1,319 research outputs found

    Decision Support Variables for Reverse Logistics

    Get PDF
    The purpose of this study is to discover variables that should be considered in the creation of a strategic knowledge and decision support system for reverse logistics. This paper addresses a gap in the Lambert model of supply chain management through refining the link between the returns management process and the overall strategy of a supply chain firm by addressing the decision as to which reverse logistics activity to pursue. Current literature is sparse in this area and existing DSS do not specifically address this problem. In order to determine what variables should be considered in such a system, recent reverse logistics frameworks which address returned-products disposition were reviewed. Using an inductive literature review process and subsequent content analysis, the authors found seven factors that are relevant to reverse logistics disposition. Propositions are offered for further research in this area. The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government

    Teach Them How They Learn: Learning Styles and Information Systems Education

    Get PDF
    The rich, interdisciplinary tradition of learning styles is markedly absent in information systems-related research. The current study applies the framework of learning styles to a common educational component of many of today’s information systems curricula - object-oriented systems development - in an effort to answer the question as to whether one’s learning style, when matched with a specific complementary instructional methodology, results in increased domain-specific performance. The data collected from 196 information systems majors enrolled in object-oriented systems development courses suggest that task performances increases significantly when the instructional methodology closely mirrors the student’s learning style inclination

    An Assessment of the Mathematics Information Processing Scale: A Potential Instrument for Extending Technology Education Research

    Get PDF
    Many argue that the United States is falling behind other countries in technology innovation. Some attribute this situation to ineffective education in the areas of math, science, and technology. Research using affective measures has provided evidence of links between student attitudes in math and technology education. With the aim of extending the research, this study examines the psychometric properties of the Mathematics Information Processing Scale1 (MIPS). The MIPS uses both cognitive and affective measures to explore various dimensions of students’ approaches to learning statistics and mathematics. The original study used exploratory factor analysis, while this study uses confirmatory factor analysis to revise the MIPS instrument. By combining both cognitive and affective measures in a single instrument, the MIPS offers the potential to contribute new research knowledge toward the goal of improving math and technology education

    Investigating Barriers to Knowledge Management Implementation In the U.S. MIlitary: A Focus on Managerial Influences

    Get PDF
    The knowledge management literature identifies a variety of factors that may influence KM implementation in organizations. Over the past ten years, each of the U. S. military services has implemented KM programs to varying degrees. Although knowledge management research continues to grow, little has focused exclusively on efforts in the military context. Using Holsapple and Joshi’s KM “influences” framework (2000)--which addresses managerial, resource, and environmental factors--as guiding theory, this multiple-case study reports on the “managerial” factors that have influenced KM implementation across the U. S. military services. The results indicate a number of negative managerial influence factors (i.e. barriers) have thwarted progress, the most significant being lack of leadership commitment & lack of evidence/measurement that reveal a return on investment. Identification of these influence factors not only reinforces existing theory, but also offers a practical guide for specific interventions that focus on leadership & user KM education, KM proponent leadership/organizations, and service-wide policy, guidance, and governance

    Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking

    Get PDF
    Computer and network security are central issues confronting organizations and individuals. This paper explores the use of biology as a reference discipline that can provide meaningful insight and innovation in the area of network security. Specifically, we propose a framework for thinking about network security by examining the similarities between the defense mechanisms of a cell, and the security processes and methodologies of networked computer systems that defend an organization\u27s information resources. Researchers and commercial developers can use this framework to help spark ideas that lead to further research and development in network security. The framework also provides a platform for educators in teaching students about the functions of computer network concepts. Our analysis of defense mechanisms in biological cells showed that security in cells is integrated, ubiquitous, and continuous. An example illustrates how the framework can generate ideas for improving network security

    An Investigation Of Organizational Information Security Risk Analysis

    Get PDF
    Despite a growing number and variety of information security threats, many organizations continue to neglect implementing information security policies and procedures.  The likelihood that an organization’s information systems can fall victim to these threats is known as information systems risk (Straub & Welke, 1998).  To combat these threats, an organization must undergo a rigorous process of self-analysis. To better understand the current state of this information security risk analysis (ISRA) process, this study deployed a questionnaire using both open-ended and closed ended questions administered to a group of information security professionals (N=32).  The qualitative and quantitative results of this study show that organizations are beginning to conduct regularly scheduled ISRA processes.  However, the results also show that organizations still have room for improvement to create idyllic ISRA processes.&nbsp

    Identification of Klebsiella capsule synthesis loci from whole genome data.

    Get PDF
    Klebsiella pneumoniae is a growing cause of healthcare-associated infections for which multi-drug resistance is a concern. Its polysaccharide capsule is a major virulence determinant and epidemiological marker. However, little is known about capsule epidemiology since serological typing is not widely accessible and many isolates are serologically non-typeable. Molecular typing techniques provide useful insights, but existing methods fail to take full advantage of the information in whole genome sequences. We investigated the diversity of the capsule synthesis loci (K-loci) among 2503 K. pneumoniae genomes. We incorporated analyses of full-length K-locus nucleotide sequences and also clustered protein-encoding sequences to identify, annotate and compare K-locus structures. We propose a standardized nomenclature for K-loci and present a curated reference database. A total of 134 distinct K-loci were identified, including 31 novel types. Comparative analyses indicated 508 unique protein-encoding gene clusters that appear to reassort via homologous recombination. Extensive intra- and inter-locus nucleotide diversity was detected among the wzi and wzc genes, indicating that current molecular typing schemes based on these genes are inadequate. As a solution, we introduce Kaptive, a novel software tool that automates the process of identifying K-loci based on full locus information extracted from whole genome sequences (https://github.com/katholt/Kaptive). This work highlights the extensive diversity of Klebsiella K-loci and the proteins that they encode. The nomenclature, reference database and novel typing method presented here will become essential resources for genomic surveillance and epidemiological investigations of this pathogen

    Uncovering Research Opportunities in the Medical Informatics Field: A Quantitative Content Analysis

    Get PDF
    With rapid improvements in technology, the ever-pressing need to reduce healthcare costs, and continuing legislation emphasizing medical reforms, the demand for research within the healthcare/information systems interface is growing. In this study, we ascertain the prevalent themes from the extant medical informatics literature in an effort to motivate research beyond the traditional domain of health information technology research so information systems scholars can better understand where their expertise might contribute to advancements in healthcare. We used a quantitative content analysis method to systematically explore 2,188 article texts from journals in medical informatics, medicine, and MIS published over a ten-year period. Texts were analyzed using centering resonance analysis and factor analysis and the following themes emerged from the literature: Analytics; Healthcare Operations and Standards (with sub-themes: Operations, Project Management, and Information Assurance); Knowledge Transfer/Communication (with sub-themes: Extending beyond the Organization, Internal to the Organization, and Patient-Provider); Perceptions and Managing Expectations of Information Technology; Advancements in Research; and Software as a Service. In this article, we discuss these themes in greater detail and offer directions for future research

    Paedophiles in the community: inter-agency conflict, news leaks and the local press

    Get PDF
    This article explores the leaking of confidential information about secret Home Office plans to house convicted paedophiles within a local community (albeit inside a prison). It argues that a politics of paedophilia has emerged in which inter-agency consensus on the issue of ‘what to do’ with high-profile sex offenders has broken down. Accordingly, the article situates newspaper ‘outing’ of paedophiles in the community in relation to vigilante journalism and leaked information from official agencies. The article then presents research findings from a case study of news events set in train following a whistle-blowing reaction by Prison Officers’ Association officials to Home Office plans. Drawing from a corpus of 10 interviews with journalists and key protagonists in the story, the article discusses both the dynamics of whistle blowing about paedophiles and also what happens after the whistle has blown
    • 

    corecore