Mayur S. DesaiTexas Southern University
Mayur S. Desai
Ph.D.
About
24
Publications
9,064
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
460
Citations
Additional affiliations
January 1997 - January 2005
Publications
Publications (24)
AbstractRapidly changing technology and learning styles of students combined with vast depositories of accessible material on the web offer opportunities and challenges to instructors to adapt and enhance student learning experience with “engaged learning” as the key goal. It is critical that the instructor offers a teaching approach that will enha...
Despite being a norm in contemporary organizations including in academia, there is limited understanding how multimedia technology use might impact learning. We have also seen a rise in the use of social media applications such as Facebook, tweeter, Instagram, skype, flickr, and blogging among students, but it is unclear the extent to which the aca...
In today’s business world no skills have been more touted and explored than critical thinking and ethical judgment. Here we compare the capabilities of students to think critically and make ethical decisions. These skills are interdisciplinary requiring: relevant information, quantitative understanding and emotional intelligence to process, interpr...
Purpose
– The purpose of this paper is to propose a framework that serves as a guide to develop a curriculum and instructional strategy that is systems oriented and student-centric.
Design/methodology/approach
– The framework is based on the theories in the field of education by prominent researchers. The framework is divided into four sub-systems...
Purpose
The present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies and whether the communication of these policies to the customer has significantly changed during a ten year period.
Design/methodology/approach
The study defines publish...
A graduate curriculum in Management Information Systems with a Supply Chain Management focus is presented. The motivation for this endeavor stems from the fact that the global scope of modern business organizations and the competitive environment in which they operate, requires an information system leveraged supply chain management system (SCM) to...
The present study empirically examines the relationship between computer anxiety, job satisfaction, career satisfaction, and stress. Based on self-efficacy theory and self-worth theory of achievement-motivation, it is hypothesized that the relationship between computer anxiety and job satisfaction is curvilinear and attitude towards computer modera...
Escalation of commitment emerged as a major explanation for the propensity of management information systems projects to exceed time and budget constraints. Earlier studies demonstrated that escalation in MIS is a common event. This study presents a meta-analysis of the various theories of escalation that allows for integration of the various escal...
Purpose
The purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems (MIS) projects.
Design/methodology/approach
The paper compares the implications of psychological and economic escalation theories with lessons from the real option...
Purpose
The paper addresses the contemporary and very important area of electronic information (EI) management – the ethical dimension and implications. Specifically, this paper aims to analyze EI activities and management practices, the ethical dilemmas and implications; to relate effectiveness in EI ethics activities in the context of organizatio...
Internet is a new media for distance education that provides students with a low-cost, flexible option to expand into global markets (Casey, 1998). By 2004 at least two million higher-education students in the U.S. were engaged in distance education utilizing various technologies that allow learners to take courses independent of time and location...
Purpose
– It is posited that information technology (IT) outsourcing unfolds a complex relationship that has the propensity to start with a bang and end in a whimper unless the strategic parameters are identified at the outset. The paper is intended to beacon flash areas open to scholarly research in this relatively nascent area.
Design/methodolog...
Purpose
This paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures.
Design/methodology/approach
This paper examines three published case studies, and discusses whether managerial actions are in accordance with the predictions of bandit process studies.
Findings
Bandits are a class...
This paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The paper develops a global information technology model by drawing from consulting experience and the relevant literature. The bases for the model are – a firm's environment,...
Assesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the principal factors that determined the level of consonance between stated ethical policies and values, and their actual practice. Supports and extends previous observations that...
The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the guarantees of privacy when using e-commerce and the Internet. Some companies collect marketing information on consumers’ Internet habits without their knowledge or consent. This s...
The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosi...