Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Virginia Franke Kleist is active.

Publication


Featured researches published by Virginia Franke Kleist.


Information Systems Frontiers | 2003

An Approach to Evaluating E-Business Information Systems Projects

Virginia Franke Kleist

Capital investments in the e-business infrastructure add complexity to the IT payoff question because e-business interorganizational investments are deployed across multiple platforms, projects, vendors and partners. Traditional MIS research has been devoted to measuring the payoff from information technology (IT) investment without any specific focus on e-business. Flaws in the mature MIS performance measures seem to yield weak guidance for managers when evaluating IT success, thus diluting the potential for these measures to be adapted for use in the new e-business environment. A review of the conventional MIS payoff literature indicates that these measures may be incomplete, inaccurate, or inefficient for application to electronic commerce investments. This paper brings four new points to the e-business IT investment evaluation dialogue: (1) we first explore performance measurement validity flaws in our long established measures; (2) the paper discusses a two-by-two matrix delineating the gap between the quantitative versus qualitative performance measures of management information systems (MIS) initiatives; (3) sample e-business payoff techniques are discussed and reviewed in light of these historical imperfections, and (4) fourth, the paper proposes and describes an innovative framework derived from production theory economics for future research in evaluating e-business MIS implementations.


Electronic Commerce Research | 2004

A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy

Virginia Franke Kleist

Transaction cost economics can explain the mechanism by which network security technologies may reduce the interexchange costs between businesses in the supply chain and between businesses and customers in the digital economy. This paper develops the construct of technology-based electronic trust, where interpersonal, or “real” trust between people can be amplified and enhanced with the use of network security information technologies. The paper formally models an electronic commerce trust typology based on minimizing the cost of establishing trust in transactions, balanced against maximizing the potential user value from successfully completing transactions in the digital economy, suggesting that there is an optimal amount of acceptable risk in electronic commerce transactions. Sophisticated deployments of security information technologies may increase levels of interpersonal trust while lowering transaction costs in electronic commerce, thus promoting the long run development of neutral, interorganizational electronic markets and growth in the digital economy.


Information Management & Computer Security | 2005

The biometric technologies business case: a systematic approach

Richard A. Riley; Virginia Franke Kleist

Purpose – This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric technologies in information systems to enhance corporate security for access control, identification and verification applications.Design/methodology/approach – The paper reviews the strengths and weaknesses of leading biometric technologies, while commenting on their practical applicability in real world implementations. In addition, the paper develops a process for ensuring that the best biometric applications are chosen, considering both the technology and related business issues.Findings – The paper suggests that biometrics must be carefully selected to achieve a good fit to the security problem, giving examples of how a good fit might be evaluated by the user. The one‐time and recurring charges associated with the typical biometric implementation are evaluated, arguing that these costs must be offset by a formal risk evaluat...


Information Systems Management | 2007

Building Technologically Based Online Trust: Can the Biometrics Industry Deliver the Online Trust Silver Bullet?

Virginia Franke Kleist

ABSTRACT This article presents a model for managing online transactions by using biometrics to reduce the cost and risk of transactions. Biometric technologies may replicate the richness of human trust to a greater degree than other, more derivative security technologies. Here, we suggest that biometrics can lead to enhanced security in the exchange, thus removing online trust barriers. Yet, problems in the evolution of new markets constrain acceptance of biometrics as the solution to online trust.


Information Systems Frontiers | 2017

Beyond utilitarian factors: User experience and travel company website successes

Marya Wani; Vishnupriya Raghavan; Dolphy M. Abraham; Virginia Franke Kleist

Travel websites are extensively used by travelers for their travel bookings, yet little is known about the hedonic effectiveness of such experiences for the customer. The end users of these websites are customers who may not always be sophisticated information system (IS) users. Further, traditional utility based measures of customer evaluation are dated with respect to the interactive nature of the technology in use and the hedonic benefits that may result from the use of the technology. The evaluation of IS needs to include hedonic measures facilitated by the interactive technology in addition to the traditional utility based measures. We propose and test an evaluation model for retail travel websites that combines the traditional utility based measures with hedonic measures which collectively create a more comprehensive measure for the IS evaluation of consumer focused websites. Thus rooted in theory, the model extends DeLone and McLean’s model of IS Success by adding the construct of User Experience. The model was tested on a sample of 255 customers of travel websites targeted at the Indian market. The results indicate that both utility based and hedonic measures are important factors for customer IS (travel website in this study) evaluation. The larger implications for theory and practice of IS evaluation are explained.


Journal of Information Systems | 2014

Secure Information Market: A Model to Support Information Sharing, Data Fusion, Privacy, and Decisions

Bonnie W. Morris; Virginia Franke Kleist; Richard B. Dull; Cynthia D. Tanner

ABSTRACT: There are instances where multiple organizations hold data that when considered individually are inconclusive, but collectively are useful to solve complex problems. Yet, frequently there is a hesitation for organizations to share data due to strategic, legal, and policy concerns. To address this hesitation, an electronic market for secure information sharing is described, in which data are contributed to the market by members, and made available from the market to members or preapproved information buyers. In this Secure Information Market (SIM), shared data are secure, and available in granular or aggregate form based on specific requirements of the information providers and consumers. The model is designed to protect member organizations and their shared data, while maximizing member value and incentives to share. The Secure Information Market model is presented, and then its applicability is demonstrated using a variety of examples.


Journal of Computer Information Systems | 2016

A Performance Evaluation Framework for a Public University Knowledge Management System

Virginia Franke Kleist; Larue Williams; A. Graham Peace

Measuring information technology (IT) implementation success has long been a challenge for information systems researchers and practitioners. The IT evaluation problem is exacerbated when assessing the specific performance of a knowledge management system (KMS), in part because the dependent variable must measure the construct of IT driven incremental enhancements to organizational knowledge and productivity. Historically, researchers have used many quantitative and qualitative variables to evaluate the performance of IT implementations, ranging from return on investment to quality of user decision-making. Academic institutions, such as universities, often have knowledge creation as a final goal, adding to the complexity of the KMS performance measurement challenge. This paper describes a planned, multi-phased, KMS implementation at a typical state university, and presents the theoretically-based, yet practitioner-oriented measures that will be applied to evaluate the ongoing success of the KMS, as it is deployed.


Journal of Global Information Technology Management | 2015

The Russian and Ukrainian Information Technology Outsourcing Market: Potential, Barriers and Management Considerations

Virginia Franke Kleist; Amy B. Woszczynski; Humayun Zafar; Pamila Dembla

This study describes the advantages and disadvantages of information technology outsourcing to Ukraine and Russia. The results assist technology managers who wish to make an informed decision on whether or not to outsource information technology projects to Russia/Ukraine, considering two important issues: (1) the political, economic, and social landscape, and the advantages and disadvantages of choosing to locate information technology projects in the region and (2) the Russian/Ukrainian information technology workers’ teamwork perceptions. By understanding the countries and the potential information technology workers within that country, organizations should be able to develop management policies to improve chances of success. While the results indicate that well-educated and teamwork-oriented Russian and Ukrainian information technology employees may increase the chances of information technology outsourcing success, the authors remain skeptical regarding the political, economic, legal, social, and business environments.


Journal of Global Information Technology Management | 2018

An Interview with Richard Smith Vice President and Chief Information Officer, Wabtec Corporation

Virginia Franke Kleist

Richard Smith is Wabtec Corporation’s Vice President and Chief Information Officer. Westinghouse Air Brake Technologies is a global firm in the freight rail, passenger transit, and industrial produ...


Journal of Global Information Technology Management | 2016

An Interview With Jo O’Flynn: Chief Technology Officer, Silah Gulf, Manama, Bahrain

Virginia Franke Kleist

Jo O’Flynn heads Silah Gulf’s Information Technology (IT) department. Her key responsibility includes framing the IT strategy for the company along with providing innovative solutions to align business processes and objectives. Jo is also in charge of developing IT governance, IT cost optimization, and crisis management. As the Chief Technology Officer of an IT-enabled service company, Jo’s role is vital for the seamless operations of the company through a robust technological backend support system, ensuring maximum client satisfaction. With over 15 years cross-functional international experience across various domains such as IT infrastructure services, telecommunications, and virtualization, Jo has extensive skills in building and leading teams to deliver world class technology solutions that will help facilitate rapid growth in highly competitive service sectors. She has successfully delivered solutions across many vertical markets including banking, finance, and automotive, where she has delivered numerous large-scale technology (applications & infrastructure) deployments, demonstrating success in directing business transformations globally. Prior to working at Silah, Jo was IT Manager at Merchants, a leading Business Process Outsourcing solution provider where her role involved designing and delivering integrated Contact Centre solutions to a wide range of customers. Her previous roles also include Service Desk Manager at Peugeot and Cemex. Prior to this, Jo was working as a Lead Technical Engineer with hands-on expertise in voice over IP networks, Microsoft applications, and programming. Jo has vast experience in technology and business domains and has accomplished several awards through her career including Best Contact Centre Platform in the Middle East for 2012 and 2013.

Collaboration


Dive into the Virginia Franke Kleist's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Humayun Zafar

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Larue Williams

West Virginia University

View shared research outputs
Researchain Logo
Decentralizing Knowledge