Mayur S. Desai

Mayur S. Desai
Texas Southern University

Ph.D.

About

24
Publications
9,064
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
460
Citations
Additional affiliations
January 1997 - January 2005
Indiana University Kokomo
Position
  • Associate Professor of MIS

Publications

Publications (24)
Article
AbstractRapidly changing technology and learning styles of students combined with vast depositories of accessible material on the web offer opportunities and challenges to instructors to adapt and enhance student learning experience with “engaged learning” as the key goal. It is critical that the instructor offers a teaching approach that will enha...
Article
Despite being a norm in contemporary organizations including in academia, there is limited understanding how multimedia technology use might impact learning. We have also seen a rise in the use of social media applications such as Facebook, tweeter, Instagram, skype, flickr, and blogging among students, but it is unclear the extent to which the aca...
Article
In today’s business world no skills have been more touted and explored than critical thinking and ethical judgment. Here we compare the capabilities of students to think critically and make ethical decisions. These skills are interdisciplinary requiring: relevant information, quantitative understanding and emotional intelligence to process, interpr...
Article
Purpose – The purpose of this paper is to propose a framework that serves as a guide to develop a curriculum and instructional strategy that is systems oriented and student-centric. Design/methodology/approach – The framework is based on the theories in the field of education by prominent researchers. The framework is divided into four sub-systems...
Article
Purpose The present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies and whether the communication of these policies to the customer has significantly changed during a ten year period. Design/methodology/approach The study defines publish...
Article
Full-text available
A graduate curriculum in Management Information Systems with a Supply Chain Management focus is presented. The motivation for this endeavor stems from the fact that the global scope of modern business organizations and the competitive environment in which they operate, requires an information system leveraged supply chain management system (SCM) to...
Article
The present study empirically examines the relationship between computer anxiety, job satisfaction, career satisfaction, and stress. Based on self-efficacy theory and self-worth theory of achievement-motivation, it is hypothesized that the relationship between computer anxiety and job satisfaction is curvilinear and attitude towards computer modera...
Article
Full-text available
Escalation of commitment emerged as a major explanation for the propensity of management information systems projects to exceed time and budget constraints. Earlier studies demonstrated that escalation in MIS is a common event. This study presents a meta-analysis of the various theories of escalation that allows for integration of the various escal...
Article
Full-text available
Purpose The purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems (MIS) projects. Design/methodology/approach The paper compares the implications of psychological and economic escalation theories with lessons from the real option...
Article
Purpose The paper addresses the contemporary and very important area of electronic information (EI) management – the ethical dimension and implications. Specifically, this paper aims to analyze EI activities and management practices, the ethical dilemmas and implications; to relate effectiveness in EI ethics activities in the context of organizatio...
Article
Internet is a new media for distance education that provides students with a low-cost, flexible option to expand into global markets (Casey, 1998). By 2004 at least two million higher-education students in the U.S. were engaged in distance education utilizing various technologies that allow learners to take courses independent of time and location...
Article
Purpose – It is posited that information technology (IT) outsourcing unfolds a complex relationship that has the propensity to start with a bang and end in a whimper unless the strategic parameters are identified at the outset. The paper is intended to beacon flash areas open to scholarly research in this relatively nascent area. Design/methodolog...
Article
Full-text available
Purpose This paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures. Design/methodology/approach This paper examines three published case studies, and discusses whether managerial actions are in accordance with the predictions of bandit process studies. Findings Bandits are a class...
Article
This paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The paper develops a global information technology model by drawing from consulting experience and the relevant literature. The bases for the model are – a firm's environment,...
Article
Assesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the principal factors that determined the level of consonance between stated ethical policies and values, and their actual practice. Supports and extends previous observations that...
Article
The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the guarantees of privacy when using e-commerce and the Internet. Some companies collect marketing information on consumers’ Internet habits without their knowledge or consent. This s...
Article
The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosi...

Network

Cited By