2011 Capstone Abstracts
Identifying and Prioritizing Information Quality Dimensions for Assurance in the Pre-Processing Stage of Data Storage for Business Intelligence
Hope Angel, information systems manager, Pacific Star Corporation
As business intelligence systems increase the amount of information stored in data warehouses, quality of content becomes more critical (Fisher, Lauria, Chengalur-Smith, & Wang, 2008). Selected literature published between 2001 and 2011 is analyzed to define key dimensions of information quality for consideration at the pre-processing stage, before data reach the warehouse, to ensure maximum quality assurance. The goal is to provide a framework to prioritize dimensions that align with business intelligence goals and objectives.
Business Intelligence Enables Greater Efficiency when Strategically Designed and Tactically Implemented
Lee Averett, custom reporting manager, Cummins Northwest, LLC
This annotated bibliography summarizes 32 articles published between 2000 and 2011 as they address the question Why should a company adopt a strategic approach to business intelligence (BI) and business analysis (BA) in addition to specific tactical approaches, to achieve efficiency gains? Factors are identified related to system design, employee education, and technology to capture, store, and analyze high quality data. The goal is to present upper managers a set of key factors for implementation success.
The Value of the IT Division in Merger and Acquisition Process
Michael Blandford, IT mergers and acquisitions program manager, Intel Corporation
CIOs are often required to develop and implement merger and acquisition strategies to produce revenue and growth (Battey, 2000). Literature published between 1986 and 2011 is examined to identify the growing role of IT in the merger and acquisition process as a means of decreasing risk and project costs, and increasing corporate synergies and project success. The goal is to demonstrate the value of IT as part of the early core deal-making team.
Telework Productivity and Effectiveness: Factors that Influence Results-Oriented Job Assessments
Allison Davis, senior business analyst/project manager, Intel Corporation
The study provides a set of factors that pertain to the essential requirements that employees and managers working in large multinational corporations must consider for job performance assessments of teleworkers. This review identifies the use of a goal-oriented system and technization that create trust relationships and empower employees to achieve a quality outcome. These elements consider the benefits and drawbacks of relevant social and technology factors that influence productivity and effectiveness for results-oriented job assessments.
Security Strengths and Weaknesses of Virtualization as a Green Computing Solution
Joseph Esensten, senior information security engineer, Raytheon, Inc.
Server virtualization technologies enable the data center to consolidate resources in order to improve efficiencies and save energy. This study explores security strengths and weaknesses of this technology within the context of green IT. Selected literature published from 2005 through 2010 is examined. Common attacks, security strengths, and security weaknesses are presented. Green benefits of virtualization and eight recommended security controls are identified to maximize nine positive security features, for use by IT security professionals.
How to Modify Technology and Business Practices within the Mid-sized Service Organization as a Way to Mitigate the Carbon Footprint
Ryan Hogan, Sedgwick CMS, Inc.
The purpose of this study is to identify a set of selected modifications that can be made in relation to both technology and business in a mid-sized service organization, as a way to mitigate the size of an organization's carbon footprint. Literature published from 2000 to 2011 is examined to identify carbon footprint reduction activities and related practices that are deemed socially responsible that, when implemented, can strengthen the triple bottom line sustainability business model.
Adopting Software Design Patterns in an IT Organization: An Enterprise Approach to Add Operational Efficiencies and Strategic Benefits
John Knox, software developer, The Regence Group
Software design patterns are recognized as a valuable part of good engineering practices (Buschmann, 2005). Literature published between 1995 and 2011 is examined in order to provide IT professionals with definitions, classifications, and benefits of commonly used software design patterns. Design patterns capture experience and provide multiple perspectives on design problems. They support improved communication, flexibility and extensibility, and collaborative and mentoring opportunities. Adoption and implementation are required enterprise wide to realize benefits and efficiencies.
Securing Electronic Data Exchanges for HIPAA Covered Entities to Ensure Greater Compliance with Security Rules
Sandesh Kuckian, business systems analyst, MedImpact Healthcare Systems, Inc.
HIPAA requires covered entities to follow standards for protecting the security of electronic protected health information (e-PHI). This study examines the need to develop a secure data exchange in order to maintain compliance with the goals of the HIPAA Security Rule. Literature published between 2000 and 2011 is analyzed to ensure the confidentiality, integrity, and availability of e-PHI while allowing entities to adopt new technologies to improve the quality, safety, and efficiency of patient care.
Learning by Design: Cognitive and Emotional Factors Influencing Informal Learning Experiences in Interactive Environments
Nicole Leaper, senior communication designer, Bullseye Gallery/Bullseye Glass Co.
This study synthesizes current literature in educational and design psychology, information design, human-computer interaction, and museum studies to identify cognitive and emotional factors that influence learning. The purpose is to produce a set of cognitive and emotional factors that museum educators, exhibit designers, information designers, and interaction designers should consider when designing informal learning experiences in interactive environments. Nine identified factor groups include affect, cognition, context, engagement, experiential learning, interactivity, narrative, self concepts, and usability.
Identifying Key Components of Business Intelligence Systems and Their Role in Managerial Decision Making
John Lloyd, senior physical design engineer, Intel Corporation
Business intelligence systems by definition are used to create knowledge to enable business decision-making (Olszak & Ziemba, 2006). This study examines literature published between 2001 to 2010 and identifies the four most common components of a business intelligence system: ETL tools, data warehouses, OLAP techniques, and data-mining. Functions that each component performs are detailed. How each component is used to facilitate managerial decision-making at three levels of organizational management (operational, tactical and strategic) is described.
An Overview of Faculty-centered, Peer-reviewed Online Course Development Models for Application within Accredited Institutions of Higher Education
Linda Mears, communications director, College of Education, University of Oregon
The engagement of faculty in development, course design, and peer review is central to quality online instruction. Thirty refereed case studies of standards-driven online course development in higher education since 2004 are annotated and analyzed for common principles, procedures, or recommended practices. Discussion explores strategic planning for faculty and online administrators, including four phases of implementation, faculty support needs, barriers to engagement, and instructional and technology characteristics faculty must weigh carefully in specific pedagogical designs.
Identifying Cultural Changes Necessary in Traditional Plan-Driven Software Development Organizations when Preparing to Adopt Agile Principles
Susan S. McElfish, project manager, Intel Corporation
Organizational culture plays a critical role in the acceptance and adoption of agile principles by a traditional software development organization (Chan & Thong, 2008). Organizations must understand the differences that exist between traditional software development principles and agile principles. Based on an analysis of the literature published between 2003 and 2010, this study examines nine distinct organizational cultural factors that require change, including management style, communication, development team practices, knowledge management, and customer interactions.
Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs)
Jeffery S. McLean, information security systems engineer, Harris Corporation
As the number of mobile information systems (ISs) increases, so does the amount of data-at-rest (DAR) susceptible to attacks. Literature published from 2001 to 2010 is examined to describe (a)13 selected standards, regulations, and policies requiring DAR security solutions; and (b) currently available DAR security solutions of two types: hardware (encryption) and applications. Focus is on affordability and interoperability. Solutions are presented as a guide to help curb loss of DAR and identity theft.
Information Security Policies and Governance to Safeguard Protected Health Information
Christi Noyes, business analyst, University of Arizona
Healthcare organizations must comply with the Health Insurance Portability and Accountability Act of 1996 and develop information security policies that ensure the confidentiality, integrity, and accessibility of sensitive information; however guidelines are vague. This bibliography identifies policies and describes information security governance strategies designed to ensure compliance. Organizations must create a leadership committee to (a) assess current policies, (b) oversee policy enforcement, (c) note the effects of internal and external influences, and (d) maintain currency.
Using Business Intelligence to Leverage Operational Data in Support of Membership and Asset Growth in Credit Unions
Eric O'Brien, information systems director, Fiserv, Inc.
Deregulation in the credit union industry allows new opportunities to expand services and increase competition with other financial institutions by creating membership diversity beyond the traditional common bond. Operational data stored in data warehouses can be mined and leveraged to analyze and predict membership behavior to increase membership and asset growth. This study examines credit union performance indicators, business intelligence solution options, and four case studies to provide an implementation framework for credit union managers.
Applying Aspects of Data Governance from the Private Sector to Public Higher Education
Marsha Poor, HRIS specialist, Mount Wachusett Community College
The purpose of this annotated bibliography is to identify ways to better manage enterprise-wide data assets within institutions of higher education through data quality actions and data governance options. The goal is to present selected data governance practices within the private business sector for consideration by individuals in public higher education who promote and support data quality initiatives. Topics include data quality barriers, data quality models, data quality management practices, and data quality drivers.
Identifying Cloud Computing Security Risks
Paul Wooley, network analyst, Tyco Electronics
Cloud computing services including Infrastructure as a Service (IaaS) promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA modelas a way to determine security risk.
Implementing Vanilla ERP Systems: Factors to Consider in Strategy, Business Alignment, and Customization
Janice Yick, field manager, BC Hydro
This annotated bibliography examines thirty references to identify factors to consider when implementing a vanilla enterprise resource planning (ERP) system. Literature published since 1998 reveals that there is a high cost in maintaining customized ERP systems, thus companies are deliberately implementing vanilla ERP software. Factors include the need to address strategic and cost implications, organizational adaptation to ERP functionality, deploying strategies to minimize customizations, change management, cross-functional implementation teams, coordination mechanisms, and clear performance measurements.