David Wyld

David Wyld
Southeastern Louisiana University · Management

DBA

About

154
Publications
60,009
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,089
Citations
Introduction
David Wyld currently serves as the Merritt Professor of Management at Southeastern Louisiana University. He is widely published across management, public administration, technology and supply chain topics. Dr. Wyld is the founder and publisher of Modern Business Press (www.modernbusinesspress.com), which is bringing a new model of academic publishing to fields across the business and technology spectrum. He invites all academics around the globe to explore the opportunities for presenting and publishing their works with Modern Business Press. He is also actively looking for those willing to serve as journal editors and members of editorial boards of the numerous Modern Business Press journals, spanning management, marketing, accounting, economics, finance, computing and technology.

Publications

Publications (154)
Article
Full-text available
In January 2020, scenes online of pain and suffering in Chinese hospitals heralded a pandemic that would negatively impact not just people’s health, but would hinder efforts by organizations worldwide, including the operations of almost all universities. In March 2020, colleges and universities moved learning to virtual delivery and canceled on-cam...
Article
Full-text available
In the Spring of 2020, colleges and universities around the world joined primary and secondary education providers and businesses of all types in moving to an online, socially distant environment. Seen as necessary to stem the relentless spread of COVID-19, a deadly contagion, the move dramatically impacted lives, livelihoods and social connections...
Article
Full-text available
One does not have to teach retailing or supply chain management to be aware of the immense changes taking place in retailing. Indeed, the speed at which brick and mortar retailers were folding before the pandemic has only quickened given the impact of the COVID-19 pandemic across the economy. Staying abreast of the retailers and suppliers going out...
Article
Full-text available
If only we had more Lakens in our busy world! Who is she, you ask? Laken is a server at a very good BBQ place just outside Baton Rouge, Louisiana....
Article
Full-text available
It’s all about attitude. And we can all strive to do better in our worklives to make the lives of others — and ourselves — better in the process.
Article
Full-text available
The phrase “all over the map” perfectly describes McDonald’s strategy over at least the past decade! So while the company’s stock performance has been fairly robust during this time, the Golden Arches’ has lost a good deal in terms of its overall market position, its brand reputation, and its relationships with the company’s franchisees. Now howeve...
Article
Full-text available
hen it comes to improving customer service, there are three truths today that will not change, no matter how much technology is involved and how many different service channels we make available to customers and prospective buyers. These should be at the forefront of any discussion in companies of any size when it comes to how do we make the omnich...
Article
Full-text available
Radio frequency identification (RFID) technology can save nurses time, improve quality of care, enhance patient and staff safety, and decrease costs. However, without a better understanding of these systems and their benefits to patients and hospitals, nurses may be slower to recommend, implement, or adopt RFID technology into practice. J Contin Ed...
Article
This article is a departure from many prior studies in the literature on Medicare spending in the United States. Previous works have focused on time-invariant or hereditary demographic characteristics and congenital health status. In contrast, this study examined state-level variations in Medicare costs per enrollee with special emphasis on promine...
Chapter
This article examines the pressures affecting procurement practices in the federal government and how reverse auctioning represents a significant change in the way acquisition will be carried out going forward. Specifically, the article describes how a major federal agency has made use of a reverse auction-centered online marketplace to revamp its...
Article
Full-text available
This article serves as the second part in a two-part series that provides an overview of the reverse auction concept, building on the best research in the field of supply chain management. In this instalment, we look at the concerns involved in making reverse auctions work in practice – the implementation issues. Frist, we look at when reverse auct...
Article
Full-text available
This article serves as the first part of a two-part series that will provide an overview of the reverse auction concept, building on the best research in the field of supply chain management. In this instalment, we examine the growth of reverse auctions in both private and public sector procurement. We then provide a differentiation between the mor...
Book
This book constitutes the proceedings of three International Conferences, NeCoM 2011, on Networks & Communications, WeST 2011, on Web and Semantic Technology, and WiMoN 2011, on Wireless and Mobile Networks, jointly held in Chennai, India, in July 2011. The 74 revised full papers presented were carefully reviewed and selected from numerous submissi...
Book
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired an...
Article
Purpose ‐ The purpose of this paper is to provide an overview of the fast-growing virtual world, focusing on the appeal of these environments for the "digital native" generation and the growth of Second Life. Design/methodology/approach ‐ The paper examines the latest research on virtual worlds and Second Life, examining the corporate presence "in-...
Article
Cloud computing has been touted as a revolutionary concept in computing. In this article, we introduce the cloud computing concept, and then discus the implications for the use of the cloud model in higher education. Due to budget constraints and the power of computing “on-demand,” many believe that colleges and universities will be at the forefro...
Chapter
This chapter provides an overview of RFID (radio frequency identification) and the emerging use of the technology in the governmental sector. It examines the fundamental aspects of what RFID technology is, why there is a need for it, and how it is advantageous vs. present bar code technology. The chapter provides a look at how RFID is being used to...
Article
Full-text available
This article examines how RFID (radio frequency identification) is poised to help transform the way wehandle our trash - our MSW (Municipal Solid Waste). We provide an overview showing that trash trendsin the United States are not good, as modern life has meant increasing volumes of trash that can bedisposed of in fewer and fewer landfills. We exam...
Article
Full-text available
Cloud computing is fast creating a revolution in the way information technology is used and procured byorganizations and by individuals. In this article, we examine what cloud computing is and the importanceof this new model of computing. We then examine non-military uses of cloud computing in governmentsacross the globe, from the Unites States to...
Article
Full-text available
This article examines the unique value proposition presented by RFID (radio frequency identification) forjewelry retailers’ inventory management. The article provides a general overview of RFID technology.The author then presents findings on its use in jewelry retailing to date by innovative companies aroundthe world. The research establishes that...
Article
Full-text available
This paper explores how RFID (radio frequency identification) technology can be employed to fight the ever-growing shoplifting problem, estimated to cost the world's retailers almost $100 billion annually. The paper provides an overview of RFID technology. We then analyze how RFID is beginning to see utilization in-store not just for security, but...
Article
In the wake of Hurricane Katrina and subsequent major hurricanes, evacuation planning and execution have taken-on a heightened level of interest from both public officials and the general public. In this article, the authors examine how radio frequency identification (RFID) can be utilized to not just facilitate mass evacuations due to hurricanes,...
Article
This article examines the most frequent cause of data breach today—that of stolen or lost laptops. Over one million laptops go missing each year in the United States, creating tremendous problems and exposure for American companies, universities, government agencies, and individuals. This article first looks at the size and scope of the laptop thef...
Conference Paper
Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these c...
Article
Full-text available
This paper provides the reader with a look at the cloud computing concept and its likely impact on information technology. It begins with a look at how cloud computing has rapidly evolved, examining what cloud computing is – and is not, seeing how the cloud has quickly taken hold as part of our everyday lives and how it is poised to become a major...
Article
This article explores the prospects for radio frequency identification (RFID) to be utilised by firms throughout the oil and gas industry. The article first provides the reader with an overview of RFID technology, how it works and how it is being applied in various settings. The present research found that innovative companies around the world are...
Chapter
We are in the midst of what may become one of the true technological transformations of our time. RFID (radio frequency identification) is by no means a new technology. RFID is fundamentally based on the study of electromagnetic waves and radio, pioneered in the 19th century work of Faraday, Maxwell, and Marconi. The idea of using radio frequencies...
Article
Purpose This paper seeks to investigate the fast‐growing problem of counterfeit prescription drugs and the steps being taken by both the private and public sectors to counteract it. Design/methodology/approach The author documents both the size and scope of the counterfeit pharmaceutical problem in the USA. The paper also looks at the steps being...
Article
Purpose The purpose of this paper is to explore RuBee, which is a new form of automatic identification technology that can complement many of the new developments for the use of radio frequency identification (RFID). This is a timely piece, which examines the technology behind RuBee and the uses of this new identification tool. Design/methodology/...
Article
Purpose The purpose of this paper it to examine the potential for radio frequency identification (RFID) to be used to tag packs, cartons and cases of cigarettes, both to combat the fast‐growing, global problem of cigarette smuggling and to provide tobacco companies and retailers with better inventory control and business intelligence. Design/metho...
Article
Full-text available
Purpose The purpose of this paper is to examine how corporate executives of companies are using blogging as a new communications channel. Design/methodology/approach The paper presents an overview of the blogging phenomenon, placing it in context of the larger growth of Web 2.0 and user‐generated content. The paper provides the reader with a prime...
Article
Radio frequency identification (RFID) allows for objects to be identified electronically through the use of radio waves. RFID can be applied to table games in casinos by allowing gaming operators to gain the same levels of customer and game-play data in table game operations as they presently have in the slot area. Using chips imprinted with RFID,...
Article
Full-text available
Blogs are certainly at the forefront of the Web 2.0 movement. Blogging has been alternativelycategorized as both "the next big thing" (Gallo, 2004) and an "Internet Wasteland" (Anonymous, 2003).In a nutshell, a blog can be differentiated from a website in that it is an easier to create and update webvehicle, usually simply by typing into a preprogr...
Conference Paper
In this paper, we will explore the growth of virtual worlds – one of the most exciting and fast-growing concepts in the Web 2.0 era. We will see that while there has been significant growth across all demographic groups, online gaming in MMOGs (Massively Multiplayer Online Games) are finding particular appeal in today’s youth – the so-called “digit...
Conference Paper
This paper examines the most frequent cause of data breach today – that of stolen or lost laptops. Over one million laptops go missing each year in the U.S., creating tremendous problems and exposure for American companies, universities, government agencies, and individuals. This paper first looks at the size and scope of the laptop theft problem a...
Conference Paper
In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities’ staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Expl...
Article
This article examines the applications of RFID technology In the world of sport. It provides the reader with an overview of RFID and its uses In business. The article looks at how RFID can be employed in the games themselves, in sports venues and In sports memorabilia as a means of enhancing the value, enjoyment and security of sports. The author c...
Chapter
The reverse auction tool has evolved to take advantage of Internet technology and has been identified by many large organisations as a tool to achieve substantial procurement savings. As companies adopt this technology it is important for them to understand the implications of this type of procurement. This chapter re-visits a reverse auction event...
Article
Purpose-This article examines the phenomenon of RFID (radio frequency identification) technology and its implications for both management practice and research over the next decade. Design/methodology/approach - The article examines RFID, incorporating the latest information and research findings on how the technology is being utilized today and pl...
Article
This article examines the adoption of Radio Frequency Identification (RFID) technology in the pharmaceutical supply chain to address the unique challenges this industry faces. Two major issues in drug distribution are medical errors in administration of drugs and the recent growth of counterfeit drugs. Due to its promise in addressing these and oth...
Chapter
This chapter provides an overview of RFID (radio frequency identification) and the emerging use of the technology in the governmental sector. It examines the fundamental aspects of what RFID technology is, why there is a need for it, and how it is advantageous vs. present bar code technology. The chapter provides a look at how RFID is being used to...
Chapter
The reverse auction tool has evolved to take advantage of Internet technology and has been identified by many large organisations as a tool to achieve substantial procurement savings. As companies adopt this technology it is important for them to understand the implications of this type of procurement. This chapter re-visits a reverse auction event...
Article
Purpose As some time has passed since the enactment of the fairpay overtime initiative of the Fair Labor Standards Act (FLSA), confusion still persists regarding the overtime benefits of employees. This is evidenced by the increased level of litigation and class action lawsuits regarding overtime violations. This article attempts to help clarify fo...
Article
Purpose This article examines the phenomenon of RFID (radio frequency identification) technology and its implications for both management practice and research over the next decade. Design/methodology/approach The article examines RFID, incorporating the latest information and research findings on how the technology is being utilized today and pla...
Article
In the private sector, there is a great deal of interest in the use of forward auctions as a means of increasing recovery rates on surplus or returned items, as part of an overall reverse logistics strategy. Only recently has the public sector realized that it too has the potential to solve its reverse logistics problem and derive revenue at the en...
Article
Epidemiologists are concerned the next deadly global cognition will be a new kind of deadly flu which humans have no resistance. Since the 1960s, their alarm has been focused on a bird (avian) virus (H5N1). This virus is generally harmless in its host species, but it is extremely deadly when contracted by humans. H5N1 mutates quickly and tends to p...
Article
Full-text available
Purpose Examines the adoption of radio frequency identification (RFID) technology in the commercial aviation industry, focusing on its role in baggage handling and security. Design/methodology/approach Draws upon academic and trade literature to provide a current overview of developments in the implementation of RFID technology in commercial aviat...
Article
Recently, the Department of Labour’s Fairpay Overtime Initiative was enacted to revamp the previous Fair Labour Standards Act (FLSA) rules governing employee overtime benefits. This legislation is a significant departure from the past regulations in determining overtime eligibility. In an effort to clarify these new FLSA guidelines, the authors hav...
Article
Full-text available
This article examines current developments regarding the adoption of RFID technology in the retail supply chain. An explanation is provided of what Radio Frequency Technology (RFID) is and how it works. The benefits of this technology to retailers are outlined in contrast to Bar Coding. Though the technology offers promise for retailers, it does pr...
Chapter
The global ERP industry that blossomed in the 1990’s automating back office operations has made moves to introduce a “second wave” of functionality in ERP systems. In 2002/3 there was an expanded focus on mysap.com, small to medium enterprises and the expansion into “second wave” products. Companies around the world are exploring various Internet b...
Article
In this brief paper-intended to provoke continuing thought and debate on a myriad of definitions of e-government-the author offers a perspective on the critical elements he believes are necessary for any working definition of e-government. This perspective is based on the 3Ps of e-government. These are: (1) participants, (2) purposes, and (3) proce...
Article
Full-text available
Addresses consumer perspectives of Radio Frequency Identification (RFID). States that some consumers put up barriers against new technology, while others welcome innovations. Idengtifies that market leaders can pretty much use this technology as they wish, meaning boom time for consumer product firms and pain for privacy advocates.
Article
The war in Iraq, the threat of terrorism and the Severe Acute Respiratory Syndrome (SARS) epidemic have made international business activities increasingly difficult and risky. The worldwide economic downturn and slow growth in domestic markets are forcing companies to depend more than ever on overseas trade. SARS emerged in China in November 2002...
Article
Much of the hype associated with the impact of electronic business is associated with the business to business (B2B) model. Analysts believe that enormous cost savings and efficiencies can be achieved through the utilisation of e-procurement, a component of theB2Bmodel. The role of procurement and the emerging use of large information systems to co...
Article
This article presents an analysis of three years results from the quarterly Report on Technology in Supply Management, conducted through a joint effort of the Institute for Supply Management (ISM) (formerly the National Association of Purchasing Managers) and Forrester Research. This report provides the best snapshot on the growth of e-procurement...
Chapter
The global ERP industry that blossomed in the 1990’s automating back office operations has made moves to introduce a “second wave” of functionality in ERP systems. In 2002/3 there was an expanded focus on mysap.com, small to medium enterprises and the expansion into “second wave” products. Companies around the world are exploring various Internet b...
Article
The Institute for Supply Management recently declared that the cost savings and efficiencies to be gained through e-Sourcing can provide benefits not only to individual entities that use them for the acquisition of goods and services, but in the aggregate, to the economy as a whole (Davies, 2002). This study examines the potential impact of strateg...
Article
In the late 1990’s, online B2B auctions were proliferating and were being adopted in a wide variety of circumstances. The reverse auction tool has evolved to take advantage of internet technology, and online auctions have been identified by many large organisations as a tool to achieve procurement savings. As companies adopt this technology, it is...
Article
In this paper, the author examines the growth of B2B e-commerce, examining results from the ISM/Forrester Reports on e-Business conducted to date. Through this analysis, the researcher demonstrates that contrary to the generally-held perception that B2B has experienced a sharp downturn in the wake of the recession, e-procurement has taken hold and...
Article
This article explores the growing rise of behaviour-based safety programmes in the workplace as a means of preventing on-the-job injuries. In it, the authors delve into the history of both incentive-based and behaviour based safety programmes, exploring the administrative, political, and practical issues involved with each. The authors then present...
Article
Documents a case study in the use of Shainin Design of Experiments in an industrial honing operation. Provides an overview of the process which attempts to reduce process variability by isolating the most influential factor (Red X). Shows the details of the week-long experiment and gives some analysis of the data. Uses multiple statistical techniqu...

Questions

Question (1)
Question
I am the founder and publisher of Modern Business Press (www.modernbusinesspress.com), which is bringing a new model of academic publishing to fields across the business and technology spectrum. I'm inviting all academics around the globe to explore the opportunities for presenting and publishing their works with Modern Business Press. I'm also actively looking for those willing to serve as journal editors and members of editorial boards of the numerous Modern Business Press journals, spanning management, marketing, accounting, economics, finance, business education, computing and technology. Please email me at david@theideapublishing.com for more information. Thanks and look forward to hearing from you!

Network

Cited By