67 research outputs found
A Case for AIS Cases: Development of a New Graduate Course on Year 2000 Compliance Projects
As organizations increasingly rely upon complex, interdependent accounting systems and processes, the heretofore tradition- bound discipline of accounting is undergoing rapid and turbulent change. This gives rise to a need to infuse the accounting curriculum with course materials and experiences that introduce students to new techniques, best practices, and emerging issues, while also helping students to develop durable and transferable competencies to meet tomorrowâs challenges. There is also a need to integrate such material across the curriculum, by incorporating emerging accounting issues in (for example) MIS or project management courses
Cliniciansâ Emotions and TeleStroke Use
Telemedicine has been available and in use for over fifty years yet by most accounts it has fallen short of its promised impact on healthcare. While legal and reimbursement issues continue to plague the spread of telemedicine use, the technology has continued to improve. We feel there are additional dimensions that play a key role in the use of telemedicine; in particular, we believe that doctorsâ and nursesââ emotional state during use of a telemedicine system has a significant impact on how telemedicine is used. What are the main drivers that give rise to these emotions? How do they impact the use of telemedicine? What changes in the business process can mitigate the negative impact of these emotions? We investigate these research questions by conducting an embedded case study utilizing interview data and archival documents to gain insight into the emotional components at play during TeleStroke consultations
Managing the Internet Payment Platform Project
This case examines issues in the assessment and adoption of Internet technologies in a federal U.S. government context, and describes in detail a pilot project to determine the feasibility of adopting an ASP solution to support procurement by multiple federal agencies using a variety of different legacy transaction systems. The pilot test of the Internet Payment Platform (IPP) by the eMoney group of the United States Treasuryâs Financial Management Service involved three federal agencies and subsets of their suppliers. Participants saw many benefits from their use of the IPP, but agreed that for full-scale operation it needed to be modified to better fit the government procurement context. The project manager is weighing the pros and cons of conducting another pilot test using the same commercial software as before, or obtaining and customizing a new commercial package, or building a new system from scratch
DEPLOYING RESOURCES TO SAVE LIVES: PARTNERS TELE-STROKE SERVICE
Innovative ICT applications such as patient-present telemedicine consultation services can save lives, yet following pilot-testing few have achieved long-term viability. Partners Health Careâs TeleStroke service, in full operation, is financially self-sustaining. Interviews with clinical, technical and administrative personnel at Partners and two âspokeâ hospitals revealed practical lessons learned. Analysis through the lens of the Resource Based View reveals that many valuable assets and capabilities that Partners and its spoke hospitals developed are necessary for a successful TeleStroke program yet could be acquired or copied (they are not rare or inimitable). We note further that Partnersâ overriding goal for TeleStroke is to achieve clinical success in its catchment area, without depleting financial resources; competitive advantage is sought within the catchment area but not beyond it. Resource analysis reveals that other institutions could develop successful telemedicine services for acute stroke care, since the needed assets are readily available, most of the capabilities can be imitated, and viable substitutes are limited. We contend that the lessons learned in this case study -- about the effective deployment of assets and capabilities -- are broadly applicable to other settings, in health care and other industries
Can Digital Badging Support an Inclusive New Normal in Higher Education?
This call for research considers how digital badging could help universities serve their students better and more flexibly, especially during crises (whether caused by public health issues, social unrest, or natural disasters). Touted as a means to recognize academic achievements and skills of both traditional and non-traditional students, digital badging can support personalized learning pathways by enabling individualized portfolios of micro-credentials. Also, badges can signify mastery at more granular levels than end-of-term course grades. In this review, we identify known digital badging opportunities and threats and consider a proposed micro-credentialing system based on college course modules rather than full courses. We then articulate directions for further research, guided by the theory of IT options and debt and the theory of complementary resources
INFOSEC in a Basket, 2004-2013
Topical and methodological diversity are key strengths of Information Systems (IS) research. To the extent that an IS sub-field such as IS security (hereafter, InfoSec) employs varied methods to examine various topics, the sub-field can claim strength through diversity. We conducted a systematic review of ten years of 85 InfoSec studies published in the IS Senior Scholars Basket of eight journals. We find that InfoSec researchers have employed a variety of quantitative and qualitative methods to study a variety of topics; that some journals published papers based on some methods and InfoSec topics more than others; that many methods are underutilized as applied to some topics; and that topics addressing the organizational/managerial and inter-organizational levels of analysis are understudied. We conclude that InfoSec research is maturing, yet abundant opportunities still exist to conduct further research aimed at building stronger theories and offering stronger implications for InfoSec practice
Why Cooperate? Ethical Analysis of InfoSec Vulnerability Disclosure
Vendors, security consultants and information security researchers seek guidance on if and when to disclose information about specific software or hardware security vulnerabilities. We apply Kantianism to argue that vendors and third parties (InfoSec researchers, consultants, and other interested parties) have an ethical obligation to inform customers and business partners (such as channel partners or providers of complementary products and services) about specific software vulnerabilities (thus addressing if disclosure should occur). We apply Utilitarianism to address the question of when disclosure should occur. By applying these two philosophical perspectives we conclude that to maximize social welfare, vendors should release software fixes as soon as possible, and third parties should adopt a coordinated disclosure policy to avoid placing customers and business partners at unnecessary risk
Mining Data to Catch Tax Cheats
This teaching case covers technical and non-technical concerns about data mining enabled by the creation of a data warehouse by the California Franchise Tax Board (CFTB). CFTB used data mining to analyze data collected from federal, state and municipal agencies and other organizations to identify residents who under-report income or fail to file tax returns. The case presents different stakeholdersâ privacy, financial, technical and political concerns regarding the use of data obtained from an array of sources. The case is aimed at an undergraduate or MBA/MS course on IS Management, Data Management/Warehousing or Information Privacy. It could also be used to study IT and public policy, or E-government. It provides an opportunity for students to consider how social and political factors interact with technical challenges in inter-enterprise relationships. It also offers an opportunity to consider the value of data in relation to both the financial and non-financial costs of obtaining it
Innovative capability development process: A Singapore IT healtcare case study
How do emotions affect telemedicine adoption and usage for critical-care episodes? We report on
early findings from a grounded theory approach in a multiple-case study of critical care telepediatrics (research in progress). Thus far our findings suggest that specialists believe that generalist
clinicians at remote âspokeâ hospitals are anxious and fearful when performing in a high stress crisis
situation involving an acutely ill or gravely injured child, leading to tunneling of attention
(overlooking important clinical details). The specialists at tertiary care âhubâ hospitals feel they are
able to keep an emotional distance from the situation and they also report feeling less anxious because
they have had extensive training for these acute care situations. Both emotional distance and higher
skill level seem to help the specialists to take in more clinically-relevant information and use this to
guide the generalists. The generalistsâ fear of negative evaluation by the specialists, or embarrassment
in front of other clinicians, may have some impact on their decision to use tele-pediatrics, but does not
seem to be a salient concern during critical care episodes. These findings suggest that emotions do
play a role in telemedicine use and possibly also in other forms of technology-mediated interorganizational collaboration
- âŠ