2010 Capstone Abstracts
Communication Tactics that Describe Innovation Advocacy Leadership as a Way to Inform Organizational Strategic Planning by Leveraging Networks and Building Consensus
Connie Atchley, Associate Director, Enterprise Computing Services, Oregon State University
This study presents six communication tactics that describe innovation advocacy leadership. It examines differences in communication abilities and behaviors represented by divergent processes, which develop new directions necessary to support innovative ideas, and convergent processes which represent the dominant organizational view necessary to support formal strategic planning (Pappas, 2004). Tactics provide advocates with a procedural bridge to the new ideas they propose and include defining innovation context, developing dynamic networks, channeling opportunities, and framing perceptions.
Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners
Thomas J. Betcher, Sr. Disaster Recovery Coordinator
Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance.
A Review of Web 2.0 Technologies and How They Increase Participation and Transparency in Government
Brad Crawford, IT Director, City of Sherwood
Web 2.0 has revolutionized the way individuals communicate, participate, and engage information. Governments have been slow to adopt Web 2.0 technologies, while at the same time are criticized for a lack of participation and transparency. Literature from 1999 to 2010 is reviewed to provide examples of how technologies such as blogs, mashups, social networking, and wikis can be used to create citizen-focused services that support better decision making, access to collective intelligence, and improved citizen orientation.
Organizational Knowledge Creation in the Japanese Multinational Corporation: What U.S. Managers Can Learn from Nonaka
Timothy J. Duncan, Former Sr. Director, Business Planning and Analysis, Fujitsu
This literature review examines the application of Ikujiro Nonaka’s perspective on organizational knowledge creation in the Japanese Multinational Corporation (MNC). Focus is on the SECI model and the concept of ba. Literature published between 1994 and 2009 is synthesized to develop four guidelines for U.S. managers who work in Japanese MNCs, including the need to understand the Japanese view of tacit knowledge conversion and the important role of middle managers in translating top management vision.
Factors for Consideration when Implementing Network Access Control (NAC) Solutions for Small and Medium Sized Businesses (SMBs)
Oscar Hicks, Information Technology Services Director, Clackamas Fire District #1
Implementing network access controls (NAC) requires an awareness of various factors pertaining to information authentication, security, and access. Selected literature published between 1990 and 2009 is examined, based on three factors for consideration: assessment, scope of implementation, and costs. The outcome presents guidelines for small and medium sized businesses in the areas of governance, stratagem, and budgetary impacts. Selected annotated references are provided to emphasize best practices and security framework models currently in use.
Port Security Technology for Closed Container Inspection at United States Seaports of Entry
Archibong J. Ituh, International Trade Specialist, Aurora Networks, Inc.
This study examines technologies currently deployed at United States seaport points of entry to enable U.S. Customs (CBP) agents to inspect all entering closed containers. Analyses of literature published between 2002 and 2009 focuses on use, effectiveness and development of selected technologies, including gamma-ray and X-ray imaging, and radiation detection, as well as research on current screening technologies. The outcome supports CBP inspectors to detect dangerous cargo and minimize disruptions to the international supply chain.
Collective Intelligence for a Competitive Advantage
Sean Lane, Global Transition Manager, Nike, Inc.
This literature review examines collective intelligence through analysis of literature published between 1985 and 2009. Focus is on (a) definitions and applications of collective intelligence related to crowdsourcing and open innovation, and (b) creation of competitive advantage. The final outcome presents five recommendations for how these two types of collective intelligence may be used to support innovation, including the need to create a collective intelligence (CI) system and use of an open innovation business model.
Emergency Notification Systems within a Community College Environment
Stuart Long, Director of Technical Services, Clackamas Community College
Emergency Notification Systems (ENS) are in wide use in higher education, including community colleges. Literature published between 1990 and 2010 is examined regarding the use of ENS in the community college setting in light of the distinct and broad-based community college mission and recent reductions in funding sources. The analysis produces eleven recommendations to guide planning and implementation of ENS in an open community college environment, for use by community college technology and safety administrators.
An Inventory of Web-Based Tools Used to Support the Developing Field of Online Therapy
Pamela Merkel, Managing Member of LLC, Bayside Virtual Treatment Center
This study provides a descriptive inventory of web-based tools used in the online delivery of psychotherapeutic services. Growth in the field of online therapy means greater opportunity for the professional therapist in offering online psychotherapy services. Tools, in order of popularity, include websites, email, internet relay chat, instant messaging, forum and bulletin boards, video conferencing and webcams, virtual reality software, and text messaging. Tools are used to treat anxiety disorder, mood disorder, and personality disorder.
Framing, Defining, and Implementing a Copyright Compliance Policy to Manage Risk in a Digital Publishing Environment
Amy Norred, Technical Publications Specialist, CH2M HILL
Digital technology allows unprecedented access to information (Armstrong, 2005). This study examines selected literature published between 1990 and 2010 to provide communications professionals working in the United States with a 14-point guide to help frame, build, and implement a copyright compliance policy related to the use of digital graphic elements including photos, maps, and pictographs. Focus is on the use of a policy to reduce financial liability as part of a larger risk management program.
Emergent Practice in Online Corporate Reputation Management
Chae Pak, Managing Partner, RowHouse LLC
The Internet culture presents a paradigm shift for corporate communicators; organizational success is increasingly dependent on stakeholder activities online. This study examines online corporate reputation management initiatives, through analysis of literature published since 2000. Three overarching principles emerge: (a) demonstrate sincerity and respect as the essence of all exchanges, (b) use a multi-step approach for the most effective online reputation management initiatives, and (c) integrate the corporate communications function within the core of the organization.
An Inventory of Semantic Models (Ontologies) for Use When Managing Enterprise Tacit Knowledge
Philip Pridmore-Brown, VP Marketing and Product Services, Thetus Corporation
Semantic web technologies provide flexible tools and approaches for modeling enterprise tacit knowledge. Literature published after 2000 identifies three primary types of ontologies: (a) upper level, describing general or common concepts, (b) mid-level, extending upper level concepts to a domain space, and (c) lower level, or domain specific, that define the nuances to an organization or domain (Kiryakov, Simov, & Dimitrov 2001). Tools and ontologies are cataloged in an inventory, including advantages and disadvantages.
How the Use of Interorganizational Systems by Participants of a Retail Supply Chain Supports Competitive Advantage
Eric Reese, Global Messaging, ModusLink Global Solutions
This review examines how interorganizational systems (IOS) are used to provide a competitive advantage to both individual firms and the supply chain as an aggregate. Selected literature published between 2002 and 2009 is analyzed to provide IT managers an understanding of how IOSs are being used in support of competitive advantage. Focus is on the evolution of IOS, from electronic data interchange (EDI) and electronic markets (EMs), to extensible markup language (XML).
Intellectual Property Policy: Risk Identification and Protection in the Global Market
TracieLyn Rydzewski, Information Manager, Intel Corporation
Organizations that conduct business in the global market expose themselves to potential information risk, including intellectual property (IP) theft, exposure, and breach of laws and regulations (Corbin, 2002). Key elements of this study examine IP risk management and identification practices, IP protection, and the value of building a security awareness IP culture. The creation of an IP policy should evolve to accommodate the shifting economic environment and the organization’s business goals, culture, and operating environments.
Employing the Generally Accepted Recordkeeping Principles® (GARP®) to Identify Practices for Efficient and Compliant Electronic Records and Information Management
Jason C. Stearns, CRM, Corporate Vice President, Corporate Records Manager, New York Life Insurance Company
Information Technology (IT) and Records and Information Management (RIM) professionals must work together to manage the expansion of electronic records and information (ARMA International, 2009e). This study, based on literature published between 2005 and 2010, employs the Generally Accepted Recordkeeping Principles® (GARP®)to identify 23 practices for effective and compliant electronic RIM. Practices, framed in relation to eight GARP® principles, are presented as a comprehensive guide for RIM and IT professionals tasked with recordkeeping responsibilities.
Lowering the Carbon Emissions Footprint of Enterprise Data Centers Through Energy Efficiency Gains
Cecilia Tomory, Principle Data Base Administrator, PacifiCorp
Selected literature published between 2004 and 2009 is mined for emerging trends and best practices regarding green IT and data centers. Environmental issues are becoming a serious industry concern, spurred by local and global initiatives (Kumar, 2009). Steps are identified for enterprise data center managers, in order to measure, manage, and improve power consumption efficiency within their facility. Data center energy efficiency gains save power, lower energy costs, and decrease overall corporate carbon footprint (Freeman, 2009).