74 research outputs found

    Journal Self-Citation XIV: Right Versus Right ā€“ Gaining Clarity into the Ethical Dilemma of Editorial Self-Referencing

    Get PDF
    The practice of editorial ā€œself-referencingā€ ā€“ journal editors requiring that authors include in their papers a specific number of citations from the journal in which they seek to publish ā€“ has recently garnered significant interest within the IS academic community. A recent survey of AISWorld suggests that the vast majority of respondents find this practice inappropriate and unethical. Rather than dismissing this behavior as patently unethical, this paper seeks to better understand the possible motivations for this editorial behavior. The notion of the ethical dilemma is introduced, as well as a framework to assist in analyzing them. Ultimately, the analysis suggests that while editors may feel they have worthwhile reasons for requiring self-references, the potential long term risks to the journal, the academy, and the body of knowledge outweigh those reasons

    Information Systems and Healthcare XVI: Physician Adoption of Electronic Medical Records: Applying the UTAUT Model in a Healthcare Context

    Get PDF
    This study applies the Unified Theory of Acceptance and Use of Technology (UTAUT) to the phenomenon of physician adoption of electronic medical records (EMR) technology. UTAUT integrates eight theories of individual acceptance into one comprehensive model designed to assist in understanding what factors either enable or hinder technology adoption and use. As such, it provides a useful lens through which to view what is currently taking place in the healthcare industry regarding EMR adoption. This is mutually beneficial to both the healthcare and MIS communities, as UTAUT offers valuable practical insight to the healthcare industry in explaining why EMR technology has not been more widely adopted as well as what prescriptions may facilitate future adoption, while offering the MIS community the opportunity to strengthen existing theory through an illustration of its application

    IS Students in Demand: Products of the Reengineered IS Classroom

    Get PDF
    Research suggests that IS people have lower social needsthan people in other occupations. Indeed, personal research on what motivates IS professionals reveals that interacting with other people and establishing relationships are some of the lower-rated motivational factors. Perhaps then, it should not be too surprising to learn that one of the most often heard complaints of IS majors relates to the inadequacy of their communication skills. Corroborating evidence is abundant. For example, IS departments, consulting companies, and computer vendors often recruit people who do not major in IS. These firms instead overlook the best and brightest IS students to recruit non-IS students that have developed interpersonal skills through other means --experience with student organizations, fraternities or sororities, or membership in student chapters of professional business societies on campus. When asked why this is the case, recruiters indicate that the ability to communicate effectively is a critical skill in their organizations, and that the interpersonal skills possessed by their candidates were fundamentally more important than the technical skills possessed by IS graduates. Recruiters feel that technical deficiencies possessed by their newly-hired employees can be overcome in training programs, whereas deficienciesin the ability to communicate effectively present a much larger training challenge. This is consistent with recent literature which reports that of all skills, the following are the most sought after by employers [1]: ā€¢listening and oral communication ā€¢group effectiveness: interpersonal skills, negotiation, and teamwork ā€¢adaptability: creative thinking and problem solving ā€¢personal management of career development Consequently, we as IS educators owe it to our students to begin to consider developing these skills within the IS curriculu

    Incorporating Self-Interest Into Information Systems Development: A Research Model

    Get PDF
    Information systems (IS) analysis and design has much to do with ā€œpeople factors.ā€ Basically, human beings are creatures of self-interest. This paper first proposes a theory of self-interest as the theoretical base and integrative approach to understand the phenomenon of IS development. Based upon the theory proposed, a series of research propositions are then advanced to lay the basis of specifying variables and hypotheses in future research. The two research questions explored are: (1) How does IS analysis and design connote self-interest? (2) How does self-interest affect IS quality

    Supply and Demand for IS Faculty: A Longitudinal Study

    Get PDF
    The supply and demand of IS professors shifted in the last decade. Understanding the fluctuation of the IS faculty job market is a critical success factor for future planning and recruitment efforts. This paper presents the results of a longitudinal study that monitored the supply and demand of IS professors between 1992 and 2004. Data, primarily from the AIS and ICIS placement services, were analyzed to identify the trends in this market. Other relevant issues such as the composition of IS faculty position applicants, supply of IS doctorates, and trends in IS professor salary are also discussed. The paper concludes with recommendations to business and IS schools based on the findings

    Information Systems and Health Care-II: Back to the Future with RFID: Lessons Learned - Some Old, Some New

    Get PDF
    Healthcare facilities face limited resources and expanding expenses. Emerging information technologies offer a means for healthcare to measure and control their resources and workflow processes, and ultimately improve patient care. The usefulness of one emerging information technology, Radio Frequency Identification (RFID), is examined in a proof of application study conducted at a Level-1 trauma unit. Results from the study suggest not only that RFID technology can assist in the measurement and ultimate control of workflow processes, but also that traditional and non-traditional IS practices are necessary for successful RFID implementation. Lessons learned about the idiosyncrasies of RFID implementation and the cleansing and analysis of RFID-generated data are reported
    • ā€¦
    corecore