm, Xiangfeng Chen, Gangshu (George) Cai Nov 2011

Joint Logistics And Financial Services By A 3pl Firm, Xiangfeng Chen, Gangshu (George) Cai

Information Systems and Analytics

Integrated logistics and financial services have been practiced by third party logistics (3PL) firms for years; however, the literature has been silent on the value of 3PL firms as credit providers in budget-constrained supply chains. This paper investigates an extended supply chain model with a supplier, a budget-constrained retailer, a bank, and a 3PL firm, in which the retailer has insufficient initial budget and may borrow or obtain trade credit from either a bank (traditional role) or a 3PL firm (control role). Our analysis indicates that the control role model yields higher profits not only for the 3PL firm but …


An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko Nov 2011

An Exploration Of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, Myung Ko

Faculty and Research Publications

In this exploratory study we investigate differences in perception between management and staff with regard to overall information security risk management and human resources security risk management at two Fortune 500 companies. This study is part of a much larger study with regard to organizational information security issues. To our knowledge, this is the first time the issue of security risk management has been discussed in the context of human resource systems. We found significant differences between management and staff perceptions regarding overall security risk management and human resources security risk management. Our findings lay the ground work for future …


Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault Nov 2011

Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault

Research Collection School Of Computing and Information Systems

We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by …


Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen Nov 2011

Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen

Research Collection School Of Computing and Information Systems

We study the link between price points and price rigidity using two data sets: weekly scanner data and Internet data. We find that ‘‘9’’ is the most frequent ending for the penny, dime, dollar, and ten-dollar digits; the most common price changes are those that keep the price endings at ‘‘9’’; 9-ending prices are less likely to change than non-9-ending prices; and the average size of price change is larger for 9-ending than non-9- ending prices. We conclude that 9-ending contributes to price rigidity from penny to dollar digits and across a wide range of product categories, retail formats, and …


Measuring An Organisation’S Innovation Climate: A Case Study From Singapore, Siu Loon Hoe Oct 2011

Measuring An Organisation’S Innovation Climate: A Case Study From Singapore, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Purpose: The article aims to discuss the six key factors that were proposed and included in the design of a customized innovation climate questionnaire. Design/methodology/approach: The implementation case study of an innovation climate survey for a Singapore‐based real estate group is presented. In particular, the design of the questionnaire and selection of key factors to be measured are discussed. Findings: While not a “rigorous” instrument in the academic sense, the article can guide managers and organization development professionals to better gauge an organization's innovation climate and deepen the understanding of innovation culture. Originality/value: This article contributes to the existing innovation …


Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman Oct 2011

Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, Vaidyanathan Jayaraman

Faculty and Research Publications

Disputes and lawsuits are quite common in business and are often a source of significant liabilities. We conjecture that measurement challenges and lack of adequate analysis tools have greatly inhibited the ability of the General Counsel's offices in selecting the best mode for the resolution (i.e. litigation vs. out-of-court settlement) of business conflicts and disputes. Easily quantified direct costs (e.g., out-of-pocket expenses related to pursuing and defending against litigation) tend to be considered, whereas the more difficult-to-quantify indirect risks and costs (e.g., damaged relationships with customers and potential alliance partners, including reputational harm) which may be quite significant, tend to …


Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr. Oct 2011

Transformational Leadership And Workplace Injury And Absenteeism: Analysis Of A National Nursing Assistant Survey, Doohee Lee, Alberto Coustasse, Andrew Sikula Sr.

Management Faculty Research

Background: Transformational leadership (TL) has long been popular among management scholars and health services researchers, but no research studies have empirically tested the association of TL with workplace injuries and absenteeism among nursing assistants (NAs).

Purpose: This cross-sectional study seeks to explore whether TL is associated with workplace injuries and absenteeism among NAs.

Methodology: We analyzed the 2004 National Nursing Assistant Survey data (n = 2,882). A multivariate logistic regression analysis was performed to test the role of TL in the context of workplace performances.

Principal Findings: Results reveal that the TL model was positively linked to workplace injury …


Through A Fractured Lens: Women Entrepreneurs And The Private Equity Negotiation Process, Frances M. Amatucci, Ethne Swartz Sep 2011

Through A Fractured Lens: Women Entrepreneurs And The Private Equity Negotiation Process, Frances M. Amatucci, Ethne Swartz

Department of Information Management and Business Analytics Faculty Scholarship and Creative Works

Access to financial resources remains an important aspect of new venture start-up and growth strategies. While women still obtain a small amount of total private equity investment, they are increasingly involved in developing high growth ventures which may be attractive investment opportunities for venture capitalists and business angels. Contract, or term sheet, negotiation is an important stage of the investment process. Although gender-related differences in negotiation styles are well documented in other fields, they have not been examined in entrepreneurship. This research utilizes a mixed method study of gender and negotiation strategies employed during the private equity investment process.


Knowledge Management In A Project Environment: Organisational Ct And Project Influences, Taya Polyaninova Aug 2011

Knowledge Management In A Project Environment: Organisational Ct And Project Influences, Taya Polyaninova

Articles

During a project implementation various forms of information and experience are generated within the organization. If this accumulated knowledge is not recorded and shared amongst other projects, this knowledge will be lost and no longer be available to assist future projects. This may lead to increased future projects costs as resources, time and money will be wasted on redefining the knowledge that once existed within the company. By not capturing and redeploying this knowledge, the quality of a project’s deliverables may adversely suffer. First the publication reviews the concept of project knowledge management. It defines the reasons for managing project …


Isscm Graduating Cohort, August 2011, Raj Soin College Of Business, Wright State University Aug 2011

Isscm Graduating Cohort, August 2011, Raj Soin College Of Business, Wright State University

ISSCM Master Cohort Posters

No abstract provided.


E-Textbooks: Is Now The Right Time?, Shu Z. Schiller Aug 2011

E-Textbooks: Is Now The Right Time?, Shu Z. Schiller

ISSCM Faculty Publications

Don’t be surprised when you see NOOK and iPads sitting along the side of books in campus bookstores this fall. Among numerous types of digital tools and technologies used in classrooms today, e-textbooks seem to be the next rising star. In the arena of higher education, educators have long been using digital materials and tools for teaching and learning. Many universities have adopted campus-wide online course management applications such as products from BlackBoard and Desire2Learn. Online meeting tools such as GoToMeeting, Elluminate, and Adobe Connect have now transformed the traditional delivery of teaching and lecturing to a synchronized, real-time interaction …


Mis 7900 Capstone: 2011 Summer Cohort List, Raj Soin College Of Business, Wright State University Jul 2011

Mis 7900 Capstone: 2011 Summer Cohort List, Raj Soin College Of Business, Wright State University

Master of Information Systems Capstone Executive Summary

Available for download is a list of the 2011 Summer Cohorts, complete with student names, project titles, and faculty advisor names.


Outpacing Moore’S Law: Information Technology’S Role As An Enabler, Kevin P. Duffy Jul 2011

Outpacing Moore’S Law: Information Technology’S Role As An Enabler, Kevin P. Duffy

ISSCM Faculty Publications

Technology is widely recognized as an enabler of business models. When the Web appeared in the 1990s, businesses redesigned the ways in which they interacted with their customers. They became global, rather than local, and the world represented an expanded customer base. While the Web has become a fact of life since the 1990s, technology has not lost its ability to introduce new ways of enabling organizations to provide and create value for their customers, as new and inventive ways of interacting with customers continue to appear.


Team Collaboration In Virtual Worlds: The Role Of Task Complexity, Parichart Sattayanuwat Jul 2011

Team Collaboration In Virtual Worlds: The Role Of Task Complexity, Parichart Sattayanuwat

College of Business: Dissertations, Theses, and Student Research

Virtual worlds are three-dimensional, computer-generated worlds where team collaboration can be facilitated through the use of shared virtual space and mediated using avatars. In this study, we examined the effect of task complexity on team collaboration. We used a puzzle game in Second Life as the collaborative task and manipulated task component complexity by varying the number of pieces in the puzzle. We hypothesized that task complexity would influence team trust, team process satisfaction, and one‘s attraction to the team in virtual team collaboration. The experimental results indicate that task complexity has significant effects on team trust and team process …


End-User Computing Applications, Mary C. Hill, W. Alan Barnes Jul 2011

End-User Computing Applications, Mary C. Hill, W. Alan Barnes

Faculty and Research Publications

Businesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in these applications has been increased by the requirements of the Sarbanes-Oxley Act of 2002, which call for management to document end-to-end financial operations and internal control structures. This article review …


Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort Jun 2011

Audit Committees Oversight Of Information Technology Risk, Linda M. Hadden, Dana Hermanson, F. Todd Dezoort

Faculty and Research Publications

This exploratory study examines the role of the audit committee in overseeing information technology (IT) risk. We address the degree of audit committee oversight of specific IT risks, as well as factors associated with variations in audit committee IT oversight. Based on responses from 39 audit committee members, we found (1) little audit committee emphasis on oversight of IT risks, (2) audit committees involved with IT oversight focus on more traditional risks (e.g., monitoring), while very little attention is devoted to IT acquisition and implementation, and (3) the amount of IT oversight is positively associated with the responding members auditing …


Cio Reporting Structure, Strategic Positioning, And Firm Performance, Rajiv D Banker, Nan Hu, Paul A Pavlou, Jerry Luftman Jun 2011

Cio Reporting Structure, Strategic Positioning, And Firm Performance, Rajiv D Banker, Nan Hu, Paul A Pavlou, Jerry Luftman

Research Collection School Of Computing and Information Systems

Almost 30 years after the introduction of the CIO position, the ideal CIO reporting structure (whether the CIO should report to the CEO or the CFO) is yet to be identified. There is an intuitive assumption among some proponents of IT that the CIO should always report to the CEO to promote the importance of IT and the CIO's clout in the firm, while some adversaries of IT call for a CIO—CFO reporting structure to keep a tab on IT spending. However, we challenge these two ad hoc prescriptions by arguing that neither CIO reporting structure is necessarily optimal, and …


Security Assurance: How Online Service Providers Can Influence Security Control Perceptions And Gain Trust, Soumya Ray, Terence T. Ow, Sung S. Kim May 2011

Security Assurance: How Online Service Providers Can Influence Security Control Perceptions And Gain Trust, Soumya Ray, Terence T. Ow, Sung S. Kim

Management Faculty Research and Publications

Security researchers agree that security control is a difficult to observe credence quality of online services that Internet users cannot easily assess through research or experience. Yet there is evidence that users form perceptions of security control that strongly determine how much trust they put in online services. This study investigates whether users’ security control perceptions arise solely from their predispositions or whether online service providers can influence them. The study also examines whether these seemingly undependable perceptions of security control lead to trust or whether more traditional factors might offer a better explanation of trust under security risks. To …


Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta Apr 2011

Assessing Differences Between Physician's Realized And Anticipated Gains From Electronic Health Record Adoption, Lori T. Peterson, Eric W. Ford, John Eberhardt, T. R. Huerta

Business Faculty Publications

Return on investment (ROI) concerns related to Electronic Health Records (EHRs) are a major barrier to the technology’s adoption. Physicians generally rely upon early adopters to vet new technologies prior to putting them into widespread use. Therefore, early adopters’ experiences with EHRs play a major role in determining future adoption patterns. The paper’s purposes are: (1) to map the EHR value streams that define the ROI calculation; and (2) to compare Current Users’ and Intended Adopters’ perceived value streams to identify similarities, differences and governing constructs. Primary data was collected by the Texas Medical Association, which surveyed 1,772 physicians on …


Confidence Weighted Mean Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Peilin Zhao, Vivek Gopalkrishnan Apr 2011

Confidence Weighted Mean Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Peilin Zhao, Vivek Gopalkrishnan

Research Collection School Of Computing and Information Systems

On-line portfolio selection has been attracting increasing attention from the data mining and machine learning communities. All existing on-line portfolio selection strategies focus on the first order information of a portfolio vector, though the second order information may also be beneficial to a strategy. Moreover, empirical evidences show that the stock price relatives may follow the mean reversion property, which has not been fully exploited by existing strategies. This article proposes a novel on-line portfolio selection strategy named ``Confidence Weighted Mean Reversion'' (CWMR). Inspired by the mean reversion principle in finance and confidence weighted online learning technique in machine learning, …


Action Learning: Reflections Of A First-Time Coach, Siu Loon Hoe Apr 2011

Action Learning: Reflections Of A First-Time Coach, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

PurposeIn recent years, action learning has been widely adopted as a problem solving and leadership development tool. The purpose of the article is to reflect on key learning points when initiating action learning sessions and provide tips on what to expect from such sessions.Design/methodology/approachDocumentation of the author's initial first‐hand action learning coaching experience and sharing of lessons learnt in organizing and coaching action learning sessions.FindingsThe paper offers a view on how action learning practitioners can overcome initial coaching issues to run more effective sessions.Originality/valueThis article contributes to the existing action learning literature by providing a deeper understanding of key factors …


How Information Management Capability Influences Firm Performance, Sunil Mithas, Narayan Ramasubbu, V. Sambamurthy Mar 2011

How Information Management Capability Influences Firm Performance, Sunil Mithas, Narayan Ramasubbu, V. Sambamurthy

Research Collection School Of Computing and Information Systems

How do information technology capabilities contribute to firm performance? This study develops a conceptual model linking IT-enabled information management capability with three important organizational capabilities (customer management capability, process management capability, and performance management capability). We argue that these three capabilities mediate the relationship between information management capability and firm performance. To test our conceptual model, we use a rare archival data set that contains actual scores from multidimensional and high-quality assessments of firms and intraorganizational units of a conglomerate business group that had adopted a model of performance excellence for organizational transformation based on the Baldrige criteria. This research …


The Effects Of Decision Aid Structural Restrictiveness On Decision-Making Outcomes, Poh Sun Seow Mar 2011

The Effects Of Decision Aid Structural Restrictiveness On Decision-Making Outcomes, Poh Sun Seow

Research Collection School Of Accountancy

Decision aids are often designed to direct decision-makers' attention to potential problems or solutions prompted by the decision aid; but in most instances, it is impossible to prompt all possible issues that should be considered in making a decision. Decision aids can induce decision-making biases whereby users focus only on the issues identified by the decision aid and fail to adequately consider other issues that are not identified by the decision aid. The purpose of this study is to investigate whether restricting how users interact with computerized decision aids affects their performance by limiting their ability to consider other possible …