Kevin P. Scheibe

Kevin P. Scheibe
Iowa State University | ISU · Department of Information Systems and Business Analytics

MBA, Ph.D.

About

36
Publications
21,287
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
899
Citations
Introduction
Kevin Scheibe is a Professor of Management Information Systems at Iowa State University. His research interests include business analytics, decision support, big data, IT outsourcing, supply chain analytics and knowledge management.
Additional affiliations
July 2019 - July 2019
Iowa State University
Position
  • Chair
July 2003 - present
Iowa State University
Position
  • Professor (Associate)
Education
August 1999 - May 2003
Virginia Polytechnic Institute and State University
Field of study
  • Business Information Technology
June 1998 - December 1999
August 1987 - June 1991
Biola University
Field of study
  • Computer Science

Publications

Publications (36)
Article
Full-text available
This paper examines the ripple effect in supply chains due to circular flows embedded in supply chain design. Although supply chains are complex and nonlinear, circular flows exist in real-world supply chains but are often unknown or hidden to supply chain managers. These circular flows exist when a Tier 2 supplier is also a Tier 3 (or higher) supp...
Article
It is said that knowledge is power, yet often, decision makers ignore information that ought to be considered. The phenomenon known as Semmelweis reflex occurs when new knowledge is rejected because it contradicts established norms. The goal of evidence-based management (EBMgt) is to help overcome Semmelweis reflex by integrating evaluated external...
Chapter
Supply chains are highly complex systems, and disruptions may ripple through these systems in unexpected ways, but they may also start in unexpected ways. We investigate the causes of ripple effect through the lens of systemic risk. We derive supply chain systemic risk from the finance discipline where sources of risk are found in systemic risk-tak...
Article
Purpose This paper investigates the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile approach, as included in the Manifesto. Design/methodology/approach The authors conducted in-depth case studies of groups in three large business organizations that had recently adop...
Article
This paper focuses on understanding the robustness of a supply network in the face of a disruption. We propose a decision support system for analyzing the robustness of supply chain networks against disruptions using topological analysis, performance measurement relevant to a supply chain context, and an optimization for increasing supply network p...
Article
Full-text available
A conceptual replication of multiple prior IS studies was conducted with the aim of providing stronger empirical support for those results. Conducting six separate longitudinal studies, the effect of professional training on improving one’s application-specific computer self-efficacy (AS-CSE) was shown. Also in line with some prior IS studies it wa...
Article
Full-text available
A conceptual replication of multiple prior IS studies was conducted with the aim of providing stronger empirical support for those results. Conducting six separate longitudinal studies, the effect of professional training on improving one’s application-specific computer self-efficacy (AS-CSE) was shown. Also in line with some prior IS studies it wa...
Article
Supply chains are large, complex, and often unpredictable. Purchasing and supply managers and supply chain risk managers need methods and tools to enable them to quickly understand how unexpected disruptions in the supply chain start and grow and to what extent will they negatively impact the flow of goods and services. This paper introduces a meth...
Article
When a disruption occurs in a firm, its effects are often felt throughout the supply chain. As supply chains expand globally and companies pursue velocity and efficiency, the probability of disruptions propagating throughout a chain grows. In this paper, we employ a qualitative, grounded theory case study approach to help understand what drives sup...
Article
Full-text available
An organization’s culture plays a strong role in its creating new knowledge, but, as organizations become more dispersed and technologies more advanced, many come to rely on computer-mediated communication (CMC) for employees to engage in all levels of knowledge management. Researchers have conducted little work to understand the effectiveness of s...
Article
Full-text available
Management Information Systems (MIS) is now in its fifth decade as a discipline. In 1966, Professor John Dearden and his student F. Warren McFarlan, both at Harvard University, co-authored the book "Management Information Systems: Text and Cases". Dearden and McFarlan’s book is a landmark in the teaching of computerized information systems. A few y...
Article
Full-text available
Management Information Systems (MIS) is now in its fifth decade as a discipline. In 1966, Professor John Dearden and his student F. Warren McFarlan, both at Harvard University, co-authored the book "Management Information Systems: Text and Cases". Dearden and McFarlan’s book is a landmark in the teaching of computerized information systems. A few y...
Article
Full-text available
A growing number of software firms now rely on public beta testing to improve the quality of their products before commercial release. While the benefits resulting from improved software reliability are well recognized, some important market-related benefits have not been studied. Through word-of-mouth, public beta testers can accelerate the diffus...
Article
It is necessary to infuse a consistent supply of improved seed varieties into local sub-Saharan African crop production to improve low crop yields. The best distribution channel for the improved seed varieties may be small-scale commercial seed companies, but local entrepreneurs struggle to determine whether such businesses are viable. Using a mult...
Article
Survey results from 1381 employees working in a state department of transportation tested the idea that uncivil work environments bear undesirable consequences for job satisfaction and diminish the effectiveness of quality management practices. Results demonstrated that incivility does not have to be personally experienced to have deleterious effec...
Article
Prior research on the effects of office redesign on work-related outcomes has been largely atheoretical and yielded mixed and conflicting findings. Expanding on individual reactions to office design changes as specified by social interference theory, we propose that office redesign affects organizational commitment and this relationship is mediated...
Conference Paper
The advent of the Internet has brought many fundamental changes to the way business is conducted. Among others, a growing number of software firms are relying on public beta testing to improve the quality of their products before release. While the benefits resulting from improved software reliability have been widely recognized, the influences of...
Article
Three critical factors in wireless mesh network design are the number of hops between supply and demand points, the bandwidth capacity of the transport media, and the technique used to route packets within the network. Most previous research on network design has focused on the issue of hop constraints and/or bandwidth capacity in wired networks wh...
Article
Fueled by some successes in urban areas, demand is increasing for broadband telecommunications in non-urban areas, but many of the latter areas lack adequate means of delivering the desired services to residential customers and businesses—at least for the last mile of connectivity. This research examines wireless’s potential to mitigate the so-call...
Article
IT professionals must introduce the idea of object language and message sent by the virtue of their offices as these messages impact interactions with clients and colleagues in creating first impressions. The most prominent place in which object language operates in today's workplace is the design of one's office and the artifacts that are displaye...
Article
A roaming, user-based distributed firewall is presented to address both internal and external security risks in an organizational environment where users move from one computer to another. Appropriate firewall settings are attached to users irrespective of the computer they work on. We demonstrate this roaming, user-based, distributed firewall, rep...
Article
Golf teams at most public universities derive much of their support for player scholarships from external donors. Relationships with current and potential donors are often created and maintained via annual golf tournaments that pair donors with varsity players and team coaches in a scramble format tournament. This paper introduces a new spreadsheet...
Article
Full-text available
Visualization systems for intrusion detection are becoming more prevalent with time, but the lack of an organizing framework for proper development of these systems is problematic. This paper introduces a component-based structure which can be used to adequately design and implement intrusion detection information visualization systems. This compon...
Article
Full-text available
Purpose: This research develops a supplier risk assessment methodology for measuring, tracking, and analyzing supplier and part specific risk over time for an automotive manufacturer.Design/Methodology: Supply chain risk literature is analyzed and used in conjunction with interviews from the automotive manufacturer to identify risks in the supply b...
Article
Full-text available
Recently, the government of India embarked on an ambitious project of designing and deploying the Integrated National Agricultural Resources Information System (INARIS) data warehouse for the agricultural sector. The system's purpose is to support macro level planning. This paper presents some of the challenges faced in designing the data warehouse...
Article
This chapter describes various firewall conventions, and how these technologies operate when deployed on a corporate network. Terms associated with firewalls, as well as related concepts, are also discussed. Highly neglected internal security mechanisms utilizing firewall technologies are presented, including host-based firewalls and the more novel...
Article
Object language is a term that describes the messages that objects convey to people. This paper extends previous research on the object language associated with office design elements such as the placement of one's desk and office messiness by examining the role of computer technology as an additional form of object language. Computer technology wa...
Article
Full-text available
Outsourcing of IT functions has become a widespread corporate practice, which has naturally led to concerns among IT works about how this affects their jobs. The issue is complex, and many companies are bringing their IT functions back in-house. In light of this complexity, what skills do IT workers need to be com-petitive? We address this question...
Article
Computing technology augments learning in education in a number of ways. One particular method uses interactive programs to demonstrate complex concepts. The purpose of this paper is to examine one type of interactive learning technology, the transparent engine. The transparent engine allows instructors and students to view and directly interact wi...
Article
High-speed, wireless communication networks are increasing in popularity; however they can be costly and difficult to plan. In this paper we present a spatial decision support system that incorporates expert knowledge of wireless communications, area topography, demographics and propensity to pay for service in order to aid wireless network planner...
Article
Full-text available
Information privacy and protection in the United States is a source of great debate in both the academy and industry. Technological advancements in areas such as data warehousing allow aggregation of data across seemingly unrelated sources to create detailed profiles of individuals making privacy pundits cry foul. This tension begs the question, wh...
Conference Paper
Existing maintenance experience and failure analysis are critical to equipment diagnosis and maintenance. Current maintenance information management cannot satisfy the convenient access, exchange, and sharing of the maintenance information. This paper develops a uniform information model used for data organization, access, sharing, and archiving re...
Article
Modern, forensics laboratories need Laboratory Information Management Systems (LIMS) implementations that allow the lab to track evidentiary items through their examination lifecycle and also serve all pertinent laboratory personnel. The research presented here presents LIMS core requirements as viewed by respondents serving in different forensic l...

Network

Cited By