Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business Administration, Management, and Operations (19)
- E-Commerce (18)
- Technology and Innovation (17)
- Computer Sciences (6)
- Databases and Information Systems (6)
-
- Physical Sciences and Mathematics (6)
- Engineering (3)
- Education (2)
- Electrical and Computer Engineering (2)
- Education Economics (1)
- Educational Methods (1)
- Human Resources Management (1)
- Library and Information Science (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Performance Management (1)
- Social and Behavioral Sciences (1)
- Systems and Communications (1)
- Institution
-
- California State University, San Bernardino (17)
- SelectedWorks (15)
- New Jersey Institute of Technology (6)
- Air Force Institute of Technology (4)
- Edith Cowan University (3)
-
- San Jose State University (2)
- Selected Works (2)
- Butler University (1)
- Jaipuria Institute of Management (1)
- James Madison University (1)
- Kennesaw State University (1)
- Louisiana Tech University (1)
- Missouri University of Science and Technology (1)
- Singapore Management University (1)
- University of Nebraska at Kearney (1)
- University of Nevada, Las Vegas (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Computer (17)
- Evolution (17)
- Information (17)
- Information management (17)
- Arbeitspapier (9)
-
- Wissenschaftliche Zeitschriften (6)
- Information technology (3)
- Delphi method (2)
- Information resources management (2)
- Knowledge management (2)
- Portal (2)
- Refereed Articles (2)
- Texpros (2)
- Approximate Location Adjacency (1)
- Architektur (1)
- Artikel (Zeitung etc.) (1)
- Attack (1)
- Australia (1)
- Behavioral constructs (1)
- Business Collaboration Infrastructure (1)
- Business games (1)
- Business technology (1)
- Business – Study and teaching (1)
- Case study (1)
- Classification scheme (1)
- Collaboration (1)
- Computer-assisted decision-making tools (1)
- Consonance (1)
- Content Management (1)
- Contracting out (1)
- Publication
-
- Hubert Oesterle (17)
- Journal of International Information Management (17)
- Dissertations (5)
- Theses and Dissertations (5)
- Research outputs pre 2011 (2)
-
- Business and Information Technology Faculty Research & Creative Works (1)
- Doctoral Dissertations (1)
- Faculty Publications, Information Systems & Technology (1)
- Faculty and Research Publications (1)
- G. Kent Webb (1)
- Libraries (1)
- Management Dynamics (1)
- Management, Entrepreneurship and Technology Faculty Publications (1)
- Mountain Plains Journal of Business and Technology (1)
- Research Collection Lee Kong Chian School Of Business (1)
- Scholarship and Professional Work - Business (1)
- Theses (1)
- Theses: Doctorates and Masters (1)
- Publication Type
- File Type
Articles 31 - 59 of 59
Full-Text Articles in Management Information Systems
Kundenprozess-Portale, Hubert Oesterle
The Evolution Of Manufacturing Planning And Control Systems: From Reorder Point To Enterprise Resource Planning., Patrick Rondeau, L. A. Litteral
The Evolution Of Manufacturing Planning And Control Systems: From Reorder Point To Enterprise Resource Planning., Patrick Rondeau, L. A. Litteral
Scholarship and Professional Work - Business
Manufacturing planning and control (MPC) systems have existed since the earliest days of the industrial revolution. To gain a historical perspective, it is useful to look at the evolution of these systems. Five major stages were involved: reorder point (ROP) systems, materials requirement planning (MRP) systems, manufacturing resource planning (MRP-II) systems, MRP-II with manufacturing execution systems (MES), and enterprise resource planning systems (ERP) with MES. When examined in detail, each stage represents the next logical step in manufacturing philosophy and technological innovation over the preceding stage.
The Roles Of Computer Self-Efficacy, Outcome Expectancy, And Attribution Theory In Impacting Computer System Use, John W. Henry, Robert W. Stone
The Roles Of Computer Self-Efficacy, Outcome Expectancy, And Attribution Theory In Impacting Computer System Use, John W. Henry, Robert W. Stone
Journal of International Information Management
TJte process by which individuals accept or reject information technologies was theoretically explained in a model employing attributional relationships and computer self-ejficacy and outcome expectancy. The model was empirically tested using structural equations modeling and data collected in afield setting. The results provided partial confiirmation of the theory that attributions to ability, effort, luck, and task difficulty impact information system use mediated by computer self-ejficacy and outcome expectancy. The stable attributions of ability and task difficulty had meaningful impacts on computer self-ejficacy. Similarly, task difficulty had a meaningful impact on outcome expectancy. The unstable attributes of effort and luck demonstrated …
A Fuzzy Expert System For Small Business Loan Processing, Vipul K. Gupta, Serkan Celtek
A Fuzzy Expert System For Small Business Loan Processing, Vipul K. Gupta, Serkan Celtek
Journal of International Information Management
In recent years, managerial applications of artificial intelligence, especially in the area of financial services, has received considerable attention. In this paper, a fiizzy logic expert system is developed for approvals of small business loans. Previous studies have used non-fuzzv expert systems. But the fuzzification of the variables used in a business loan approval decisionmaking promises more efficient results. Furthermore, another distinct feature of this paper is its focus on small business loans. CubiCalc fuzzy expert system shell is used to develop the expert system. Knowledge acquisition is made using the resources and expertise of a Small Business Development Center. …
Analyzing And Documenting An Internet Website Using Notecards, Jay M. Lightfoot
Analyzing And Documenting An Internet Website Using Notecards, Jay M. Lightfoot
Journal of International Information Management
Corporate websites are an important component in the world-wide web. The traditional way of creating these websites leads to a variety of structural problems that reduce the effectiveness of the websites. These problems are difficult to locate and correct using the ad hoc analysis methods that currently exist. This paper introduces a new technique to analyze and document websites. The technique uses the NoteCards hypertext environment to build a visual model of the website. The model is semantically rich, dynamically extensible, and allows interactive update. The result of using this technique is a website that is easier to use, easier …
Female Entrepreneur Underperformance: A Puzzle For The Information Age, Sherry Robinson, John Watson
Female Entrepreneur Underperformance: A Puzzle For The Information Age, Sherry Robinson, John Watson
Journal of International Information Management
Women entrepreneurs are a significant and fast-growing force in small business, yet many studies have concluded that their businesses underperfomi men's in terms of sales and size. As both women entrepreneurs and e-commerce become increasingly important parts of the Information Age economy, it is essential to determine if there are differences in success between women- and men-owned businesses, and how those differences, if any, relate to e-commerce. This paper examines the apparent underperformance of women-owned businesses and proposes a number of hypotheses for future research.
Students' Perceptions Of A Course Dedicated Website A Regression Analysis To Predict Its Use, Malini Krishnamurthi
Students' Perceptions Of A Course Dedicated Website A Regression Analysis To Predict Its Use, Malini Krishnamurthi
Journal of International Information Management
There has been an unprecedented surge in the number of web related tools used for course delivery. This paper examined the reasons for students to go to course dedicated websites and the impact these sites have on classroom attendance. An empirical assessment shows that course dedicated websites enhance learning and do not tempt students to turn away from the classroom. A software program called Zlocker which gives students and teachers an opportunity to share a locker in cyberspace was incorporated in the courses that were examined in this study.
A Computer-Based Application For Core Course Outcomes Assessment And Program Continuous Improvement Using An Integrative Business Plan — An Empirical Evaluation, Donald Drost, John Chaney
A Computer-Based Application For Core Course Outcomes Assessment And Program Continuous Improvement Using An Integrative Business Plan — An Empirical Evaluation, Donald Drost, John Chaney
Journal of International Information Management
Outcomes assessment and continuous program improvement has become an increasingly important topic in higher education. ASCSB and governmental bodies often require this type of self-analysis. This paper presents and examines a model of business common core course assessment and improvement using an integrated business plan in the upper division strategic management capstone course. An emphasis is placed demonstrating how computer and information technology is used for instruction and as a means for outcomes assessment. Also, an evaluation of empirical data developed over a one-year period is presented. The manuscript also reflects on some of the problems and issues engendered by …
Adapting E-Business To The Undergraduate Entrepreneurship Curriculum In The New Economy: Development Of An E-Husiness Course With A Focus On Field-Based Projects, Peter H. Hackbert
Adapting E-Business To The Undergraduate Entrepreneurship Curriculum In The New Economy: Development Of An E-Husiness Course With A Focus On Field-Based Projects, Peter H. Hackbert
Journal of International Information Management
Organization creation separates entrepreneurship from other disciplines. In today's rapidly growing net economy and ever-changing entrepreneurial environment, discovering the behaviors of individuals who create new organizations, and observing the behaviors or organizational personnel who exploit new market opportunities within existing organizations are the foci of the behavioral school of entrepreneurship. Business schools that adapt curricula to examine the kinds of activities entrepreneurs perform, the information they process, with whom they must work, where, and how frequently may help describe the emerging needs of the current dynamic new economy. The following paper describes the development of an e-business entrepreneurship course with …
Taking Payments Online: A Framework For Selection, Binshan Lin, Charlotte Jones
Taking Payments Online: A Framework For Selection, Binshan Lin, Charlotte Jones
Journal of International Information Management
Electronic bill presentment and payment (EBPP) is usually viewed as a "killer application" in e-commerce, which will fundamentally change the way customers receive and pay their bills. While many models exist, there is a dearth of information for determining which model would best fit customer characteristics and needs. This paper examines primary models, customer requirements, bill characteristics, and customer types to develop an exploratory framework for determviing which EBPP model a bill-generating firm should employ.
Enhancing Organizational Performance Via Electronic Customer Relationship Management, Santosh S. Venkatraman
Enhancing Organizational Performance Via Electronic Customer Relationship Management, Santosh S. Venkatraman
Journal of International Information Management
An Electronic Customer Relationship Management system or eCRM helps organizations shift from mass marketing of goods and services to customized marketing of personalized offers. As consumers are constantly getting more technologically savvy and sophisticated, eCRM systems allow businesses to tune-in to their customers' needs and design appropriate personalized marketing campaigns. They not only allow more intelligent customer interactions and responses, but also do it in a cost effective manner. The primary purpose of this paper is to explain the eCRM concept and describe the major organizational benefits of eCRM.
User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower
User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower
Journal of International Information Management
Given the large time and fitiancial commitment that an ERP project requires and the potential benefits it can offer if successfidly implemented, it is important to understand the factors that facilitate and inhibit the success ofEP,P implementation. By means of a case study of a global energy company, we first examine the factors that facilitate and inhibit the success of their ERP implementation. We draw on the theory of business process change when analyzing the implementation process. Next, we examine the perceptions non-management professional users of the ERP system (who were not members of the ERP implementation team) have of …
Managerial Information, The Basics, Floyd J. Brock, Gurpreet S. Dhillon
Managerial Information, The Basics, Floyd J. Brock, Gurpreet S. Dhillon
Journal of International Information Management
A problem exists in the defitiition of information, particularly in its application in management. The problem emerges from the inability of academics and practitioners alike to differentiate adequately between data and information. Our failure to comprehend the concept of information casts doubt on the efficacy of analyses and development of information systems. As evidenced in the literature and surveys, this paper presents a collection of differing emphases in definitions of information. It then sifts for the basics and proposes a definition of managerial information.
New Concepts In Password Management, S. E. Kruck, John R. Sciandra, Karen A. Forcht
New Concepts In Password Management, S. E. Kruck, John R. Sciandra, Karen A. Forcht
Journal of International Information Management
Passwords have been used for many years in the security of computer systems. The password mechanism has not changed in recent years and has several inherent security problems. This paper examines several password problems including sniffers, dictionary and brute force attacks. A specific Department of Defense incident is cited to illustrate a method to thwart sniffers followed by several suggestions intended to increase the security of the password process.
A Value-Oriented Model In Technology For Business Personnel, Mabel T. Kung, Dag Naslund
A Value-Oriented Model In Technology For Business Personnel, Mabel T. Kung, Dag Naslund
Journal of International Information Management
In this paper a process-based framework is presented for end-user development of software applications. The paper discusses the changes of the education of systems for general users to design their own systems. Guidelines and people issues identify ways to help traditional users in developing systems computing to be successful.
Decision Support System And Design For Reverse Logistics, Bajis Dodin, Mohsen Elhafsi
Decision Support System And Design For Reverse Logistics, Bajis Dodin, Mohsen Elhafsi
Journal of International Information Management
This paper studies the relative positions of some selected elements in relations to flexibility and cost factors in information system and logistics design settings. Moreover, this study investigates the extent to which organizations can relate, today, to the importance of information technology in logistics and design for reverse logistics in their operational planning and activities. The findings show the degree of their in terest and policies for reverse logistics, and the creation of joint efforts to reduce costs and to increase flexibility.
An Integrated Spatial Dss For Site Selection For Service Organizations In Developing Countries, Mehdi Beheshtian
An Integrated Spatial Dss For Site Selection For Service Organizations In Developing Countries, Mehdi Beheshtian
Journal of International Information Management
An Integrated Spatial Decision Support System (ISDSS) is developed for finding locations where people can access post offices with minimum travel time between their residences and the post offices and their next destinations. Location-allocation models may be used to determine sites for these transshipment nodes. Due to the nature of traffic and unstructured zoning and all other non-predictable variables, network models may not be applied to find the optimal solution. Instead a gravity model is used to find a solution, which both minimizes the number of post offices and minimizes before-and-after travel times. The result of this system is a …
Describing Intelligent Agent Behaviors, Walt Truszkowski, Jagannathan V. Iyengar, Fred Mills
Describing Intelligent Agent Behaviors, Walt Truszkowski, Jagannathan V. Iyengar, Fred Mills
Journal of International Information Management
The development of new intelligent agents requires an interdisciplinary approach to programming. The initial challenge is to describe the desired agent behaviors and abilities without necessarily committing the agent development project to one particular programming language. What are the appropriate linguistic and logical tools for creating a top level, unambiguous, program-independent, and consistent description of the functions and behaviors of the agent? And how can that description then be translated easily into one of a number of program languages? This article provides a case study of the application of a simple Belief, Desire, and Intention (EDI) first order logic to …
Physical Security Models, Philosophies, And Context, Karen A. Forcht, S. E. Kruck
Physical Security Models, Philosophies, And Context, Karen A. Forcht, S. E. Kruck
Journal of International Information Management
This paper presents physical security of a computer facility within the context of a corporate environment. The context is established from several different perspectives. It first presents physical security philosophies and illustrates the philosophies via the Onion and Garlic Models. It defines a process for identifying and describing transition strategies between security levels. Once the models are defined, a Macro View of physical security is presented. This view discusses physical security goals and critical factors such as budget, monitoring and redundancy. With this context established, the Micro View is presented. Its focus is on information technology (IT) facilities that protect …
Advanced Information Systems: Impact On Organizational Reality, Rolf D. Dixon
Advanced Information Systems: Impact On Organizational Reality, Rolf D. Dixon
Mountain Plains Journal of Business and Technology
Today, with the proliferation of increasingly advanced information technologies in organizations, a significant challenge can be made to the traditional assumptions regarding the non-rationality of organizational behavior. It is the purpose of this paper to consider the effects of advanced information technologies on the spatial, structural, social, and informational processes of the organization and to suggest how this could, in fact, signal a return to the “rational” organization. This paper will consider the issue of organizational rationality in a normative manner with several propositions offered.
Vom Elektronischen Schaufenster Zum Prozessportal, Elgar Fleisch, Hubert Oesterle
Vom Elektronischen Schaufenster Zum Prozessportal, Elgar Fleisch, Hubert Oesterle
Hubert Oesterle
No abstract provided.
Flowers For The World: Developing A Business Game To Support The Teaching Of Is Concepts, Trevor T. Moores, Jerry Cha-Jan Chang
Flowers For The World: Developing A Business Game To Support The Teaching Of Is Concepts, Trevor T. Moores, Jerry Cha-Jan Chang
Management, Entrepreneurship and Technology Faculty Publications
One of the key problems in teaching fundamental concepts in information systems is how to ground the theory in experiences that the students can relate to. To overcome this problem, a business game called Flowers For The World has been developed and used across a wide variety of IS courses. This paper will describe the game and the result of using it for a 300-level course in analysis and design. The possibility exists that the game could be developed to provide a common business foundation across all business school curricula.
A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn
A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn
Research outputs pre 2011
This paper looks at the implementation of a new customer value alliance model in e-govemment. Firstly we review the issues of e-govemment and the drive towards customer centric organisations in the context of multiple government agencies. A model of e-Government is introduced and examined within the context of a virtual organisation model which can be applied along the customer value chain across multiple service agencies. A case study is used to demonstrate how this concept of a virtual organisation as a customer value-alliance model can effect a successful transition to e-Govemment from a traditional Government model. Finally, we examine how …
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli
Research outputs pre 2011
Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.
Integrating Traditional Research-Journal Based Sources With Trade And Web-Based Sources In Coursework, Kathy E. Clarke, Harry L. Reif Dr.
Integrating Traditional Research-Journal Based Sources With Trade And Web-Based Sources In Coursework, Kathy E. Clarke, Harry L. Reif Dr.
Libraries
Due to the rapidly changing nature of telecommunications, it is challenging to be able to introduce timely topics into this curriculum. At the same time, educators are challenged with preparing students to function in the workplace where change is a given, as on average workers spend an average of 9.25 hours per week looking for or analyzing data [4]. Initiatives to keep instruction relevant and prepare students to be information literate mandate that students be able to discover, digest, and put into context new information about technologies. This skill is developed and enhanced through the use of research projects. This …
Development Of A Theoretical Model Based Upon Factors Influencing A Firm's Suitability For Organizational Evolution, Ronald T. Sones
Development Of A Theoretical Model Based Upon Factors Influencing A Firm's Suitability For Organizational Evolution, Ronald T. Sones
Theses and Dissertations
Early motion pictures resembled theatre productions on film. Decades would pass before the techniques of special effects and editing evolved to provide the type of movie often shown today. Similarly, early television looked like a radio show where the audience could observe the speakers. Ford's Model T, a "horse-less" carriage. seemed to be designed for a harness. In these examples, successful companies learned how to harness and exploit the power of new technologies--others companies became victims. Companies of the current economy must recognize they face a similar watershed. According to Tom Stewart, the economy effectively transitioned into the Information Age …
From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb
From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb
G. Kent Webb
An increasing proportion of e-business and other network traffic moves over optical networks which provide higher capacity, speed, and security than electrical networks. An all optical network and even optical computing has been envisioned for 20 years, but technical characteristics of optical components have limited applications to the high end of networking, typically for speeds above 2.5 Gbps. While a fundamental advance in physics may be required for the implementation of an all-optical network, optics continues a steady advance into the network infrastructure. This paper describes the technical evolution of optical systems and examines the changing cost structure of optical …
From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb
From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb
Faculty Publications, Information Systems & Technology
An increasing proportion of e-business and other network traffic moves over optical networks which provide higher capacity, speed, and security than electrical networks. An all optical network and even optical computing has been envisioned for 20 years, but technical characteristics of optical components have limited applications to the high end of networking, typically for speeds above 2.5 Gbps. While a fundamental advance in physics may be required for the implementation of an all-optical network, optics continues a steady advance into the network infrastructure. This paper describes the technical evolution of optical systems and examines the changing cost structure of optical …
Information Systems Development And Practice In Organisations In Sri Lanka : An In-Depth Case Study, Sunil G. Rajapaksege
Information Systems Development And Practice In Organisations In Sri Lanka : An In-Depth Case Study, Sunil G. Rajapaksege
Theses: Doctorates and Masters
This thesis describes an investigation of information systems development and practice in a privatised state owned enterprise (North-West Cement Company Limited or NWCL) in Sri Lanka between J95M-2000. The objectives of my study were: (1) to understand the approaches used by NWCL for information systems development; (2) to understand how these approaches relate to the organisational, socio-cultural, economic and political realities of organisations in Sri Lanka; (3) to outline a theory to better understand information systems development and practice for organisations in Sri Lanka; and (4) to make recommendations which could be used to improve information systems development and practice …