Managing Information Resources and Technology
Latest Publications


TOTAL DOCUMENTS

19
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781466636163, 9781466636170

Author(s):  
Stephen K. Callaway ◽  
Saad M. Alflayyeh

Distance education has been the topic of a substantial amount of research. However, prior studies have shown mixed results when trying to determine if a difference exists in student satisfaction between students in distance courses versus traditional courses. Prior empirical studies have been too narrow in scope, and a more comprehensive model is needed to better explain the factors influencing student satisfaction. Therefore, the current study includes student demographic factors, comprehensive measures of student motivation, and course format, as well as specific course features included, to fully explain student satisfaction. Structural equation modeling is used to test the model. Results indicate a positive association between demographics and motivation, between motivation and course format, between one demographic factor and course format, between course format and preferred features, between course format and satisfaction, and between course features and satisfaction.


Author(s):  
Sofia Kyratzi ◽  
Nickolas S. Sapidis

In this paper, the authors present a new algorithm for constructing a solid model when the given input is only one partial-view sketch (“natural sketch”). This algorithm is a two-step process, where first a complete (wireframe) sketch is derived, which is then transformed into a 3D polyhedron. The paper details topological and geometric aspects of the process, as well as the essential “user-interaction” components dealing with cases where the sketch-to-solid problem does not have a unique solution.


Author(s):  
Karthik N. S. Iyer

The utilization of advanced information technologies (IT) in interfirm collaboration has been thematic in current literature. Although conventional wisdom perceives that IT systems facilitate supply chain collaboration, this research provides an alternative perspective. Drawing on resource-based view and contingency ‘fit’ theory, the study investigates a model of relationships that specify how environmental uncertainty factors influence the nature of the association of two critical but distinctive IT capabilities with collaboration. Findings corroborate the positive association between collaboration and B2B e-commerce and IT analytic capability. However, demand unpredictability enhances the IT analytic capability-collaboration relationship while detracting from the B2B e-commerce-collaboration association. Notably, the study did not find any moderating influence of another critical uncertainty factor, technological turbulence. The findings reveal the complex nature of IT-collaboration relationships and provide managers a framework for understanding the uncertainty contexts under which specific information technologies with various functionalities may be more appropriately leveraged to derive benefits.


Author(s):  
Yu “Andy” Wu ◽  
Carol Stoak Saunders

Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decisions defined by Weill and Ross (2004). This framework recommends the selection of decision rights allocation patterns that are proper to those decision types to ensure good security decisions. As a result, a balance can be achieved between decisional authority and responsibility for information security.


Author(s):  
Tzy-Yuan Chou ◽  
James J. Jiang ◽  
Gary Klein ◽  
Seng-Cho T. Chou

Leader-member exchange (LMX) represents the quality of interaction between leaders and members of a work unit, such as the information system function within an organization. LMX is expected to improve organizational citizenship behavior, beneficial behaviors not explicitly rewarded, but prior research has failed to establish this link satisfactorily. To determine the influence of LMX in the IS environment, a model is developed based on the background in the IS and management literature that considers LMX an important contributor to job satisfaction and organizational commitment. In turn, organizational commitment influences both work quality and organizational citizenship behaviors in a beneficial way. The model is confirmed with a sample of IS professionals in Taiwan. The results show that effective communication and coordination is crucial between leaders and subordinates at levels within the organization not previously considered.


Author(s):  
Ian A. Willson

This article explores the evolution of the Massively Parallel Processing (MPP) database, focusing on trends of particular relevance to analytics. The dramatic shift of database vendors and leading companies to utilize MPP databases and deploy an Enterprise Data Warehouse (EDW) is presented. The inherent benefits of fresher data, storage efficiency, and most importantly accessibility to analytics are explored. Published industry and vendor metrics are examined that demonstrate substantial and growing cost efficiencies from utilizing MPP databases. The author concludes by reviewing trends toward parallelizing decision support workload into the database, ranging from within database transformations to new statistical and spatial analytic capabilities provided by parallelizing these algorithms to execute directly within the MPP database. These new capabilities present an opportunity for timely and powerful enterprise analytics, providing a substantial competitive advantage to those companies able to leverage this technology to turn data into actionable information, gain valuable new insights, and automate operational decision making.


Author(s):  
Sathiadev Mahesh ◽  
Brett J. L. Landry ◽  
T. Sridhar ◽  
Kenneth R. Walsh

An issue facing the manager of a small business is the use of cloud computing to meet the information technology (IT) needs of the firm. These businesses typically have limited in-house IT capabilities and often outsource much of their IT. This paper discusses this rapidly evolving technology and provides a framework for businesses to decide on harnessing the power of cloud computing. It recommends the appropriate decision based on the way in which IT is currently used in the enterprise and future needs to meet competitive challenges. The potential cost savings, technology insurance from cloud computing, and security risks are discussed and factored into the decision.


Author(s):  
Xin (Robert) Luo ◽  
Richard Brody ◽  
Alessandro Seazzu ◽  
Stephen Burd

Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.


Author(s):  
Richard J. Goeke ◽  
Yvonne L. Antonucci

Business Process Management (BPM) maximizes firm performance by transforming isolated functional activities into streamlined, cross-functional processes. Being a relatively new discipline, disagreement exists regarding the position structure and qualifications required for success. However, certain individual differences have been associated with job performance, both in general and for specific occupations. Because BPM initiatives can be expensive and risky, understanding these individual differences may help practitioners improve their chances for BPM job success. Two models of job performance have dominated organizational research; one argues that personality traits are the chief determinants, while the other argues that intelligence and experience are most important. This paper uses logistic regression to examine the efficacy of each model in predicting job performance among BPM professionals. Results indicate that intelligence, conscientiousness, and openness to experience are the most important differentiators of BPM job performance.


Author(s):  
H. James Nelson

Research indicates that rapidly evolving technology and markets do not provide a first mover strategic advantage but favor the second mover. This paper introduces a third variable: hype. In a time of rapid technology and market evolution, hype overrides the expected results and gives the first mover a strategic advantage. This study examines a homogeneous set of medium-sized information-dependent and information-intensive organizations as they implement visible information technology in two eras: during a time of intense hype and during a more normal time where technology has become commonplace. One hundred matched triples of credit unions were examined as they chose to remain offline, implement an informational website, or implement a transactional website during the highly hyped Internet expansion time of 1998 through 2002. One hundred matched pairs of credit unions were then examined during the more normal time from 2003 through 2007. Results indicate that credit unions that embraced the hyped technology gained significant strategic advantage. Second-moving credit unions that waited for the more mature technology survived, whereas the credit unions that did not adopt the technology were at a significant strategic disadvantage.


Sign in / Sign up

Export Citation Format

Share Document