- Full text PDF available (23)
- This year (1)
- Last 5 years (15)
- Last 10 years (37)
Journals and Conferences
Decision support systems (DSS) are becoming increasingly more critical to the daily operation of organizations. Data warehousing, an integral part of this, provides an infrastructure that enables businesses to extract, cleanse, and store vast amounts of data. The basic purpose of a data warehouse is to empower the knowledge workers with information that… (More)
Web 2.0 is the adoption of open technologies and architectural frameworks to facilitate participative computing. Web 2.0 has the potential to deliver rich peer-to-peer interactions among users, enable collaborative value creation across business partners and create dynamic new services and business models. With the emergence of new information technology it… (More)
research work has been published or is forthcoming in the Encyclopedia of ORMS, Journal of Information Technology and Management, and Annals of OR (a special issue on parallel optimization). Dr. Iyer has presented the findings of her research in several regional, national, and international conferences. ABSTRACT Knowledge Management (KM) is a process that… (More)
Web-based businesses succeed by cultivating consumers' trust, starting with their beliefs, attitudes, intentions, and willingness to perform transactions at Web sites and with the organizations behind them.
Many non-profit organizations have prioritized the need to be transparent in operating procedures, allocation of funds, and the impact of programs aimed at reducing social issues. In an effort to support this practical business need, we highlight how non-profits utilize information systems (IS) to support their strategic social goals through a case study.… (More)
Realizing the potential of intelligent infomediary-based e-marketplaces.
(2008). Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes. Abstract: Systems development methodologies incorporate security requirements as an afterthought in the non-functional requirements of systems. The lack of appropriate access control on information exchange among business… (More)