H. Kevin Fulk

H. Kevin Fulk
Western Carolina University | WCU · School of Accouting Finance Information Systems and Business Law

JD, PhD

About

19
Publications
12,839
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
138
Citations
Additional affiliations
September 2014 - July 2020
Tarleton State University
Position
  • Professor (Assistant)
August 2011 - May 2014
Southern University at New Orleans
Position
  • Professor (Assistant)
Education
August 2002 - December 2008
University of Houston
Field of study
  • Management Information Systems
August 1998 - May 2000
University of Kansas
Field of study
  • Business Administration; Information Technology
August 1995 - May 1998
University of Kansas
Field of study
  • Law

Publications

Publications (19)
Article
Full-text available
In this study we investigate information system (IS) failures by leveraging a novel construct—dissonant relational multiplexity (RM)—to develop a unique perspective of these failures. Dissonant RM exists when two organizational stakeholders have multiple types of relationships that are in conflict. To investigate the salience of dissonant RM in IS...
Article
Full-text available
Faculty members in business schools are called upon to improve college students' study strategies, their preparedness to transition to careers, and their understanding of emerging technologies, such as artificial intelligence (AI). AI is already changing how organizations undertake common activities, such as recruiting, and business majors can expe...
Article
Full-text available
Business majors will encounter big data, and many will use data visualization tools to gain valuable insights and make strategic business decisions. However, core information systems classes for all business majors focus on improving information literacy but rarely include exercises with data visualization tools like Tableau. This study seeks to un...
Article
Full-text available
This opinion paper presents the need for IS research on compassion in the organizational workplace. Given the current challenges caused by COVID-19, we argue that organizations need to be resilient to counter the adverse effects of this pandemic. Developing a compassionate organizational workplace is an effective way to build resilient organization...
Article
Note: The following teaching case was published in the 2017 issue of the Journal of Critical Incidents, a peer-reviewed journal published by the Society for Case Research. This teaching case addresses the ethics of the actions of a management of the Peanut Corporation of America, Mary Wilkerson. Mary Wilkerson participated in a number of crimes t...
Article
Full-text available
This study explores the relationship between data breach laws and breaches that have occurred before and after legislation was enacted. Rampant breaches occurring, as evidenced by those at Home Depot, Community Health Systems, JPMorgan/Chase, and so on, helps to illustrate the vulnerability of organizational systems. Data breach laws have two purpo...
Conference Paper
Full-text available
Capturing, structuring and disseminating knowledge is critical for success, yet challenging. For knowledge sharing to happen, it is necessary to create an appropriate environment. This environment is not enough to stimulate such sharing; other variables can influence the interaction of individuals. We contend that a variable calling for further att...
Conference Paper
Full-text available
One need only turn on the television, listen to talk radio, read newspapers, trade publications, and/or academic literature to realize that information system security is a growing concern for individuals, businesses, and governments. Security breaches are rampant and the problem only seems to be growing worse (Schuessler, 2013). In order to reduce...
Conference Paper
Full-text available
This study explores the relationship between data breach laws and the number of data breaches that occur. The rampant number of data breaches occurring, as evidenced by those at Home Depot, Community Health Systems, JPMorgan/Chase, and so on, helps to illustrate in a very public way how vulnerable organizational systems are. Data breach laws, put f...
Conference Paper
Full-text available
Submission This research proposes to examine how organizations innovate enterprise systems (ES), or integrate new technologies and/or business practices into ES. Literature surrounding ES has focused on the successful implementation, management, software, supply chain, and case studies of enterprise systems, but the extension of these studies often...
Article
Cloud Computing is a process of delivering services available in a host computer over the Internet. Cloud computing has distinctive characteristics that can differentiate it from the traditional hosting. It is available on demand and services are managed by the provider. Cloud computing offers a cost-effective alternative through improved utilizati...
Article
The South Louisiana coastline has experienced a number of natural and man-made disasters, beginning with the BP Oil Spill in 2010. These disasters have caused millions of dollars in damage in the form of human costs, environmental costs, and economic costs. This paper seeks to update the original South Louisiana study and compare the economic hards...
Article
Full-text available
When someone in your organization has an IT problem the tech department sends an IT professional to assist that person. The client tells the IT professional the problem. The IT professional hears an altogether different problem than the problem actually being described. The IT professional almost always believes the client is doing something wrong....
Article
Enterprise resource planning (ERP) implementation projects often fail to achieve their objectives. These often problematic projects are frequently the setting for intense and growing power struggles. Existing studies (e.g., Boonstra, 2006; Shepherd, Clegg, & Stride, 2009) have provided researchers with insights about issues of power in these projec...
Article
Full-text available
The objective of this investigation was to determine if Drucker's management by objectives (or MBO) could be merged with Tuckman and Jensen's stages of group development. We achieved our objective by examining relevant literature and found that these theories are somewhat dated, but deserve further examination. When combined, they resolve many pitf...
Article
Full-text available
As never before, organizations are using projects to implement new information technologies and programs. Projects, which may be defined as temporary activities undertaken to accomplish one or more goals, are structured using project management methods. Project management is the planned and systematic deployment of resources to accomplish project g...

Questions

Questions (2)
Question
Hello. I’m planning to conduct a mixed-methods study this year. The planned study would use the following article’s approach:
Vaast, E., Safadi, H., Lapointe, L., & Negoita, B. (2017). Social Media Affordances for Connective Action: An Examination of Microblogging Use During the Gulf of Mexico Oil Spill. MIS Quarterly, 41(4).1179-1205; DOI: 10.25300/MISQ/2017/41.4.08
I’m looking into R & the Rtweet package with Rstudio. Quite honestly, I’m a novice with these tools. Is there a relatively simple way to conduct the clustering & motif analyses described in this MIS Quarterly article using these tools? Any helpful advice would be appreciated!
Question
Dear Colleagues,
Are you interested in research issues at the intersection of Information Systems and Positive Organizational Scholarship?  If yes, I'd like to encourage you to submit to a new track for the 2016 European Conference on Information Systems.  This track on IS and Positive Organizational Scholarship welcomes rigorous, innovative scholarship in this area.  The submissions system will open on October 5, 2015.  Submissions will be due by November 27th, 2015.  To learn more about this track visit:
Please feel free to share this announcement with groups of which you are a part.  On behalf of my track co-chairs, Dr. Suranjan Chakraborty and Dr. Sutirtha Chatterjee, thank you for your time.  We look forward to receiving your submissions!
Respectfully,
H. Kevin Fulk, J.D., Ph.D.
Co-Chair, Information Systems and Positive Organizational Scholarship Track, ECIS 2016

Network

Cited By