Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Charles A. Snyder is active.

Publication


Featured researches published by Charles A. Snyder.


Journal of Management Information Systems | 2002

Development of a Measure for the Organizational Learning Construct

Gary F. Templeton; Bruce R. Lewis; Charles A. Snyder

The concept of organizational learning (OL) is receiving an increasing amount of attention in the research and practice of management information systems (MIS) due to its potential for affecting organizational outcomes, including control and intelligence, competitive advantage, and the exploitation of knowledge and technology.As such, further development of the salient issues related to OL is warranted, especially measurement of the construct. Based on a domain definition grounded in the literature, this research represents the initial work in developing an empirically reliable and valid measure of organizational learning. The rigorous method utilized in the derivation of this measure, which integrates two methodological frameworks for instrument development, is the main strength of this work. The result is an eightfactor, 28-item instrument for assessing OL, derived from a sample of 119 knowledge-based firms. The empirically derived factors are awareness, communication, performance assessment, intellectual cultivation, environmental adaptability, social learning, intellectual capital management, and organizational grafting. MIS function managers can use these factors to gauge organizational or subunit success in the creation and diffusion of new applications of information technology.


Journal of Management Information Systems | 1991

Risk analysis for information technology

Rex Kelly Rainer Jr.; Charles A. Snyder; Houston H. Carr

As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organizations overall IT risk management. Recent publicity concerning losses incurred by companies because of problems with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an attempt to minimize or avoid such losses, managers are employing various qualitative and quantitative risk analysis methodologies. The risk analysis literature, however, suggests that these managers typically utilize a single methodology, not a combination of methodologies. This paper proposes a risk analysis process that employs a combination of qualitative and quantitative methodologies. This process should provide managers with a better approximation of their organizations overall information technology risk posture. Practicing managers can use this proposed process as a guideline in formulating new risk analysis procedures and/or evaluating their current risk analysis procedures.


International Journal of Agile Management Systems | 2000

ERP adoption: a technological evolution approach

Sock H. Chung; Charles A. Snyder

In a competitive environment, firms continually need to establish new business objectives to fulfill their corporate visions. A whole organization should be structured to achieve these objectives. In order to support the objectives, information technology (IT) needs to be aligned to the organization’s mission. IT professionals have provided systems for the organization and, in most cases, these systems consist of individual function, which should be used in an integrated manner. Enterprise Resource Planning (ERP) software has emerged to offer an integrated IT solution. It is suggested that ERP could facilitate achieving compatibility between task characteristics and technology characteristics, a long overdue IT solution. ERP has become one of the major IT investments for many organizations. Unfortunately, little research has been done to provide managers guidance on ERP potential for their organizations. Some useful information about ERP can be found by examining the technological evolution of ERP from MRP.


Journal of Management Information Systems | 1995

An empirical assessment of the information resource management construct

Bruce R. Lewis; Charles A. Snyder; R. Kelly Rainer

The concept of information resource management (IRM) has been surrounded by confusion for almost two decades. This study first defines the IRM construct as a comprehensive approach to planning, organizing, budgeting, directing, monitoring, and controlling the people, funding, technologies, and activities associated with acquiring, storing, processing, and distributing data to meet a business need for the benefit of the entire enterprise.The study then operationalizes the IRM construct by developing a measurement instrument. The instrument demonstrates acceptable content validity as well as construct validity and reliability. Eight dimensions underlying the IRM construct were found via exploratory factor analysis: chief information officer, planning, security, technology integration, advisory committees, enterprise model, information integration, and data administration. The instrument serves two functions: (1) to create a coherent, theoretical foundation for further research on the IRM construct, and (2) to provide reference norms for practicing managers to use to assess the extent of IRM implementation in their organizations.


Information & Management | 1999

Personal information privacy: implications for MIS managers

Sandra C. Henderson; Charles A. Snyder

Abstract Recent media attention to information privacy issues has shown that citizens are increasingly concerned about information privacy and their right to it. Governmental and other organizations have been collecting data about individuals at an increasing and, to many, alarming rate. The ability to gather so much information on individuals is largely because of advances in information technology (IT). It is important for IS managers and professionals to understand the issues surrounding personal information privacy in order to protect the rights of those from and about whom they collect data. A model is presented to provide managers guidance in dealing with privacy policy. Taking a proactive stance against privacy invasion could help stave off government intervention in passing legislation to create tighter controls over what can be done with an individuals personal data.


Journal of Management Information Systems | 1997

Environmental scanning for information technology: an empirical investigation

Jerry L. Maier; R. Kelly Rainer; Charles A. Snyder

An increasing number of organizations are recognizing the strategic significance of their information technology (IT) resources. A process by which emerging information technologies may be effectively identified and evaluated is rapidly becoming a necessity. This process may be accomplished through scanning the external IT environment.Based on the strategic emphasis given to IT resources, organizations may be classified as exploiter/innovator (EI), competitor/early adopter (CEA), or participant/effective efficient follower (PEEF). This study uses data from 131 top information systems managers to examine differences in the three types of organizations across a number of issues concerning the process of scanning the external IT environment. These issues include: (1) the objectives of scanning the external IT environment; (2) the methods of scanning the external IT environment; (3) the existence of separate units dedicated to IT scanning; (4) the level of IT scanning intensity; (5) the sources of information used for IT scanning; and (6) the level of top management involvement with IT scanning.


International Journal of Human-computer Studies \/ International Journal of Man-machine Studies | 1989

The effects of relational and entity-relationship data models on query performance of end users

Wen-Jang Kenny Jih; David A. Bradbard; Charles A. Snyder; Nancy G. A. Thompson

Abstract In database systems the end user interacts with the database at the external schema level. At this level the user sees only the logical structure of the database that is relevant to his/her work. Both the relational and the entity-relationship model have proponents arguing that one data model is superior to the other when used in the end user environment. However, a literature review indicated that these arguments have not been based on empirical results from a systematic inquiry. The study reported here examined this issue through a controlled experiment using query writing as the task. Our basic assumption was that if one data model was superior to the other, then the superiority of the model would be reflected in the users query writing performance. In addition, this superiority would be demonstrated on both simple and complex tasks. Query writing performance was measured by three variables: number of syntax errors, number of semantic errors, and amount of time to complete queries. The results indicated that subjects using the relational model made fewer syntax errors, but required more time to complete a query. No significant differences in the number of semantic errors were found between the two data models. Based on these results, neither the relational nor the entity-relational data model was clearly superior when used as the interface between a database system and the end user. As expected, the more complex tasks caused more syntax and semantic errors, and required more time to complete.


Information & Management | 1994

Implementing information technology for competitive advantage: risk management issues

Ronald Earl McGaughey; Charles A. Snyder; Houston H. Carr

Abstract As the use of information technology (IT) has expanded, managers of organizations have come to realize that IT can be used to gain, sustai, or combat competitive advantage. The implementation of IT involves significant risks both from external sources and from the technology and process of implementation. Risk management is the science and art of recognizing the existence of threats, determining their consequences on resources, and applying modifying factors in a cost-effective manner to keep adverse consequences within bounds. Strategies for handling risk necessarily address one or more of the components of risks identified here. The appropriate strategy depends on the nature of the risk and other situational variables that influence the organizations range of choices. This paper discusses approaches to risk analysis appropriate for IT and contains some suggested tools for risk analysis and management.


decision support systems | 1992

The evolution of executive information system software

R. Kelly Rainer; Charles A. Snyder; Hugh J. Watson

Abstract Executive information systems (EIS) may be developed from three categories of software: Custom-built software; full-featured vendor software specifically designed for EIS; or a combination of custom-built and general purpose vendor software. Based on data gathered from a survey of 50 companies with operational EIS, this study compares and contrasts the three types of EIS software. Twelve of the firms developed their EIS using custom-built software, 16 used full featured EIS vendor-supplied software, and 22 used a combination of custom-built software and general purpose vendor software. Study results suggest an evolution in EIS software from custom-built software toward the other two types of EIS software.


Simulation & Gaming | 1982

External Validation of Simulation Games.

Dwight R. Norris; Charles A. Snyder

For more than two decades, simulation games have been used in educational settings to provide experiential learning for participants. Substantial progress has been made in evaluating the pedagogical value of such games. The preponderance of published research has examined the internal validity of games-that is, the educational value of simulations in teaching specific material to participants (Greenlaw and Wyman, 1973). Other research has examined individual characteristics that have an impact on game performance, including group cohesiveness (Norris and Niebuhr, 1980), scholastic achievement (Vance and Gray, 1967; Wolfe, 1978a), and cognitive processing elements of players (Wolfe and Chacko, 1980). In contrast, few studies have been reported that examine the external validity of games. Perhaps a reason for limited study is a failure by researchers to agree on the meaning of external validity. Wolfe (1976) defines the concept as the transferability of academic insights into useful and effective real-world orientations, perceptions, and business career practices. Supporting this concept of external validity would be extremely complex since experimental and control groups in longitudinal study would be required. A second concept of external validity that is more amenable to study concerns the degree to which games correspond with the real-life situations they are designed to simulate. In other words, are games valid representations of reality, given the limitations of abstract simulation?

Collaboration


Dive into the Charles A. Snyder's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gary F. Templeton

Mississippi State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge