Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kathleen M. Hargiss is active.

Publication


Featured researches published by Kathleen M. Hargiss.


International Journal of Strategic Information Technology and Applications | 2016

The power of unstructured data: A study of the impact of tacit knowledge on business performance

Armando E. Paladino; Kathleen M. Hargiss; Caroline Howard

Thisstudyexaminedtheincorporationoftacitknowledgeintocorporatebusinessintelligenceandits impactonbusinessperformance,specificallyanalyzingindividualproductivity.Businessproductivity inrelationtotheuseofknowledgehasbeeninvestigatedbutusingmacro-dimensionsnotspecifically oriented to individualworkers’productivity.Thisstudywasbasedonexternalization,oneof the modesinthetheoryoforganizationalknowledgecreation(thatis,convertingtacitknowledgeinto explicitknowledge).Thefindingsontheliteraturestatedthatknowledgeisthemostimportantpiece ofbusinesscompetitiveadvantageandthattacitknowledgeisakeypartofthatknowledge.This researchfoundthattacitknowledgedidnotinfluenceindividualengineers’productivityandassuch didnotaffectbusinessperformance.Additionally,itfoundthattacitknowledgewasnotafactorthat couldbeusedtopredictindividualproductivity.Thisresearchwasthefirstattempttoinvestigate individualproductivityinrelationtotacitknowledge. KeywoRDS Artificial Intelligence, Explicit Knowledge, Semantic Web, Social Networks, Tacit Knowledge


International Journal of Strategic Information Technology and Applications | 2013

Evidence versus Pragmatism: Unresolved Conflict between Two Construction Management Paradigms for Contingency Project Environments

Chi Iromuanya; Kathleen M. Hargiss; Caroline Howard

This study explores two construction execution and management models for construction and infrastructure development in a new era of fiscal austerity in the face of unplanned, yet devastating natural or man-made disasters. One model explores the role and application of evidence-based construction management, while the other studies the role of the pragmatic approach to construction management in the context of existing cultures and emergent, or dynamic project circumstances. Responses from subject matter experts from two representative dynamic construction and infrastructure development areas (Nigeria and Afghanistan) are evaluated for insights. This research combined expert opinions with time-tested approaches for efficient infrastructure project, procurement, and execution in emergent circumstances of man-made or natural disaster management. While one of the two development strategies is based on performance criteria such as cost, quality and time efficiencies, the other is based on the utilitarian value of a pragmatic juxtaposition of driving social, political and environmental factors. The study is underscored by the notion that while numbers do not lie, they are by their very nature incapable of offering the whole truth.


International Journal of Strategic Information Technology and Applications | 2016

Exploring Variables that Affect Moral Development of Working Professionals

Caroline Howard; Barbara J.A.M.G. Armenta; Kathleen M. Hargiss

The increase of unethical behavior in the workplace has encouraged contemporary researchers to focus their research efforts on exploring moral development of employees in the business sector. It is thought that moral development may be a crucial driver of ethical decision making, while morality may be affected by a range of variables. In this study, the impact of higher education, ethical education, and work experience on moral development of licensed real-estate agents is examined. Moreover, the impact of higher education on an individuals moral development to a higher level of Kohlbergs theory of moral development is evaluated. The results of the study suggest that the variables of higher education, ethical education, and work experience showed no significant impact or increase of moral development of real-estate agents. The findings imply that the level of moral reasoning of real-estate agents service their occupations ethical requirements.


International Journal of Strategic Information Technology and Applications | 2016

Moving from Theory to Practice: Integrating Mobile Devices in Elementary Reading Instruction

Lisa-Marie Bald; Judith Orth; Kathleen M. Hargiss

Technology integration continues to be a professional development concern, especially in elementary schools. It remains unclear why there is a difference between how teachers talk about using technology and how they apply it in teaching reading. The purpose of this investigation was to explore professional development options that would help teachers connect theory to practice by studying their decision-making process. In a case study design, 10 K-4 teachers participated in one 60-minute interview, one follow-up interview, and one 45-minute focus group. With the use of typological analysis, transcripts were coded for initial and emerging themes. Results indicated that integrating mobile devices was highly dependent upon teachers being self-directed learners. Teachers relied on informal collegial interactions when deciding to use mobile devices. Continuous professional development that addresses adult learning styles was recommended by the teachers to support technology adoption.


International Journal of Strategic Information Technology and Applications | 2015

Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence

Caroline Howard; Michael Warah Nsoh; Kathleen M. Hargiss

The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior TPB, which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top managements Information systems security challenges.


International Journal of Strategic Information Technology and Applications | 2015

Antecedents of Customer Satisfaction Affecting Broadband Loyalty: An Implementation of Servqual and NPS®

Caroline Howard; Franklin M. Lartey; Kathleen M. Hargiss

Many customer satisfaction studies in the service industry use SERVQUAL, an instrument developed by Parasuraman, Zeithaml, and Berry 1998. Similarly, many studies on customer loyalty use the Net Promoter SystemTM NPS® developed by. Even though researchers acknowledge a relationship between satisfaction and loyalty, there is currently no empirical evidence demonstrating such relationship using SERVQUAL and NPS. In that regard, this study analyzed the antecedents of satisfaction measured by SERVQUAL that influence loyalty as measured by NPS in the context of the residential broadband service industry. To that effect, 208 broadband customers in the U.S. Midwest region were surveyed online. A confirmatory factor analysis confirmed the latent structure of collected data, validating the use of the five SERVQUAL factors as predictors. An ordinal logistic regression OLR model built on the collected data confirmed the existence of a statistically significant relationship between Empathy one of the factors and customer loyalty, suggesting that increasing empathy by one point increased the odds of becoming a promoter by 11.73%. The final model was validated using the Akaike information criterion AIC, a single sample cross-validation model.


International Journal of Strategic Information Technology and Applications | 2014

Exploring Self-Efficacy Beliefs as Entry Behaviors for Participation in an Online Peer Tutoring Learning Environment

Iván Tirado-Cordero; Kathleen M. Hargiss; Caroline Howard

Social cognitive theory is founded on the belief that learning is shared socially. Triadic reciprocal determinism explains the interrelationship and interaction between environmental cues, behavior, and biological determinants to shape and alter the perception of the self and how individuals assume agentic perspectives in social interactions to approach challenges and pursue goals. Knowing how learners perceived their likelihood to achieve success also provides for a better understanding of the constraints and opportunities of a proposed learning solution. The purpose of this study was to explore the self-efficacy beliefs of adolescents as part of the analysis of the learners in the instructional design system (ISD) model in terms of entry behaviors for the design of a peer tutoring learning environment. The General Self-Efficacy Scale (GSE) was used to interview participants, using the questions as open-ended questions. Observations of the social interactions between participants were collected during focus groups to discuss their responses to the GSE scale. The results of this study suggested that individuals with high self-efficacy not only assume a direct personal agentic perspective when acting alone but that they also assume and motivate others to engage in a collective agentic perspective. Individuals with low self-efficacy assume proxy or surrogate agentic perspectives in social interactions and require prompting to engage and participate. High self-efficacy indicates effective collaboration through the collective agency, which affects success positively in a peer tutoring learning environment. Low self-efficacy affects negatively success in peer tutoring, because individuals with low self-efficacy assume a proxy or surrogate agentic perspective detaching themselves from the interactions. However, individuals with low self-efficacy, through prompting and motivation from peers with high self-efficacy can improve their interactions and as goals are reached, improve self-efficacy.


International Journal of Strategic Information Technology and Applications | 2012

Information Technology Process Improvement Decision-Making: An Exploratory Study from the Perspective of Process Owners and Process Manager

Caroline Howard; Sandy A. Lamp; Kathleen M. Hargiss

This article is derived from a qualitative multicase study with two settings that explored the way decisions are made in two IT organizations regarding process improvement initiatives by using face-to-face semi-structured interviews with 20 IT process owners and managers. The two participating organizations are a healthcare insurance company and a manufacturer of electronic interconnects. The study sought to uncover a how IT process improvements are prioritized and how approvals are attained, b how senior leadership is involved in decision making, c how security and risk are considered, d if and how formal process improvement methodologies are used, e if and how estimated and actual cost benefit analysis are conducted associated with decisions, and f how alignment with organizational goals is attained. The topic of IT governance was narrowed to explore the perspective of IT process owners and process managers, and their approaches and methodologies used with IT process improvement initiatives. The study found that pre-decision stages take place in IT investment decision making, and that process owners and process managers, participants other than senior leadership, and executive level decision makers are involved in these pre-decision stages and may be involved in the final decision stages.


International Journal of Strategic Information Technology and Applications | 2012

The Role of Leadership and Technology in Successful and Sustainable Airline Management: A Case of Two Carriers

Oliver H. Burckhardt; Kathleen M. Hargiss; Caroline Howard

A study about the role of leadership and technology in successful and sustainable airline management was conducted to further the knowledge concerning the effects these factors have on the sustainability of airline business. The goal of the study was to identify suitable leadership approaches, core and enabling technologies that are of importance for airline executives in the context of the global nature of the industry and its challenging, competitive environment. Conducting interviews with former executives from Continental Airlines and Lufthansa German Airlines and with C-level managers from airlines unaffiliated with these carriers provided insights concerning adequate methods to lead airlines that experience operational, organizational, or financial crises. One of the findings of the study, which was conducted by evaluating successful crisis management programs of Lufthansa and Continental Airlines, is the need to integrate both core and enabling technologies with a leadership approach that allows organizations to outperform their competitors and, more importantly, maintain their leading position.


International Journal of Strategic Information Technology and Applications | 2011

A Proposed Architecture for Autonomous Mobile Agent Intrusion Prevention and Malware Defense in Heterogeneous Networks

Robert O. Seale; Kathleen M. Hargiss

This paper proposes an architecture that can support autonomous mobile agents performing intrusion prevention activities on a heterogeneous network. The division of duties performed by the agents in the system ensures the agents are able to remain distributed throughout the network architecture to eliminate single points of failure. The distributed nature of the architecture reduces the workload on network clients and eliminates duplication of effort wherever possible. The use of virtual machine interfaces between the hardware and the network connection isolates the hardware interface in order to maintain trust and integrity of the connection and reduce the potential for an attacker using a trusted resource to damage network assets. Virtual machine connections allow a potential malware infection that invades the network environment to be safely observed for unusual behavior patterns using heuristic analysis to provide new evidentiary indicators that can be used to identify the malware during future outbreaks.

Collaboration


Dive into the Kathleen M. Hargiss's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Colleen Royle

Minnesota State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hammad Haq

Colorado Technical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge