Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 179

Full-Text Articles in Management Information Systems

A Language Designed For Programming I, Ben A. Blake Aug 2010

A Language Designed For Programming I, Ben A. Blake

Business Faculty Publications

The process of comprehending a problem, strategically developing a solution and translating the solution into an algorithm is arguably the single most important series of skills acquired during the education of an undergraduate computer science or information technology major. With this in mind, much care should be taken when choosing a programming language to deploy in the first University programming course. BLAKE, Beginners Language for Acquiring Key programming Essentials, is designed specifically for use in a Programming I class. BLAKE aids in enforcing fundamental object-oriented practices while simultaneously facilitating the transition to subsequent programming languages. BLAKE’s major features include; consistent …


It Project Governance In Higher Education, Aileen Koh Aug 2010

It Project Governance In Higher Education, Aileen Koh

Aileen Koh

Extract:

This paper succinctly discusses the forms of Project governance that were recently implemented at Bond University. The three key forms are: Project governance mechanisms, Project Portfolio Office, and Project Management Framework.


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2010

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

MIS/OM/DS Faculty Publications

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Oregon Freight Data Mart, Miguel A. Figliozzi, Robert Bertini Aug 2010

Oregon Freight Data Mart, Miguel A. Figliozzi, Robert Bertini

TREC Final Reports

Increasing freight volumes are adding pressure to the Oregon transportation system. Monitoring the performance of the transportation system and freight movements is essential to guarantee the economic development of the region, the efficient allocation of resources, and the quality of life of all Oregonians. Freight data is expensive to collect and maintain. Confidentiality issues, the size of the datasets, and the complexity of freight movements are barriers that preclude the easy access and analysis of freight data. Data accessibility and integration is essential to ensure successful freight planning and consistency across regional partner agencies and planning organizations. In relation to …


Cloud Services From A Consumer Perspective, Philip Koehler, Arun Anandasivam, Dan Ma Aug 2010

Cloud Services From A Consumer Perspective, Philip Koehler, Arun Anandasivam, Dan Ma

Research Collection School Of Computing and Information Systems

Although there is an increased attention on Cloud Computing in the academic literature in the recent years, most research work focus on technical aspects of cloud computing. Research on consumers’ preferences for cloud services is limited to studies from consulting and industry companies. This paper fills the gap by empirically identifying consumer preferences for cloud service attributes. Using conjoint methods we reveal the relative importance of different attributes of cloud services. The results help both practitioners and academic researchers to better understand the prerequisites of a successful market introduction of cloud services and to design appropriate services. Moreover, the derived …


Engaging With 'Web 2.0' Technologies: Implementing Enterprise Content Management At Bond University, Peta J. Hopkins Jul 2010

Engaging With 'Web 2.0' Technologies: Implementing Enterprise Content Management At Bond University, Peta J. Hopkins

Peta Hopkins

The phrase ‘Web 2.0’ has been used as a popular label to describe web technologies with a focus on collaboration, interactivity, user-created content, information and knowledge sharing, and social connections. It indicates a transformation of the web environment from a one-way information delivery tool, to a multi-way information sharing platform. Its popularity as a catch-phrase has spawned other terms such as enterprise 2.0 wherein social media and supporting technologies are introduced into the corporate information environment thereby transforming the way the enterprise communicates, connects and shares information among its staff and with its customers. In this paper, the author discusses …


It Solutions On Project Logistics, Fei Lu Jul 2010

It Solutions On Project Logistics, Fei Lu

World Maritime University Dissertations

No abstract provided.


The Analysis On Third Party Logistics Company K Using Information Technology To Enhance Their Core Competitiveness, Sheng'an Jiang Jul 2010

The Analysis On Third Party Logistics Company K Using Information Technology To Enhance Their Core Competitiveness, Sheng'an Jiang

World Maritime University Dissertations

No abstract provided.


Research On The Competitiveness Of China Hn Chemical Shipping Company, Yue Luan Jul 2010

Research On The Competitiveness Of China Hn Chemical Shipping Company, Yue Luan

World Maritime University Dissertations

No abstract provided.


Towards A Model Of Information Systems User Competency, Brenda Eschenbrenner Jul 2010

Towards A Model Of Information Systems User Competency, Brenda Eschenbrenner

College of Business: Dissertations, Theses, and Student Research

The ability to utilize information systems (IS) effectively is becoming a necessity for business professionals. However, individuals differ in their abilities to use IS effectively, with some achieving exceptional performance in IS use and others being unable to do so. Therefore, developing a set of skills and attributes to achieve IS user competency, or the ability to realize the fullest potential and the greatest performance from IS use, is important. Various constructs have been identified in the literature to describe IS users with regard to their intentions to use IS and their frequency of IS usage, but studies to describe …


Application Of Open-Source Enterprise Information System Modules: An Empirical Study, Sang-Heui Lee Jul 2010

Application Of Open-Source Enterprise Information System Modules: An Empirical Study, Sang-Heui Lee

College of Business: Dissertations, Theses, and Student Research

Although there have been a number of studies on large scale implementation of proprietary enterprise information systems (EIS), open-source software (OSS) for EIS has received limited attention in spite of its potential as a disruptive innovation. Cost saving is the main driver for adopting OSS among the other possible benefits including security and reliability, transparency of development process, etc. Due to the costly implementation of proprietary EIS, small- and medium-sized organizations have given attention to OSS as an alternative. OSS EIS can also help create a competitive advantage by enabling organizations to customize their information systems by modifying the open-source …


Attitude, Aptitude, Ability And Autonomy: The Emergence Of “Offroaders”, A Special Class Of Nomadic Worker, David Pauleen Jul 2010

Attitude, Aptitude, Ability And Autonomy: The Emergence Of “Offroaders”, A Special Class Of Nomadic Worker, David Pauleen

David Pauleen

Freedom to choose when, where and on what to work might be viewed as mere telework. However, when we mix the adoption of ubiquitous technologies with personalities that take pleasure in problem solving and achievement for its own sake, a strong need for autonomy, the freedom to work wherever and whenever the mood strikes, and add a dash of entrepreneurial spirit, then perhaps we are seeing an emergent class of worker, and even the possibility of new organisational forms. This research draws on adaptive structuration theory to search for evidence of a different way of working, hidden among otherwise familiar …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Do Auditors Adjust Their Audit Plans Accordingly When They Encounter Material Automated Control Weaknesses?, Daniel D. Selby Jun 2010

Do Auditors Adjust Their Audit Plans Accordingly When They Encounter Material Automated Control Weaknesses?, Daniel D. Selby

Accounting Faculty Publications

Automated control weaknesses are associated with defects in computer hardware or computer applications. AU 319 does not require auditors to add professionals with specialized skills in automated controls (or IT audit specialists) to the audit engagement. Auditors may encounter a material automated control weakness and adjust their audit plan without the assistance of an IT audit specialist. Thus, auditors may not adjust their audit plan enough to gain an understanding of the material automated control weakness. This is an important problem for auditors because this problem may result in misstated financial statements and incorrect internal control opinions if auditors fail …


Measuring Emotions In Electronic Auctions, Marc Adam Jun 2010

Measuring Emotions In Electronic Auctions, Marc Adam

Marc T. P. Adam

Auctions are nowadays a popular and frequently employed market mechanism in electronic markets. In economic literature, the success of electronic auctions has been largely attributed to the reduction of transaction costs, the large number of potential buyers, and the independence of time and space. However, an additional explanation for the success of electronic markets, and in particular Internet consumer auctions, is the hedonic or emotional value bidders derive from auction participation. The emotionality bidders experience in Internet auctions confronts a market engineer of electronic markets with two important challenges, regarding both the auction mechanism design and the user interface design. …


The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris Jun 2010

The Shaping Of Managers’ Security Objectives Through Information Security Awareness Training, Mark Harris

Theses and Dissertations

Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the socio-technical aspects of security, another discussed only the social aspects of security, the third detailed only the technical aspects …


Csmysore Newsletter, Cs. Sunil Kumar B.G., Csmysore E-Group Jun 2010

Csmysore Newsletter, Cs. Sunil Kumar B.G., Csmysore E-Group

Sunil B.G. & Associates

This Contains the latest updates on various topics relating to corporate professionals and also contains useful articles


A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers Jun 2010

A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers

Priscilla Arling

Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.


A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers Jun 2010

A Systems Analysis Experiential Case Study: Repeatable Real World Problem Solving, Priscilla Arling, C. Deeter, H. Eggers

Priscilla Arling

Many business schools today are emphasizing experiential education, particularly in undergraduate instruction, where students often have had limited exposure to business settings. While a business problem can be presented in the form of a written case study, real world projects for external clients are increasingly being incorporated into the classroom. However finding suitable clients and projects for multiple student teams each semester can be difficult.


Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello Jun 2010

Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello

MIS/OM/DS Faculty Publications

We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model proposed in the literature. The approach we study consists of solving a sequence of two-stage stochastic programs with simple recourse, which can be viewed as an approximation to a multi-stage stochastic programming formulation to the seat allocation problem. Our theoretical results show that the proposed approximation is robust, in the sense that solving more successive two-stage programs can never worsen the expected revenue obtained with the corresponding allocation policy. Although intuitive, such a property is known not …


Information Risk And Underwriter Switching In Seos: Evidence From China, Wei Luo, Pingui Rao, Heng Yue Jun 2010

Information Risk And Underwriter Switching In Seos: Evidence From China, Wei Luo, Pingui Rao, Heng Yue

Research Collection School Of Accountancy

In this paper we examine whether information risk affects underwriter switching in a seasoned equity offering (SEO) process. Building on previous research, we hypothesize that SEO firms and underwriters associate with one another by mutual choice, and firms with a low degree of information risk tend to match up with prestigious underwriters. Using a sample of SEO firms in China and employing accruals quality as a proxy of information risk, we find evidence consistent with our hypothesis: the information risk and the initial public offering (IPO) underwriters’ reputation at the time of the SEO jointly determine the probability that the …


Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu May 2010

Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu

Dissertations

Quantiles, as a performance measure, arise in many practical contexts. In finance, quantiles are called values-at-risk (VARs), and they are widely used in the financial industry to measure portfolio risk. When the cumulative distribution function is unknown, the quantile can not be computed exactly and must be estimated. In addition to computing a point estimate for the quantile, it is important to also provide a confidence interval for the quantile as a way of indicating the error in the estimate. A problem with crude Monte Carlo is that the resulting confidence interval may be large, which is often the case …


A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling May 2010

A Network Implementation Class Exercise: Businessquest Business Incubator, Llc, Priscilla Arling

Priscilla Arling

One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and network implementation exercise that can be completed in one or two class periods in any classroom with Internet access. The objective of the exercise is for students to solve a business problem by applying concepts related to basic network configuration, local area networks …


The Role Of Organizational Reality In Implementing Technology, Sakthi Mahenthiran, M. D’Itri, R. Donn May 2010

The Role Of Organizational Reality In Implementing Technology, Sakthi Mahenthiran, M. D’Itri, R. Donn

Sakthi Mahenthiran

Reports on the structurational model of technology which shows how workers who had the power to make the implementation successful affected the data that was collected and the extent to which management was able to use the technology to influence their work. Systems for recording job-related data; Analyzing organizational processes; Application of the structurational theory.


The Impact Of Mobile Technology On The Viewing Experience Of The Avid Sports Fan, Kimberley Hansen May 2010

The Impact Of Mobile Technology On The Viewing Experience Of The Avid Sports Fan, Kimberley Hansen

Honors Scholar Theses

Viewing sports on television is a very different experience than viewing a game in-person. Sports commentators on television are seemingly able to pull up random statistics as soon as something unexpected happens during a game. Because these statistics are discussed on television, any sports fan who wants to watch a game in-person misses out on the opportunity to hear them during the game. This study identifies what statistics, both common and uncommon, are considered important or interesting by avid sports fans who watch a particular sport at least two times per week. In addition, it considers the rise of mobile …


Meta-Level Institutions Impacting Ict Innovation In Developing Economies: Intellectual Property, Sarah Kerr, Richard Boateng Phd May 2010

Meta-Level Institutions Impacting Ict Innovation In Developing Economies: Intellectual Property, Sarah Kerr, Richard Boateng Phd

Richard Boateng PhD

Participation in the current informational economy is through innovation. Innovation is impacted by institutions, both enabling and constraining productivity. Meta-level institutions are increasing in significance with the inter-linking of national economies through processes of globalisation. Intellectual property (IP) and the digital commons (DC) are two meta-level institutions impacting information and communication technology (ICT) innovation in developing economies through increasing and decreasing innovation process transformation costs. Seen through a case study examination of the Simputer's innovation, IP motivates ICT innovation, by both acting as a normative institution and by offering economic rewards, decreasing transformation costs through increasing access to innovation inputs. …


Being There Versus Being Wired: The Effect Of Colocation On Social Capital In Distributed Teams, Priscilla Arling, Mani Subramani May 2010

Being There Versus Being Wired: The Effect Of Colocation On Social Capital In Distributed Teams, Priscilla Arling, Mani Subramani

Priscilla Arling

Advancement in communication technologies continues to fuel the growth of geographically distributed teams. Managers and team members have expressed concerns about negative impacts when individuals work at a distance from each other since such changes in work structure can affect social interactions among individuals in teams. The social relationships, shared experiences, and ongoing interpersonal interactions that often arise from colocation are recognized as contributing to the social capital of individuals. In this paper, we examine how working in a distributed team, a feature that influences the extent to which team members are colocated, affects the level of individual social capital. …


The Role Of Technology, Communication And Social Capital In Distributed Teams, Priscilla A. Arling May 2010

The Role Of Technology, Communication And Social Capital In Distributed Teams, Priscilla A. Arling

Priscilla Arling

Advancements in communication technologies continue to support the development of geographically-distributed teams. Yet as this practice grows, managers and staff remain concerned about the impact of working physically away from each other. This study theorizes social capital as the primary mechanism by which the level of distribution of individuals in teams and the use of communication technologies influence the work-related outcomes of job performance, job satisfaction and organizational commitment. Three components of social capital are examined: structural, relational and cognitive. I use social network methodology to capture differences in face-to-face versus technology-mediated communication networks in a survey of over 250 …


The Impact Of Telework On Performance: A Social Network Approach, Priscilla Arling May 2010

The Impact Of Telework On Performance: A Social Network Approach, Priscilla Arling

Priscilla Arling

No abstract provided.


Generational Perceptions Of Productive/Unproductive Information Received From Management Through Different Communication Channels, Eva Lynn Cowell May 2010

Generational Perceptions Of Productive/Unproductive Information Received From Management Through Different Communication Channels, Eva Lynn Cowell

Doctoral Dissertations

This exploratory study identified generational preferences for receiving information from management through different communication channels and determined if age predicted productivity for productive and unproductive information received through different communication channels. This is the first study to empirically examine the relationship between age cohorts, communication channel preferences, information categories, and productivity. Sample participants worked as Extension agents at a major land-grant university. The four generations represented in the sample utilized multiple communication channels and were geographically dispersed throughout the state. The survey was administered electronically and completed by 204 (74%) of the eligible 275 employees in the organization. Independent Samples …