About
19
Publications
12,839
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
138
Citations
Introduction
Additional affiliations
September 2014 - July 2020
August 2011 - May 2014
Education
August 2002 - December 2008
August 1998 - May 2000
August 1995 - May 1998
Publications
Publications (19)
In this study we investigate information system (IS) failures by leveraging a novel construct—dissonant relational multiplexity (RM)—to develop a unique perspective of these failures. Dissonant RM exists when two organizational stakeholders have multiple types of relationships that are in conflict. To investigate the salience of dissonant RM in IS...
Faculty members in business schools are called upon to improve college students' study strategies, their preparedness to transition to careers, and their understanding of emerging technologies, such as artificial intelligence (AI). AI is already changing how organizations undertake common activities, such as recruiting, and business majors can expe...
Business majors will encounter big data, and many will use data visualization tools to gain valuable insights and make strategic business decisions. However, core information systems classes for all business majors focus on improving information literacy but rarely include exercises with data visualization tools like Tableau. This study seeks to un...
This opinion paper presents the need for IS research on compassion in the organizational workplace. Given the current challenges caused by COVID-19, we argue that organizations need to be resilient to counter the adverse effects of this pandemic. Developing a compassionate organizational workplace is an effective way to build resilient organization...
Note: The following teaching case was published in the 2017 issue of the Journal of Critical Incidents, a peer-reviewed journal published by the Society for Case Research.
This teaching case addresses the ethics of the actions of a management of the Peanut Corporation of America, Mary Wilkerson. Mary Wilkerson participated in a number of crimes t...
This study explores the relationship between data breach laws and breaches that have occurred before and after legislation was enacted. Rampant breaches occurring, as evidenced by those at Home Depot, Community Health Systems, JPMorgan/Chase, and so on, helps to illustrate the vulnerability of organizational systems. Data breach laws have two purpo...
Capturing, structuring and disseminating knowledge is critical for success, yet challenging. For knowledge
sharing to happen, it is necessary to create an appropriate environment. This environment is not enough
to stimulate such sharing; other variables can influence the interaction of individuals. We contend that a
variable calling for further att...
One need only turn on the television, listen to talk radio, read newspapers, trade publications, and/or academic literature to realize that information system security is a growing concern for individuals, businesses, and governments. Security breaches are rampant and the problem only seems to be growing worse (Schuessler, 2013). In order to reduce...
This study explores the relationship between data breach laws and the number of data breaches that occur. The rampant number of data breaches occurring, as evidenced by those at Home Depot, Community Health Systems, JPMorgan/Chase, and so on, helps to illustrate in a very public way how vulnerable organizational systems are. Data breach laws, put f...
Submission This research proposes to examine how organizations innovate enterprise systems (ES), or integrate new technologies and/or business practices into ES. Literature surrounding ES has focused on the successful implementation, management, software, supply chain, and case studies of enterprise systems, but the extension of these studies often...
Cloud Computing is a process of delivering services available in a host computer over the Internet. Cloud computing has distinctive characteristics that can differentiate it from the traditional hosting. It is available on demand and services are managed by the provider. Cloud computing offers a cost-effective alternative through improved utilizati...
The South Louisiana coastline has experienced a number of natural and man-made disasters, beginning with the BP Oil Spill in 2010. These disasters have caused millions of dollars in damage in the form of human costs, environmental costs, and economic costs. This paper seeks to update the original South Louisiana study and compare the economic hards...
When someone in your organization has an IT problem the tech department sends an IT professional to assist
that person. The client tells the IT professional the problem. The IT professional hears an altogether different problem than the problem actually being described. The IT professional almost always believes the client is doing something wrong....
Enterprise resource planning (ERP) implementation projects often fail to achieve their objectives. These often problematic projects are frequently the setting for intense and growing power struggles. Existing studies (e.g., Boonstra, 2006; Shepherd, Clegg, & Stride, 2009) have provided researchers with insights about issues of power in these projec...
The objective of this investigation was to determine if Drucker's management by objectives (or MBO) could be merged with Tuckman and Jensen's stages of group development. We achieved our objective by examining relevant literature and found that these theories are somewhat dated, but deserve further examination. When combined, they resolve many pitf...
As never before, organizations are using projects to implement new information technologies and programs. Projects, which may be defined as temporary activities undertaken to accomplish one or more goals, are structured using project management methods. Project management is the planned and systematic deployment of resources to accomplish project g...
Questions
Questions (2)
Hello. I’m planning to conduct a mixed-methods study this year. The planned study would use the following article’s approach:
Vaast, E., Safadi, H., Lapointe, L., & Negoita, B. (2017). Social Media Affordances for Connective Action: An Examination of Microblogging Use During the Gulf of Mexico Oil Spill. MIS Quarterly, 41(4).1179-1205; DOI: 10.25300/MISQ/2017/41.4.08
I’m looking into R & the Rtweet package with Rstudio. Quite honestly, I’m a novice with these tools. Is there a relatively simple way to conduct the clustering & motif analyses described in this MIS Quarterly article using these tools? Any helpful advice would be appreciated!
Dear Colleagues,
Are you interested in research issues at the intersection of Information Systems and Positive Organizational Scholarship? If yes, I'd like to encourage you to submit to a new track for the 2016 European Conference on Information Systems. This track on IS and Positive Organizational Scholarship welcomes rigorous, innovative scholarship in this area. The submissions system will open on October 5, 2015. Submissions will be due by November 27th, 2015. To learn more about this track visit:
Please feel free to share this announcement with groups of which you are a part. On behalf of my track co-chairs, Dr. Suranjan Chakraborty and Dr. Sutirtha Chatterjee, thank you for your time. We look forward to receiving your submissions!
Respectfully,
H. Kevin Fulk, J.D., Ph.D.
Co-Chair, Information Systems and Positive Organizational Scholarship Track, ECIS 2016