Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Judy E. Scott is active.

Publication


Featured researches published by Judy E. Scott.


Communications of The ACM | 2002

Managing risks in enterprise systems implementations

Judy E. Scott; Iris Vessey

What determines if a system implementation will be successful?


Journal of Management Information Systems | 2000

Facilitating Interorganizational Learning with Information Technology

Judy E. Scott

Increasingly, organizations collaborate to complement their core competencies. New product development, for example, is often a collaborative process, with customers and suppliers contributing complementary knowledge and skills. This study uses grounded theory to determine how and why information technology facilitates interorganizational learning. Semi-structured interviews in the disk drive industry were coded to develop a conceptual model. An important finding is that organizations collaborate closely through virtual integration. They need interorganizational learning to help them cope with the complexity of new products and the capital intensity in the disk drive industry. However, effective interorganizational collaboration needs trust. The main contribution of the model is in explaining the role of information technology in lower and higher levels of interorganizational learning, cognitive and affective trust, and virtual and humanistic interorganizational collaboration.Increasingly, organizations collaborate to complement their core competencies. New product development, for example, is often a collaborative process, with customers and suppliers contributing complementary knowledge and skills. This study uses grounded theory to determine how and why information technology facilitates interorganizational learning. Semi-structured interviews in the disk drive industry were coded to develop a conceptual model. An important finding is that organizations collaborate closely through virtual integration. They need interorganizational learning to help them cope with the complexity of new products and the capital intensity in the disk drive industry. However, effective interorganizational collaboration needs trust. The main contribution of the model is in explaining the role of information technology in lower and higher levels of interorganizational learning, cognitive and affective trust, and virtual and humanistic interorganizational collaboration.


Information Systems Frontiers | 2000

Implementing Enterprise Resource Planning Systems: The Role of Learning from Failure

Judy E. Scott; Iris Vessey

ERP implementations remain problematic despite the fact that many of the issues are by now quite well known. In this paper, we take a different perspective from the critical success factors and risks approaches that are common in the information systems discipline to explain why ERP implementations fail. Specifically, we adapt Sitkins theory of intelligent failure to ERP implementations resulting in a theory that we call “learning from failure.” We then examine from the viewpoint of this theory the details of two SAP R/3 implementations, one of which failed while the other succeeded. Although it is impossible to state, unequivocally, that the implementation that failed did so because it did not use the approach that was derived from the theory, the analysis reveals that the company that followed many of the tenets of the theory succeeded while the other did not.


decision support systems | 1998

Organizational knowledge and the intranet

Judy E. Scott

Abstract The Intranet phenomenon has been driven by the push of technology standards and the pull of organizational need to (1) communicate across geographic, organizational and functional barriers, and (2) collaborate among sites and with suppliers and customers. The objective of this study is to generate a theoretical framework for the interaction between organizational knowledge and the Intranet. The contribution of this paper is 4-fold. First, we generate a theoretical framework using the paradigm model of grounded theory. We show interactions between the Intranet and three organizational knowledge strategies taking into account drivers, the context, and intervening conditions. Second, previous research on organizational knowledge creation theory is incorporated into the framework. Third, the framework forms the basis for future empirical research on the business value of the Intranet. Finally, the study raises implications for IS developers, IS departments, management and researchers.


Information & Management | 2000

Enhancing functionality in an enterprise software package

Judy E. Scott; Lisa Kaindl

Abstract Although enterprise resource planning (ERP) packages strive to integrate all the major processes of a firm, customers typically discover that some essential functionality is lacking. To address this issue and to complement their capabilities, both ERP vendors and customers increasingly recognize the importance of collaboration. Using a grounded theory approach, this study’s objective is to derive a theoretical understanding of how customers collaborated on enhancements to an ERP module. The main contribution is, therefore, a theoretical model that relates the two processes — selection of participants, and interorganizational collaboration — to share knowledge of a subsysytem’s best practices. Important findings are that ‘swift trust’ from the occupational community, conflict resolution, reciprocity, and informal networks impact functionality enhancement. The implication from these findings is that a deeper understanding of the functionality enhancement process benefits not only team members, but also ERP customers and collaborators overall.


ACM Sigmis Database | 1995

The measurement of information systems effectiveness: evaluating a measuring instrument

Judy E. Scott

Information system effectiveness is an important phenomenon for both researchers and practitioners. Despite widespread interest, and the importance of the uses, there have been no efforts to validate Computerworlds Premier 100 rankings of information system effectiveness. This paper uses structural equation modeling in an attempt to validate the measuring instrument used to derive the Computerworld rankings.Alternative models for the measuring instrument are proposed. Using a reflective model, the findings raise doubts as to the reliability of the rankings, and both content validity and construct validity are also suspect. The reliability and validity are problematic because multiple indicators of the same construct must be homogeneous for it to make sense to combine them into a composite index. A solution to this problem is to represent information system effectiveness as a multidimensional construct, that is part of a causal model. Based on previous research in the area, suggestions are offered to improve the measuring instrument.


International Journal of Electronic Commerce | 2006

The Role of Reputation Systems in Reducing On-Line Auction Fraud

Dawn G. Gregg; Judy E. Scott

On-line auction fraud is the most frequently reported Internet crime. This research investigates whether on-line reputation systems are a useful mechanism for potential buyers to avoid fraudulent auctions. Content analysis of complaints posted in an on-line auction reputation system is used to improve understanding of on-line auction fraud and the role of reputation systems in documenting, predicting, and reducing fraud. The results show (1) that the number of fraud allegations found in an on-line reputation system significantly exceeds the number of fraud allegations made through official channels, (2) that recent negative feedback posted in an on-line reputation system is useful in predicting future on-line auction fraud, and (3) that experienced on-line auction buyers are in a better position to use reputation system data to avoid potentially fraudulent auctions.


Information & Management | 2009

Cognitive engagement with a multimedia ERP training tool: Assessing computer self-efficacy and technology acceptance

Judy E. Scott; Steven Walczak

Computer self-efficacy (CSE) is a persons judgment of his or her ability to use a computer system. We investigated cognitive engagement, prior experience, computer anxiety, and organizational support as determinants of CSE in the use of a multimedia ERP systems training tool. We also examined the impact of CSE on its acceptance. We determined the benefits of a sequential multi-method approach using structural equation modeling and neural network analysis. High reliability predictions of individual CSE were achieved with a sequential multi-method approach. Specifically, we obtained almost 68% perfect CSE group prediction overall, with almost 85% perfect CSE group prediction using fuzzy sets and over 94% accuracy within one group classification. The resulting CSE assessment and classification enables management interventions, such as allocating users to appropriate instruction for more effective training.


Communications of The ACM | 2008

A typology of complaints about eBay sellers

Dawn G. Gregg; Judy E. Scott

More could be done to reduce rising online fraud rates.


Information Systems Management | 2007

Mobility, Business Process Management, Software Sourcing, and Maturity Model Trends: Propositions for the IS Organization of the Future

Judy E. Scott

ABSTRACT In this article, I argue that increased mobility, a continued emphasis on business process management, expanded options for the sourcing of enterprise system software, and IS maturity models are trends that will require new capabilities and skills for tomorrows IS organization.

Collaboration


Dive into the Judy E. Scott's collaboration.

Top Co-Authors

Avatar

Biswadip Ghosh

Metropolitan State University of Denver

View shared research outputs
Top Co-Authors

Avatar

Dawn G. Gregg

University of Colorado Denver

View shared research outputs
Top Co-Authors

Avatar

Iris Vessey

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae Hoon Choi

University of Colorado Denver

View shared research outputs
Top Co-Authors

Avatar

Andrea J. Hester

Southern Illinois University Edwardsville

View shared research outputs
Top Co-Authors

Avatar

Jahangir Karimi

University of Colorado Denver

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael A. Erskine

University of Colorado Denver

View shared research outputs
Top Co-Authors

Avatar

Guy G. Gable

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge