Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 108 of 108

Full-Text Articles in Management Information Systems

A Comprehensive Study On The Differences In Erp Implementation Between Manufacturing And Service Industry, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh Jan 2006

A Comprehensive Study On The Differences In Erp Implementation Between Manufacturing And Service Industry, Farshad Salimi, Ben Dankbaar, Reggie Davidrajuh

Journal of International Technology and Information Management

In the first part, this paper presents a review of current literatures on key critical success factors (KCSFs) and their inevitable relative links with ERP benefits, project (strategic) goals and objectives in ERP implementation; this literature review searches for the available KCSFs in two sectors: manufacturing and service industry. The second part of paper looks into the available literature on differences in manufacturing and service industry. From these differences we deduct that there are differences in ERP implementation between manufacturing and services.


Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed Jan 2006

Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed

Journal of International Technology and Information Management

Data warehouses are large complex systems with many interacting nonlinear components. It is an amalgamation of many different systems and integration of such diverse elements is its primary concern. It is often difficult for a data warehouse manager to predict the performance of the system especially when demand pattern for the required data keeps changing. We have developed a simulation model using ARENA simulation package that will simulate the behavior and performance of a data warehouse system environment based on its overall design. Given such a model, a data warehouse manager can walk through various what-if scenarios and can pinpoint …


A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli Jan 2006

A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli

Journal of International Technology and Information Management

This paper describes the development of an agent-based framework that supports the purchasing function in supply chain management. The framework has been applied in a case situation for planned order releasing from a manufacturer’s materials requirement planning (MRP) system. The proposed framework incorporates a negotiation protocol that can effectively coordinate the negotiation process between a buyer agent and several supply agents, which may represent the manufacturer and its suppliers respectively. These agents negotiate according to their preferred strategies which aim to conclude a deal that achieves their own objectives. The implementation of the negotiation process involves considerations of the price …


Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang Jan 2006

Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang

Journal of International Technology and Information Management

The slicing of Silicon wafer is a complex manufacturing process in producing the raw materials for electronic chips and requires the efforts to effectively monitor the stability in production line and ensure the quality for the products composed of different shapes and materials. Human decision failure and other analytical errors are the most common source of management problems in such manufacturing stage. This paper presents a case regarding the silicon wafer manufacturing to examine the response to quality errors. The study has adopted the approach of grey situation decision-making algorithm for problem detection that suggests a technique to attain the …


Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara Jan 2006

Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara

Journal of International Technology and Information Management

This study suggests that having access to a computer and the Internet at home leads to better wages. We normally have the idea that people with higher wages have computers and Internet access at home. But with declining prices of home PCs and the increasing importance of Internet, this no longer seems to be the case. The new owners of PC today are considerably poorer and less educated than in the past. People with access to a PC and Internet at home appear to earn 8.6% more than their counterpart. This result seems to suggest that University policies requiring students …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures


Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy Jan 2006

Which Theory Applies: An Analysis Of Information Systems Research, Leila Halawi, Richard Mccarthy

Publications

Research in information systems has rapidly expanded during its relatively brief existence. IT offers organizations a fundamental decision-enhancing environment that extends new opportunities, therefore producing thriving, competitive firms, adding business value and offering valuable products and services to customers. Research within the IT domain has produced several new theories, some of which have been used to help explain and predict end-user use of technologies. We provide a comprehensive overview of the major IT theories and review their theoretical fundamentals.


Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian Jan 2006

Ethical Attitudes Of Business Information Systems Students: An Empirical Investigation, Leila Halawi, Silva Karkoulian

Publications

This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios.


An Integrative Approach For Examining The Determinants Of Abnormal Returns: The Cases Of Internet Security Breach And Ecommerce Initiative, Francis Kofi Andoh-Baidoo Jan 2006

An Integrative Approach For Examining The Determinants Of Abnormal Returns: The Cases Of Internet Security Breach And Ecommerce Initiative, Francis Kofi Andoh-Baidoo

Theses and Dissertations

Researchers in various business disciplines use the event study methodology to assess the market value of firms through capital market reaction to news in the public media about the firm's activities. Capital market reaction is assessed based on cumulative abnormal return (sum of abnormal returns over the event window). In this study, the event study methodology is used to assess the impact that two important information technology activities, Internet security breach and ecommerce initiative, have on the market value of firms. While prior research on the relationship between these business activities and cumulative abnormal return involved the use of regression …


Analyzing Faulty Knowledge Systems In Project-Based Environments: An Empirical Investigation In A R&D Organization, Rafael E. Landaeta, Cesar Ariel Pinto, Timothy G. Kotnour, William R. Peterson Jan 2006

Analyzing Faulty Knowledge Systems In Project-Based Environments: An Empirical Investigation In A R&D Organization, Rafael E. Landaeta, Cesar Ariel Pinto, Timothy G. Kotnour, William R. Peterson

Engineering Management & Systems Engineering Faculty Publications

This investigation contributes a framework of the relationships among the faulty elements of a knowledge system in a project-based organization. The framework was developed during an applied research project at a R&D organization. A knowledge system can be defined as a series of inputs, processes, and outputs that interact with each other with the purpose of enhance the performance and capabilities of an organization or work unit through knowledge. The framework was developed using literature, our experience as applied researchers, and data collected from members of a R&D organization. Data was collected through a survey, interviews, and group meetings. The …


Improving Disaster Response Efforts With Decision Support Systems, Steven M. Thompson, Nezih Altay, Walter G. Green Iii, Joanne Lapetina Jan 2006

Improving Disaster Response Efforts With Decision Support Systems, Steven M. Thompson, Nezih Altay, Walter G. Green Iii, Joanne Lapetina

Management Faculty Publications

As evidenced by Hurricane Katrina in August, 2005, disaster response efforts are hindered by a lack of coordination, poor information flows, and the inability of disaster response managers to validate and process relevant information and make decisions in a timely fashion. A number of factors contribute to current lackluster response efforts. Some are inherent to the complex, rapidly changing decision-making environments that characterize most disaster response settings. Others reflect systematic flaws in how decisions are made within the organizational hierarchies of the many agencies involved in a disaster response. Slow, ineffective strategies for gathering, processing, and analyzing data can also …


End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom Dec 2005

End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

End-User Training (EUT) has enjoyed a rich tradition of research in Information Systems. However, with the growing pace of change in technology and the dynamic nature of business, organizations are spending an increasing amount of money on end-user training. Training methods are also changing with little research to support new approaches. Thus, extensive research is required in the future. To be credible, end-user training research should preserve and build upon the significant literature that exists, both in IS and Education. This paper provides a review of EUT literature focusing on training methods. It summarizes the findings, while pointing out key …


Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom Dec 2005

Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

As organizations struggle with how to develop and use their inherent expertise, the importance of knowledge management and collaboration has grown in both academic and practitioner communities. This paper outlines a new concept of collaborative knowledge management (CKM), which bridges the two fields. Drawing from literature, we present a conceptual framework for understanding the concepts underlying CKM. Next, this paper explores how a new technology, peer-to-peer (P2P), fits in the CKM paradigm. A discussion on P2P tools and a comparison of these tools with client server tools for enabling the CKM process is presented. P2P has great appeal for CKM …


Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas Dec 2005

Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas

Saurabh Gupta

No abstract provided.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.


Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati Dec 2005

Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati

Pratyush Bharati

No abstract provided.


Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.