Papers by Indushobha Chengalur-Smith
IGI Global eBooks, Jan 30, 2017
Although information sharing is highly desirable in a supply chain, the reality is that most supp... more Although information sharing is highly desirable in a supply chain, the reality is that most supply chain participants restrict themselves to dyadic information sharing (i.e., information sharing between immediate, first-tier supply chain participants). In this investigation, data is collected from one system that permits extensible information sharing (i.e., information sharing beyond immediate, first-tier supply chain participants) to empirically investigate the determinants of extensible information sharing. The goal of this study is to identify specific actions that promote extensible information sharing. It uses hierarchical regression analysis to examine the contribution of these actions, after controlling for certain dyadic information sharing and industry practices. According to the results, companies that pursue real-time integration of the supply chain and are willing to change the roles and responsibilities of their employees engage in extensible information sharing. Surprisingly, it is found that companies that have a long-term relationship with immediate supply chain participants are less likely to expand their information sharing beyond dyadic information sharing, perhaps because of a perception that their information needs are adequately met.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Supply Chain Management Review, May 1, 2010
Subtitle: Conventional wisdom is that most companies today, particularly the larger ones, have ad... more Subtitle: Conventional wisdom is that most companies today, particularly the larger ones, have adopted the practices associated with sound supply chain management. But that may not always be the case. New research reveals a clear gab between adopters and the laggards--or the "sophisticated" and "less sophisticated" practitioners. This article explains wwhat (sic) differentiates the two groups on key dimensions, and tells what you can do enhance your level of sophistication.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Springer eBooks, 2016
Bookmarks Related papers MentionsView impact
PsycTESTS Dataset, 2017
Bookmarks Related papers MentionsView impact
The phenomenon of social support – aid and assistance exchanged through social relationships and ... more The phenomenon of social support – aid and assistance exchanged through social relationships and interpersonal transactions – has been studied for decades with a focus on discovering the mechanism that lies between support exchange and personal wellbeing. In the age of the Internet, researchers also have shifted their focus to online support exchange. However, little attention has been paid to conceptualizing the determinants of support provision in virtual support communities. Drawing from social capital theory, this study attempts to bridge this gap by presenting a model that applies the structural, relational, and cognitive dimensions of social capital to theorize the determinants of the provision of informational and emotional support in virtual support communities. Through the use of social network analysis and machine learning techniques, messages from a virtual support community for women with breast cancer are analyzed. The analysis results are used for empirically testing the framework modeling support provision.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Communications of the Association for Information Systems, 2014
Bookmarks Related papers MentionsView impact
are using information and communications technologies (ICTs) to connect mutually dependent activi... more are using information and communications technologies (ICTs) to connect mutually dependent activities and tasks. Connected organizations may attain greater insight into the availability of critical resources, improved ability to respond quickly to events affecting the organization, and greater awareness of the variation between plans and actual results. This contribution discusses electronic connectivity
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Encyclopedia of Networked and Virtual Organizations
In a global economy, organizations need to collaborate with other organizations because physical ... more In a global economy, organizations need to collaborate with other organizations because physical networks of suppliers and partners compete against one another rather than individual organizations. To enable more effective and efficient physical networks, organizations are using information and communications technologies (ICTs) to connect mutually dependent activities and tasks. Connected organizations may attain greater insight into the availability of critical resources, improved ability to respond quickly to events affecting the organization, and greater awareness of the variation between plans and actual results.
Bookmarks Related papers MentionsView impact
... xvi Craig Fisher Poughkeepsie, New York craig.fisher@marist.edu Eitel Lauría Poughkeepsie, Ne... more ... xvi Craig Fisher Poughkeepsie, New York craig.fisher@marist.edu Eitel Lauría Poughkeepsie, New York eitel.lauria@marist.edu Shobha Chengalur-Smith Albany, New York shobha@albany. edu ... In the summer of 2002, a couple checked into a lodge and were given a room key ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Information Technology & People, 2017
Purpose Our knowledge of why organizations continue to use open source software (OSS) infrastruct... more Purpose Our knowledge of why organizations continue to use open source software (OSS) infrastructure technologies is relatively limited, and existing models appear inadequate to explain this continuance phenomenon given that they are set at the individual level and also do not take into account the unique characteristics of OSS. The paper aims to discuss these issues. Design/methodology/approach Using an institutional perspective, this paper posits that coercive (business value of IT) and normative (open source ideology (IDEO)) factors may be credited with sustaining the continued use of OSS technologies. The study argues that organizations that subscribe to IDEO are more likely to continue using OSS technologies. Survey data are collected from organizations that have implemented an OSS infrastructure technology and a moderated multiple regression analysis is performed to test the proposed hypotheses. Findings In addition to the business value provided by OSS technologies, adherence...
Bookmarks Related papers MentionsView impact
International Journal of Information Management, 2021
Abstract Farming communities in developing countries like India are victims of the information di... more Abstract Farming communities in developing countries like India are victims of the information divide. Voice-based information sharing services (VISS) can bridge this divide and help farmers address a range of challenges by exchanging knowledge with their peers. An analysis of in-depth phone interviews with farmers in remote, rural Gujarat, India, reveals four stages for developing a VISS for marginalized communities in developing countries. The four stages are: identify gatekeepers to seed the VISS, expand the VISS by building on existing communities of practice, share information, and incentivize members to sustain the VISS. The VISS in this study is based on IBM’s Spoken Web platform, which enables even illiterate and semi-literate farmers to seek, share, use, and benefit from information using feature mobile phones. Research contributions and practical implications of the study are discussed at the end.
Bookmarks Related papers MentionsView impact
Proceedings of the Association for Information Science and Technology, 2017
This study analyzes the process adopted by information poor communities of farmers from five remo... more This study analyzes the process adopted by information poor communities of farmers from five remote villages in Gujarat, India, which use IBM's Spoken Web for building an information network (INet). Spoken Web enables information poor communities to create and access VoiceSites over their mobile phones. After analyzing in‐depth phone interviews with 31 farmers using grounded theory principles, we propose a four‐stage model of seeding, building, growing and scaling an INet among information poor communities of farmers in rural India. We conclude that (a) gatekeepers of farmer communities, (b) communities of practice, (c) collaborative information behavior (CIB) among the farmers and (d) benefits of using INet play a key role in seeding, building, growing and scaling stage respectively. Thus, the INet reduces information divide among isolated farmer communities by allowing them to seek, produce and share information in their native language at any time of the day without requiring them to invest in any new technology or travel.
Bookmarks Related papers MentionsView impact
The goal: Not just better technology but better business processes that make a company more compe... more The goal: Not just better technology but better business processes that make a company more competitive. Client/server systems link clients and servers via a network to support distributed computation, analysis, and presentation, providing a common method for distributing computer power within companies. Although companies are embracing client/server technology when moving from legacy systems [4], a 1996 survey of IS managers by InformationWeek found that only 40% of them consider client/server systems " a worthwhile investment " [1]. In fact, only about 16% of all client/server applications were (and are) viewed as successful by the companies implementing them [5].
Bookmarks Related papers MentionsView impact
Computers & Security, 2019
Abstract The goal of this study is to examine the effects of learner control on information secur... more Abstract The goal of this study is to examine the effects of learner control on information security (ISec) training effectiveness. While organizations recognize the importance of education and training in security and invest in such efforts, the design of these programs often lacks theoretical grounding and the outcomes are often not critically evaluated. This paper attempts to fill these gaps by (1) identifying desirable characteristics for the design of such training programs, (2) using these characteristics as guidelines to design a web-based information security training (3) experimentally evaluating the effectiveness of the training using critical outcomes such as training satisfaction, security training performance, self-efficacy, perceived threat severity and susceptibility. We find that web based ISec training that incorporates learner control positively affects training reactions and learning outcomes.
Bookmarks Related papers MentionsView impact
Journal of Computer Information Systems, 2015
In this paper, we conceptualize about, and empirically test for, differences between the more tra... more In this paper, we conceptualize about, and empirically test for, differences between the more traditional Open Source Software (OSS) projects that are aimed towards techies-only and the projects that are aimed towards the general population. By drawing upon the theories of Reciprocity and Network Effects, we propose that OSS projects for techies-only are more likely to exhibit characteristics that are explained by balanced reciprocity, whereas OSS projects for the general population are more likely to show characteristics that are rooted in generalized reciprocity. In addition, we propose that local network effects can be used to explain certain characteristics of OSS projects for techies-only, whereas direct and indirect network effects shape the corresponding characteristics of OSS projects for the general population differently. The findings support our hypotheses and lead us to recommend actions for OSS projects targeted towards the general population, as well as suggestions for future research.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Indushobha Chengalur-Smith