Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2001

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 59 of 59

Full-Text Articles in Management Information Systems

Kundenprozess-Portale, Hubert Oesterle Jan 2001

Kundenprozess-Portale, Hubert Oesterle

Hubert Oesterle

No abstract provided.


The Evolution Of Manufacturing Planning And Control Systems: From Reorder Point To Enterprise Resource Planning., Patrick Rondeau, L. A. Litteral Jan 2001

The Evolution Of Manufacturing Planning And Control Systems: From Reorder Point To Enterprise Resource Planning., Patrick Rondeau, L. A. Litteral

Scholarship and Professional Work - Business

Manufacturing planning and control (MPC) systems have existed since the earliest days of the industrial revolution. To gain a historical perspective, it is useful to look at the evolution of these systems. Five major stages were involved: reorder point (ROP) systems, materials requirement planning (MRP) systems, manufacturing resource planning (MRP-II) systems, MRP-II with manufacturing execution systems (MES), and enterprise resource planning systems (ERP) with MES. When examined in detail, each stage represents the next logical step in manufacturing philosophy and technological innovation over the preceding stage.


The Roles Of Computer Self-Efficacy, Outcome Expectancy, And Attribution Theory In Impacting Computer System Use, John W. Henry, Robert W. Stone Jan 2001

The Roles Of Computer Self-Efficacy, Outcome Expectancy, And Attribution Theory In Impacting Computer System Use, John W. Henry, Robert W. Stone

Journal of International Information Management

TJte process by which individuals accept or reject information technologies was theoretically explained in a model employing attributional relationships and computer self-ejficacy and outcome expectancy. The model was empirically tested using structural equations modeling and data collected in afield setting. The results provided partial confiirmation of the theory that attributions to ability, effort, luck, and task difficulty impact information system use mediated by computer self-ejficacy and outcome expectancy. The stable attributions of ability and task difficulty had meaningful impacts on computer self-ejficacy. Similarly, task difficulty had a meaningful impact on outcome expectancy. The unstable attributes of effort and luck demonstrated …


A Fuzzy Expert System For Small Business Loan Processing, Vipul K. Gupta, Serkan Celtek Jan 2001

A Fuzzy Expert System For Small Business Loan Processing, Vipul K. Gupta, Serkan Celtek

Journal of International Information Management

In recent years, managerial applications of artificial intelligence, especially in the area of financial services, has received considerable attention. In this paper, a fiizzy logic expert system is developed for approvals of small business loans. Previous studies have used non-fuzzv expert systems. But the fuzzification of the variables used in a business loan approval decisionmaking promises more efficient results. Furthermore, another distinct feature of this paper is its focus on small business loans. CubiCalc fuzzy expert system shell is used to develop the expert system. Knowledge acquisition is made using the resources and expertise of a Small Business Development Center. …


Analyzing And Documenting An Internet Website Using Notecards, Jay M. Lightfoot Jan 2001

Analyzing And Documenting An Internet Website Using Notecards, Jay M. Lightfoot

Journal of International Information Management

Corporate websites are an important component in the world-wide web. The traditional way of creating these websites leads to a variety of structural problems that reduce the effectiveness of the websites. These problems are difficult to locate and correct using the ad hoc analysis methods that currently exist. This paper introduces a new technique to analyze and document websites. The technique uses the NoteCards hypertext environment to build a visual model of the website. The model is semantically rich, dynamically extensible, and allows interactive update. The result of using this technique is a website that is easier to use, easier …


Female Entrepreneur Underperformance: A Puzzle For The Information Age, Sherry Robinson, John Watson Jan 2001

Female Entrepreneur Underperformance: A Puzzle For The Information Age, Sherry Robinson, John Watson

Journal of International Information Management

Women entrepreneurs are a significant and fast-growing force in small business, yet many studies have concluded that their businesses underperfomi men's in terms of sales and size. As both women entrepreneurs and e-commerce become increasingly important parts of the Information Age economy, it is essential to determine if there are differences in success between women- and men-owned businesses, and how those differences, if any, relate to e-commerce. This paper examines the apparent underperformance of women-owned businesses and proposes a number of hypotheses for future research.


Students' Perceptions Of A Course Dedicated Website A Regression Analysis To Predict Its Use, Malini Krishnamurthi Jan 2001

Students' Perceptions Of A Course Dedicated Website A Regression Analysis To Predict Its Use, Malini Krishnamurthi

Journal of International Information Management

There has been an unprecedented surge in the number of web related tools used for course delivery. This paper examined the reasons for students to go to course dedicated websites and the impact these sites have on classroom attendance. An empirical assessment shows that course dedicated websites enhance learning and do not tempt students to turn away from the classroom. A software program called Zlocker which gives students and teachers an opportunity to share a locker in cyberspace was incorporated in the courses that were examined in this study.


A Computer-Based Application For Core Course Outcomes Assessment And Program Continuous Improvement Using An Integrative Business Plan — An Empirical Evaluation, Donald Drost, John Chaney Jan 2001

A Computer-Based Application For Core Course Outcomes Assessment And Program Continuous Improvement Using An Integrative Business Plan — An Empirical Evaluation, Donald Drost, John Chaney

Journal of International Information Management

Outcomes assessment and continuous program improvement has become an increasingly important topic in higher education. ASCSB and governmental bodies often require this type of self-analysis. This paper presents and examines a model of business common core course assessment and improvement using an integrated business plan in the upper division strategic management capstone course. An emphasis is placed demonstrating how computer and information technology is used for instruction and as a means for outcomes assessment. Also, an evaluation of empirical data developed over a one-year period is presented. The manuscript also reflects on some of the problems and issues engendered by …


Adapting E-Business To The Undergraduate Entrepreneurship Curriculum In The New Economy: Development Of An E-Husiness Course With A Focus On Field-Based Projects, Peter H. Hackbert Jan 2001

Adapting E-Business To The Undergraduate Entrepreneurship Curriculum In The New Economy: Development Of An E-Husiness Course With A Focus On Field-Based Projects, Peter H. Hackbert

Journal of International Information Management

Organization creation separates entrepreneurship from other disciplines. In today's rapidly growing net economy and ever-changing entrepreneurial environment, discovering the behaviors of individuals who create new organizations, and observing the behaviors or organizational personnel who exploit new market opportunities within existing organizations are the foci of the behavioral school of entrepreneurship. Business schools that adapt curricula to examine the kinds of activities entrepreneurs perform, the information they process, with whom they must work, where, and how frequently may help describe the emerging needs of the current dynamic new economy. The following paper describes the development of an e-business entrepreneurship course with …


Taking Payments Online: A Framework For Selection, Binshan Lin, Charlotte Jones Jan 2001

Taking Payments Online: A Framework For Selection, Binshan Lin, Charlotte Jones

Journal of International Information Management

Electronic bill presentment and payment (EBPP) is usually viewed as a "killer application" in e-commerce, which will fundamentally change the way customers receive and pay their bills. While many models exist, there is a dearth of information for determining which model would best fit customer characteristics and needs. This paper examines primary models, customer requirements, bill characteristics, and customer types to develop an exploratory framework for determviing which EBPP model a bill-generating firm should employ.


Enhancing Organizational Performance Via Electronic Customer Relationship Management, Santosh S. Venkatraman Jan 2001

Enhancing Organizational Performance Via Electronic Customer Relationship Management, Santosh S. Venkatraman

Journal of International Information Management

An Electronic Customer Relationship Management system or eCRM helps organizations shift from mass marketing of goods and services to customized marketing of personalized offers. As consumers are constantly getting more technologically savvy and sophisticated, eCRM systems allow businesses to tune-in to their customers' needs and design appropriate personalized marketing campaigns. They not only allow more intelligent customer interactions and responses, but also do it in a cost effective manner. The primary purpose of this paper is to explain the eCRM concept and describe the major organizational benefits of eCRM.


User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower Jan 2001

User Perceptions Of The Benefits Of Implementing An Erp System: A Case Study, Jaideep Motwani, Dinesh Mirchandani, Victor E. Sower

Journal of International Information Management

Given the large time and fitiancial commitment that an ERP project requires and the potential benefits it can offer if successfidly implemented, it is important to understand the factors that facilitate and inhibit the success ofEP,P implementation. By means of a case study of a global energy company, we first examine the factors that facilitate and inhibit the success of their ERP implementation. We draw on the theory of business process change when analyzing the implementation process. Next, we examine the perceptions non-management professional users of the ERP system (who were not members of the ERP implementation team) have of …


Managerial Information, The Basics, Floyd J. Brock, Gurpreet S. Dhillon Jan 2001

Managerial Information, The Basics, Floyd J. Brock, Gurpreet S. Dhillon

Journal of International Information Management

A problem exists in the defitiition of information, particularly in its application in management. The problem emerges from the inability of academics and practitioners alike to differentiate adequately between data and information. Our failure to comprehend the concept of information casts doubt on the efficacy of analyses and development of information systems. As evidenced in the literature and surveys, this paper presents a collection of differing emphases in definitions of information. It then sifts for the basics and proposes a definition of managerial information.


New Concepts In Password Management, S. E. Kruck, John R. Sciandra, Karen A. Forcht Jan 2001

New Concepts In Password Management, S. E. Kruck, John R. Sciandra, Karen A. Forcht

Journal of International Information Management

Passwords have been used for many years in the security of computer systems. The password mechanism has not changed in recent years and has several inherent security problems. This paper examines several password problems including sniffers, dictionary and brute force attacks. A specific Department of Defense incident is cited to illustrate a method to thwart sniffers followed by several suggestions intended to increase the security of the password process.


A Value-Oriented Model In Technology For Business Personnel, Mabel T. Kung, Dag Naslund Jan 2001

A Value-Oriented Model In Technology For Business Personnel, Mabel T. Kung, Dag Naslund

Journal of International Information Management

In this paper a process-based framework is presented for end-user development of software applications. The paper discusses the changes of the education of systems for general users to design their own systems. Guidelines and people issues identify ways to help traditional users in developing systems computing to be successful.


Decision Support System And Design For Reverse Logistics, Bajis Dodin, Mohsen Elhafsi Jan 2001

Decision Support System And Design For Reverse Logistics, Bajis Dodin, Mohsen Elhafsi

Journal of International Information Management

This paper studies the relative positions of some selected elements in relations to flexibility and cost factors in information system and logistics design settings. Moreover, this study investigates the extent to which organizations can relate, today, to the importance of information technology in logistics and design for reverse logistics in their operational planning and activities. The findings show the degree of their in terest and policies for reverse logistics, and the creation of joint efforts to reduce costs and to increase flexibility.


An Integrated Spatial Dss For Site Selection For Service Organizations In Developing Countries, Mehdi Beheshtian Jan 2001

An Integrated Spatial Dss For Site Selection For Service Organizations In Developing Countries, Mehdi Beheshtian

Journal of International Information Management

An Integrated Spatial Decision Support System (ISDSS) is developed for finding locations where people can access post offices with minimum travel time between their residences and the post offices and their next destinations. Location-allocation models may be used to determine sites for these transshipment nodes. Due to the nature of traffic and unstructured zoning and all other non-predictable variables, network models may not be applied to find the optimal solution. Instead a gravity model is used to find a solution, which both minimizes the number of post offices and minimizes before-and-after travel times. The result of this system is a …


Describing Intelligent Agent Behaviors, Walt Truszkowski, Jagannathan V. Iyengar, Fred Mills Jan 2001

Describing Intelligent Agent Behaviors, Walt Truszkowski, Jagannathan V. Iyengar, Fred Mills

Journal of International Information Management

The development of new intelligent agents requires an interdisciplinary approach to programming. The initial challenge is to describe the desired agent behaviors and abilities without necessarily committing the agent development project to one particular programming language. What are the appropriate linguistic and logical tools for creating a top level, unambiguous, program-independent, and consistent description of the functions and behaviors of the agent? And how can that description then be translated easily into one of a number of program languages? This article provides a case study of the application of a simple Belief, Desire, and Intention (EDI) first order logic to …


Physical Security Models, Philosophies, And Context, Karen A. Forcht, S. E. Kruck Jan 2001

Physical Security Models, Philosophies, And Context, Karen A. Forcht, S. E. Kruck

Journal of International Information Management

This paper presents physical security of a computer facility within the context of a corporate environment. The context is established from several different perspectives. It first presents physical security philosophies and illustrates the philosophies via the Onion and Garlic Models. It defines a process for identifying and describing transition strategies between security levels. Once the models are defined, a Macro View of physical security is presented. This view discusses physical security goals and critical factors such as budget, monitoring and redundancy. With this context established, the Micro View is presented. Its focus is on information technology (IT) facilities that protect …


Advanced Information Systems: Impact On Organizational Reality, Rolf D. Dixon Jan 2001

Advanced Information Systems: Impact On Organizational Reality, Rolf D. Dixon

Mountain Plains Journal of Business and Technology

Today, with the proliferation of increasingly advanced information technologies in organizations, a significant challenge can be made to the traditional assumptions regarding the non-rationality of organizational behavior. It is the purpose of this paper to consider the effects of advanced information technologies on the spatial, structural, social, and informational processes of the organization and to suggest how this could, in fact, signal a return to the “rational” organization. This paper will consider the issue of organizational rationality in a normative manner with several propositions offered.


Vom Elektronischen Schaufenster Zum Prozessportal, Elgar Fleisch, Hubert Oesterle Jan 2001

Vom Elektronischen Schaufenster Zum Prozessportal, Elgar Fleisch, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Flowers For The World: Developing A Business Game To Support The Teaching Of Is Concepts, Trevor T. Moores, Jerry Cha-Jan Chang Jan 2001

Flowers For The World: Developing A Business Game To Support The Teaching Of Is Concepts, Trevor T. Moores, Jerry Cha-Jan Chang

Management, Entrepreneurship and Technology Faculty Publications

One of the key problems in teaching fundamental concepts in information systems is how to ground the theory in experiences that the students can relate to. To overcome this problem, a business game called Flowers For The World has been developed and used across a wide variety of IS courses. This paper will describe the game and the result of using it for a 300-level course in analysis and design. The possibility exists that the game could be developed to provide a common business foundation across all business school curricula.


A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn Jan 2001

A Virtual Organisation Model For E-Government, Greg Robins, Janice Burn

Research outputs pre 2011

This paper looks at the implementation of a new customer value alliance model in e-govemment. Firstly we review the issues of e-govemment and the drive towards customer centric organisations in the context of multiple government agencies. A model of e-Government is introduced and examined within the context of a virtual organisation model which can be applied along the customer value chain across multiple service agencies. A case study is used to demonstrate how this concept of a virtual organisation as a customer value-alliance model can effect a successful transition to e-Govemment from a traditional Government model. Finally, we examine how …


Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli Jan 2001

Nidh - Network Intrusion Detection Hierarchy: A Model For Gathering Attack Intelligence, Craig Valli

Research outputs pre 2011

Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.


Integrating Traditional Research-Journal Based Sources With Trade And Web-Based Sources In Coursework, Kathy E. Clarke, Harry L. Reif Dr. Jan 2001

Integrating Traditional Research-Journal Based Sources With Trade And Web-Based Sources In Coursework, Kathy E. Clarke, Harry L. Reif Dr.

Libraries

Due to the rapidly changing nature of telecommunications, it is challenging to be able to introduce timely topics into this curriculum. At the same time, educators are challenged with preparing students to function in the workplace where change is a given, as on average workers spend an average of 9.25 hours per week looking for or analyzing data [4]. Initiatives to keep instruction relevant and prepare students to be information literate mandate that students be able to discover, digest, and put into context new information about technologies. This skill is developed and enhanced through the use of research projects. This …


Development Of A Theoretical Model Based Upon Factors Influencing A Firm's Suitability For Organizational Evolution, Ronald T. Sones Jan 2001

Development Of A Theoretical Model Based Upon Factors Influencing A Firm's Suitability For Organizational Evolution, Ronald T. Sones

Theses and Dissertations

Early motion pictures resembled theatre productions on film. Decades would pass before the techniques of special effects and editing evolved to provide the type of movie often shown today. Similarly, early television looked like a radio show where the audience could observe the speakers. Ford's Model T, a "horse-less" carriage. seemed to be designed for a harness. In these examples, successful companies learned how to harness and exploit the power of new technologies--others companies became victims. Companies of the current economy must recognize they face a similar watershed. According to Tom Stewart, the economy effectively transitioned into the Information Age …


From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb Jan 2001

From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb

G. Kent Webb

An increasing proportion of e-business and other network traffic moves over optical networks which provide higher capacity, speed, and security than electrical networks. An all optical network and even optical computing has been envisioned for 20 years, but technical characteristics of optical components have limited applications to the high end of networking, typically for speeds above 2.5 Gbps. While a fundamental advance in physics may be required for the implementation of an all-optical network, optics continues a steady advance into the network infrastructure. This paper describes the technical evolution of optical systems and examines the changing cost structure of optical …


From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb Jan 2001

From E-Business Into The O-Zone: Development Of Optical Networks, G. Kent Webb

Faculty Publications, Information Systems & Technology

An increasing proportion of e-business and other network traffic moves over optical networks which provide higher capacity, speed, and security than electrical networks. An all optical network and even optical computing has been envisioned for 20 years, but technical characteristics of optical components have limited applications to the high end of networking, typically for speeds above 2.5 Gbps. While a fundamental advance in physics may be required for the implementation of an all-optical network, optics continues a steady advance into the network infrastructure. This paper describes the technical evolution of optical systems and examines the changing cost structure of optical …


Information Systems Development And Practice In Organisations In Sri Lanka : An In-Depth Case Study, Sunil G. Rajapaksege Jan 2001

Information Systems Development And Practice In Organisations In Sri Lanka : An In-Depth Case Study, Sunil G. Rajapaksege

Theses: Doctorates and Masters

This thesis describes an investigation of information systems development and practice in a privatised state owned enterprise (North-West Cement Company Limited or NWCL) in Sri Lanka between J95M-2000. The objectives of my study were: (1) to understand the approaches used by NWCL for information systems development; (2) to understand how these approaches relate to the organisational, socio-cultural, economic and political realities of organisations in Sri Lanka; (3) to outline a theory to better understand information systems development and practice for organisations in Sri Lanka; and (4) to make recommendations which could be used to improve information systems development and practice …