Kathleen M. Hargiss
Capella University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kathleen M. Hargiss.
International Journal of Strategic Information Technology and Applications | 2016
Armando E. Paladino; Kathleen M. Hargiss; Caroline Howard
Thisstudyexaminedtheincorporationoftacitknowledgeintocorporatebusinessintelligenceandits impactonbusinessperformance,specificallyanalyzingindividualproductivity.Businessproductivity inrelationtotheuseofknowledgehasbeeninvestigatedbutusingmacro-dimensionsnotspecifically oriented to individualworkers’productivity.Thisstudywasbasedonexternalization,oneof the modesinthetheoryoforganizationalknowledgecreation(thatis,convertingtacitknowledgeinto explicitknowledge).Thefindingsontheliteraturestatedthatknowledgeisthemostimportantpiece ofbusinesscompetitiveadvantageandthattacitknowledgeisakeypartofthatknowledge.This researchfoundthattacitknowledgedidnotinfluenceindividualengineers’productivityandassuch didnotaffectbusinessperformance.Additionally,itfoundthattacitknowledgewasnotafactorthat couldbeusedtopredictindividualproductivity.Thisresearchwasthefirstattempttoinvestigate individualproductivityinrelationtotacitknowledge. KeywoRDS Artificial Intelligence, Explicit Knowledge, Semantic Web, Social Networks, Tacit Knowledge
International Journal of Strategic Information Technology and Applications | 2013
Chi Iromuanya; Kathleen M. Hargiss; Caroline Howard
This study explores two construction execution and management models for construction and infrastructure development in a new era of fiscal austerity in the face of unplanned, yet devastating natural or man-made disasters. One model explores the role and application of evidence-based construction management, while the other studies the role of the pragmatic approach to construction management in the context of existing cultures and emergent, or dynamic project circumstances. Responses from subject matter experts from two representative dynamic construction and infrastructure development areas (Nigeria and Afghanistan) are evaluated for insights. This research combined expert opinions with time-tested approaches for efficient infrastructure project, procurement, and execution in emergent circumstances of man-made or natural disaster management. While one of the two development strategies is based on performance criteria such as cost, quality and time efficiencies, the other is based on the utilitarian value of a pragmatic juxtaposition of driving social, political and environmental factors. The study is underscored by the notion that while numbers do not lie, they are by their very nature incapable of offering the whole truth.
International Journal of Strategic Information Technology and Applications | 2016
Caroline Howard; Barbara J.A.M.G. Armenta; Kathleen M. Hargiss
The increase of unethical behavior in the workplace has encouraged contemporary researchers to focus their research efforts on exploring moral development of employees in the business sector. It is thought that moral development may be a crucial driver of ethical decision making, while morality may be affected by a range of variables. In this study, the impact of higher education, ethical education, and work experience on moral development of licensed real-estate agents is examined. Moreover, the impact of higher education on an individuals moral development to a higher level of Kohlbergs theory of moral development is evaluated. The results of the study suggest that the variables of higher education, ethical education, and work experience showed no significant impact or increase of moral development of real-estate agents. The findings imply that the level of moral reasoning of real-estate agents service their occupations ethical requirements.
International Journal of Strategic Information Technology and Applications | 2016
Lisa-Marie Bald; Judith Orth; Kathleen M. Hargiss
Technology integration continues to be a professional development concern, especially in elementary schools. It remains unclear why there is a difference between how teachers talk about using technology and how they apply it in teaching reading. The purpose of this investigation was to explore professional development options that would help teachers connect theory to practice by studying their decision-making process. In a case study design, 10 K-4 teachers participated in one 60-minute interview, one follow-up interview, and one 45-minute focus group. With the use of typological analysis, transcripts were coded for initial and emerging themes. Results indicated that integrating mobile devices was highly dependent upon teachers being self-directed learners. Teachers relied on informal collegial interactions when deciding to use mobile devices. Continuous professional development that addresses adult learning styles was recommended by the teachers to support technology adoption.
International Journal of Strategic Information Technology and Applications | 2015
Caroline Howard; Michael Warah Nsoh; Kathleen M. Hargiss
The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior TPB, which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top managements Information systems security challenges.
International Journal of Strategic Information Technology and Applications | 2015
Caroline Howard; Franklin M. Lartey; Kathleen M. Hargiss
Many customer satisfaction studies in the service industry use SERVQUAL, an instrument developed by Parasuraman, Zeithaml, and Berry 1998. Similarly, many studies on customer loyalty use the Net Promoter SystemTM NPS® developed by. Even though researchers acknowledge a relationship between satisfaction and loyalty, there is currently no empirical evidence demonstrating such relationship using SERVQUAL and NPS. In that regard, this study analyzed the antecedents of satisfaction measured by SERVQUAL that influence loyalty as measured by NPS in the context of the residential broadband service industry. To that effect, 208 broadband customers in the U.S. Midwest region were surveyed online. A confirmatory factor analysis confirmed the latent structure of collected data, validating the use of the five SERVQUAL factors as predictors. An ordinal logistic regression OLR model built on the collected data confirmed the existence of a statistically significant relationship between Empathy one of the factors and customer loyalty, suggesting that increasing empathy by one point increased the odds of becoming a promoter by 11.73%. The final model was validated using the Akaike information criterion AIC, a single sample cross-validation model.
International Journal of Strategic Information Technology and Applications | 2014
Iván Tirado-Cordero; Kathleen M. Hargiss; Caroline Howard
Social cognitive theory is founded on the belief that learning is shared socially. Triadic reciprocal determinism explains the interrelationship and interaction between environmental cues, behavior, and biological determinants to shape and alter the perception of the self and how individuals assume agentic perspectives in social interactions to approach challenges and pursue goals. Knowing how learners perceived their likelihood to achieve success also provides for a better understanding of the constraints and opportunities of a proposed learning solution. The purpose of this study was to explore the self-efficacy beliefs of adolescents as part of the analysis of the learners in the instructional design system (ISD) model in terms of entry behaviors for the design of a peer tutoring learning environment. The General Self-Efficacy Scale (GSE) was used to interview participants, using the questions as open-ended questions. Observations of the social interactions between participants were collected during focus groups to discuss their responses to the GSE scale. The results of this study suggested that individuals with high self-efficacy not only assume a direct personal agentic perspective when acting alone but that they also assume and motivate others to engage in a collective agentic perspective. Individuals with low self-efficacy assume proxy or surrogate agentic perspectives in social interactions and require prompting to engage and participate. High self-efficacy indicates effective collaboration through the collective agency, which affects success positively in a peer tutoring learning environment. Low self-efficacy affects negatively success in peer tutoring, because individuals with low self-efficacy assume a proxy or surrogate agentic perspective detaching themselves from the interactions. However, individuals with low self-efficacy, through prompting and motivation from peers with high self-efficacy can improve their interactions and as goals are reached, improve self-efficacy.
International Journal of Strategic Information Technology and Applications | 2012
Caroline Howard; Sandy A. Lamp; Kathleen M. Hargiss
This article is derived from a qualitative multicase study with two settings that explored the way decisions are made in two IT organizations regarding process improvement initiatives by using face-to-face semi-structured interviews with 20 IT process owners and managers. The two participating organizations are a healthcare insurance company and a manufacturer of electronic interconnects. The study sought to uncover a how IT process improvements are prioritized and how approvals are attained, b how senior leadership is involved in decision making, c how security and risk are considered, d if and how formal process improvement methodologies are used, e if and how estimated and actual cost benefit analysis are conducted associated with decisions, and f how alignment with organizational goals is attained. The topic of IT governance was narrowed to explore the perspective of IT process owners and process managers, and their approaches and methodologies used with IT process improvement initiatives. The study found that pre-decision stages take place in IT investment decision making, and that process owners and process managers, participants other than senior leadership, and executive level decision makers are involved in these pre-decision stages and may be involved in the final decision stages.
International Journal of Strategic Information Technology and Applications | 2012
Oliver H. Burckhardt; Kathleen M. Hargiss; Caroline Howard
A study about the role of leadership and technology in successful and sustainable airline management was conducted to further the knowledge concerning the effects these factors have on the sustainability of airline business. The goal of the study was to identify suitable leadership approaches, core and enabling technologies that are of importance for airline executives in the context of the global nature of the industry and its challenging, competitive environment. Conducting interviews with former executives from Continental Airlines and Lufthansa German Airlines and with C-level managers from airlines unaffiliated with these carriers provided insights concerning adequate methods to lead airlines that experience operational, organizational, or financial crises. One of the findings of the study, which was conducted by evaluating successful crisis management programs of Lufthansa and Continental Airlines, is the need to integrate both core and enabling technologies with a leadership approach that allows organizations to outperform their competitors and, more importantly, maintain their leading position.
International Journal of Strategic Information Technology and Applications | 2011
Robert O. Seale; Kathleen M. Hargiss
This paper proposes an architecture that can support autonomous mobile agents performing intrusion prevention activities on a heterogeneous network. The division of duties performed by the agents in the system ensures the agents are able to remain distributed throughout the network architecture to eliminate single points of failure. The distributed nature of the architecture reduces the workload on network clients and eliminates duplication of effort wherever possible. The use of virtual machine interfaces between the hardware and the network connection isolates the hardware interface in order to maintain trust and integrity of the connection and reduce the potential for an attacker using a trusted resource to damage network assets. Virtual machine connections allow a potential malware infection that invades the network environment to be safely observed for unusual behavior patterns using heuristic analysis to provide new evidentiary indicators that can be used to identify the malware during future outbreaks.