Applied Information Management

Capstone Research Paper Abstracts

The Capstone research paper provides students with the opportunity to integrate previous learning in AIM with professional expertise, relative to a research topic of their choice. Capstone is the final course that students take to earn the AIM degree.

Abstracts of papers, and the full text of award winning papers, can be found by clicking on the links below.

Search the University of Oregon Libraries Scholars' Bank for the full text of a specific Capstone title or subject.

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  Y 


Accurate HCC Coding—Technology Best Practices (2015)

Jimmy Chandler, market general manager and managing director—Western Region, Evolent Health

This annotated bibliography focuses on references that examine the process of Hierarchical Condition Category (HCC) coding and the technologies that offer the most promise in supporting the coding of and data collection for HCCs. The literature selected was published between 2008 and 2014. The literature will help healthcare executives make decisions as they relate to capital investments in technology that will improve the accuracy of HCC coding and Medicare Advantage plan revenue.

Download the entire Capstone research project

Actionable Intelligence: Legacy Information Technology Systems and the Improvised Explosive Device Global Threat, Achieving (2016)

Paul R. Plemmons Jr., deputy program manager, Pacific Architects and Engineers (PAE)

The expanding use of the improvised explosive device (IED) around the globe requires Department of Defense (DoD) government and military organizational leaders and associated support staff to focus on achieving actionable intelligence aimed at successfully countering this enduring and evolving threat. This annotated bibliography focuses on literature published between 2012 and 2016 and discusses the use of decentralized legacy information technologies by the DoD and the impact on gathering, analyzing, and sharing of critical IED exploitation data.

Download the entire Capstone research project

Adaptive Web Technologies in Support of Public Access and Public Interaction, Improving State Legislative Websites through (2004)

Andy Harvey, webmaster, Nevada Legislature

The Internet is increasingly considered a crucial component of revitalized civic participation in the United States. The potential for e-government raises expectations of citizens, for information that is visible, accessible, usable, and useful (OMB Watch, 2001). Governments are falling behind private-sector businesses with regard to the introduction of new technologies. This study examines recently developed web technologies adaptable by users, to provide a more personalized, customized Internet experience in support of public access and interaction.

Addressing Skill Gaps by Onboarding IT Graduates into the Workplace (2015)

Melissa Roberts, application support technical lead, Nike

This annotated bibliography focuses on the premise that providing comprehensive onboarding programs upon hiring new IT graduates will significantly improve job performance, retention, and satisfaction for employers and graduates. The author identifies the issue, noting categories of skills that IT graduates need to improve. A description of best practices of onboarding programs and how they can help fill skill gaps is provided. Finally, a literature review identifies the best practices for IT graduate onboarding programs.

Download the entire Capstone research project

Adopting Software Design Patterns in an IT Organization: An Enterprise Approach to Add Operational Efficiencies and Strategic Benefits (2011)

John Knox, software developer, The Regence Group

Software design patterns are recognized as a valuable part of good engineering practices (Buschmann, 2005). Literature published between 1995 and 2011 is examined in order to provide IT professionals with definitions, classifications, and benefits of commonly used software design patterns. Design patterns capture experience and provide multiple perspectives on design problems. They support improved communication, flexibility and extensibility, and collaborative and mentoring opportunities. Adoption and implementation are required enterprise wide to realize benefits and efficiencies.

Download the entire Capstone research project

Advanced Point of Sale Technology as a Marketing Tool in the Retail Environment, Use of (1998)

Lisa L. Duckett Vielbig

The purpose of this study is to investigate the use of new information technology in mass retail settings at the retail point of sale. Literature review is employed, addressing publications from 1990 to the present. New marketing processes that result from the collection and management of this data are explored. Results are presented as five trends intended to help retail executives decide when and where to implement new point of sale technology systems.

A First Step in Implementing Flexible Manufacturing, Issues (1995)

Gale Tapp

This project defines flexible manufacturing systems (FMS), types of FMS, successes and failures of FMS, examples of FMS, and a framework for FMS planning. Implementation issues of FMS applicable to manufacturing organizations are presented.

Aligning Selected Systems Thinking Tools to Mitigate Key Challenges Encountered During the Initial Stage of Organizational Change

Meghan Fallenstein, sr. human factors engineer, Intel Corporation

This paper examines the potential for systems thinking tools to provide ways for organizational leaders (Senge, 1999) to address challenges within the organizational change process. Literature published after 1990 is reviewed concerning challenges encountered in the initiating phase of organizational change (Senge, 1999) and selected systems thinking tools: Causal Loop Diagram, Behavior Over Time graph ("Basic" 2004), The Iceberg (Kim, 1999), and Action-to-Outcome (Jones and Seville, 2003). Conclusions are presented for organizational change leaders.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Alignment of Business and Information Technology: A Summary of Alignment Elements for the Improvement of Information Technology Effectiveness within Organizations

Chris Buhle

Management of alignment between business and information technology (IT) has become a primary strategic objective within many organizations in order to maximize the value from technology-related investments. To facilitate understanding of alignment at the component level, a review of selected literature published between 1994 and 2001 identifies 60 conditions that contribute to an increase in business and IT alignment. Findings are presented as annotated lists to aid business leaders in formulation of organizational strategy.

Analyzing Customer Satisfaction Data for Use in Employment and Training Program Design

Laura Dieken

Social service agencies have been slow to recognize the importance of customer satisfaction to their enterprises. This project documents the review of current tools being used by The Private Industry Council, Inc. and from other similar entities; and surveys both users and providers of customer satisfaction data currently being collected.

Application of Internet Technology to Enhance the Practice of Home Schooling, A Model for the

Nahrin Dowds

This project explores current World Wide Web technology and presents a model to demonstrate the potential of interactive web-based instruction. During autumn of 1996, the project employed state-of-the-art web development tools to produce a prototype website, WebMath, for 5th grade students. Reviewed by teachers, students, and parents in Kitsap County, Washington, results suggest that web-based instructional tools can enrich the learning experience for homeschoolers and may enrich public and private schooling efforts as well.

Applications of Lean Methodologies for Improving Information Security

Mark Messenger

Information Technology (IT) Risk Management is critical for large organizations. Lean methodologies describe ways to reduce process waste. Duplicate IT systems and services can be viewed as Lean waste. This paper explores Lean waste reduction in IT to decrease organizational risk. References from foundational works and works in the last ten years are presented. IT managers and security executives can use this work to identify Lean tools that provide value for their organization.

Download the entire Capstone research project.

Application of Value Factors to Control Document Archiving and Termination within an Electronic Document Management System, A Study of the

Janice Barnard

The purpose of this paper was to generate and design a questionnaire intended to assist system designers in identifying concerns that need to be addressed when a document is entered into a document management system. A literature review of 1996 and 1997 publications and informal interviews with experts provided a basis for the questionnaire generation. Suggestions were made regarding generations of value factors to manage document retention and the use of intelligent agents in this process.

Application Rental Model: A Summary of Services by Three Selected Application Service Providers (ASP) and Enabling Technologies of Application Hosting Over Networks, An Overview of the

Chizuru Sezai

Driven by advancements in Internet-related technology and demands for solutions to the increasing complexity of software applications management, application service providers (ASP) have evolved who rent applications over a network. Selected literature published between 1996 and 2000 illustrates the application rental model for potential outsourcing clients by identifying services offered by three selected ASPs—Futurelink, Interliant, and USInternetworking—and enabling technologies. Findings are presented as annotated lists of service types and contributing technologies.

Application Server Platforms Converging Middleware Solutions for Integration and Development

Cheryl Clark

The growth of e-business is driving the demand for middleware solutions that seamlessly integrate disparate systems into a unified value chain. A profusion of middleware categories complicates understanding and acquisition of solutions. A review of selected literature from January 1997 to June 1999 of the larger area of distributed computing identifies trends in the marketplace toward consolidation of solutions into value-added platforms. Conclusions are presented as recommendations for IT professionals and managers to guide decisions about middleware.

Application Software Acquisitions Policy and Its Ramifications: A Case Study of Fujitsu Computer Products of America (FCPA)

Donald Mallet

The acquisition of application software has great potential for process problem solving for companies. If done with no controls, it can lead to problems in hardware and software incompatibility, cost control, and transferring information between departments. This project examines the present situation at FCPA and suggests an alternative in the form of a policy that balances the needs for control and creativity.

Artwork as a Service: Lessons and Best Practices from Service-Based Businesses (2018)

Daniel Berman, photographer, dHb Photography

Smartphones and social media have driven the popularity of photography to an all-time high. In addition to being popular, photography is big business and operates within a crowded and competitive market. To find success in the industry, one has to differentiate oneself and find new sources of revenue. This study explores the potential for an artwork rental business as an uncommon revenue stream, and identifies best practices and lessons learned from similar business models.

Download the entire Capstone research project

Asynchronous, Interactive Internet-based Distance Education Instruction, A Literature Review of (1993–2003)

Dorothy Pick

The purpose of this study is to provide resources for asynchronous distance education teachers concerning the application of instructional methods to design interaction in asynchronous Internet-based distance education instruction. Selected literature published between 1993 and 2003 addressing the application of instructional methods to design interaction, as defined by Moore (1989), is examined using a content analysis methodology. The resources emerging from this literature review are categorized in a list, tables, and an annotated bibliography.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Augmenting Workplace Wellness Programs with Biometric Monitoring (2018)

Jason Miller, technical program manager, Intel Corporation

This annotated bibliography contains recent research describing the practices, policies, risks, and results regarding employer-sponsored wellness programs in the United States that are increasingly augmented with biometric monitoring features such as fitness trackers. The goal of this study is to improve the understanding of common risks and shortcomings so that individuals designing or augmenting wellness programs have improved chances of achieving success in helping employees reach positive health outcomes.

Download the entire Capstone research project

Automated Software Testing Tools to Achieve Software Quality Assurance, Benefits of Using (2005)

Michael T. Grater, intermediate methods analyst, UPS

The increasing complexity of software development demands that developers use automated software testing tools. This study analyzes selected literature published between 1997 and 2005 to provide an analysis of benefits of automated software testing tools to increase software quality assurance. Benefits are presented for software engineers and business analysts, and classified in relation to five quality factors (in reference to web applications) described by QA Labs, including quality, reliability, recoverability, security, usability and performance.

Download the entire Capstone research project


Benefits and Risks for Small, Specialized Medical Practices to Consider Before Transitioning a First-time Patient Questionnaire from Paper to a web-based Process, A Study to Identify

Anna Rembert

This study examined selected literature published between 1995 through 2002, focusing on benefits and risks for transitioning patient intake questionnaires from paper to a web-based process in a small, specialized medical practice. Results are presented as subcategorized lists of benefits, risks, and other considerations, sorted by degree of relevance to this web application and the healthcare industry. Small medical practices can then evaluate the benefits and risks for leveraging the web for capturing patient information.

Benefits of Dialogue in Small Groups and Implications for Symbolic Dialogue in Larger Groups, A Selected Study of the

John Spady

The purpose of this study is to examine the benefits of the use of dialogue as a strategy for the successful functioning of small groups. Using the methodology of grounded theory, literature published between the years 1990 and 2000 are examined and interpreted. Conclusions list the benefits of dialogue attributed to small groups and relate ways to scale them to larger groups using the technique of symbolic dialogue as defined by Spady and Bell (1998).

Benefits of an ITIL Transition in Small to Medium Sized Enterprises (2019)

Brandon Barker, systems analyst, Anthem

Small and medium sized enterprises (SMEs) are subject to the same complex computing requirements as their larger counterparts (Cruz-Hinojosa & Gutierrez-de-Mesa, 2016). With ever increasing complexity and cost associated with operating systems that are necessary today, SMEs need to learn how to do more with less. Tools exist today to help IT departments track issues and be more efficient with their spending through the use of the Information Technology Infrastructure Library.

Download the entire Capstone research project.

Best Practices for Heterogeneous Health IoT Integration Into Electronic Health Records (2019)

Jeffrey K. DeWitt, senior systems administrator, Kaiser Permanente

Health IoT represents an agglomeration of medically-based devices that automate collection, communication, and processing of health data (Da Costa, Pasluosta, Eskofier, Da Silva, & Da Rosa Righi, 2018). This study examines how healthcare institutions can integrate heterogenous data into electronic health records. Key potential benefits are within precision medicine (Prosperi, Min, Bian, & Modave, 2018), patient chronic illnesses (Peng & Goswami, 2018), and advanced patient monitoring inside and outside of hospitals (Rodrigues et al., 2017).

Download the entire Capstone research project.

Best Practices for Implementing a Hybrid Project Management Methodology (2018)

Olivia L. Hillaire, senior business systems analyst, Intel Corporation

Best practices in implementing a hybrid project management methodology that will align stakeholders with differing project approaches were gathered from scholarly literature from 2005 to 2018. Project managers, directors, leaders, and customers will find this study useful because the sources identified provide key insights and background on Waterfall and Agile frameworks as well as the challenges and best practices in implementing a hybrid methodology.

Download the entire Capstone research project.

Best Practices for Learning Analytics Implementation in Higher Education (2019)

Hiroe Sorter, student success program manager, University of Oregon

As the use of learning analytics garners significant interest from higher education institutions, complex challenges have surfaced in the implementation of this tool. A successful implementation requires strategic and thoughtful planning and execution. This study examines the challenges and best practices for a successful learning analytics implementation. Institutions that are interested in initiating a learning analytics project and are in the process of implementation will benefit from the findings of this study.

Download the entire Capstone research project.

Best Practices for Large-Scale Agile Transformations

Del Wright

Agile software development methods were originally designed for small, individual team projects, but have shown potential benefits for larger projects and organizations as well. Concerns exist, however, regarding scalability and complexity when integrating Agile practices in large-scale organizations. Using a review of literature published since 2011, this paper seeks to inform information technology (IT) leaders of large organizations of the challenges and best practices for implementing large-scale Agile transformations.

Download the entire Capstone research project.

Best Practices for Tailoring and Implementing a Project Management Methodology (2019)

Colin McClure, sr. program manager, Digimarc

Research has shown that the use of a project management methodology (PMM) contributes to a project’s success (Joslin & Muller, 2014). As the field of project management continues to evolve, it is incumbent on project management practitioners to exercise best practices in tailoring and implementing project management methodologies (Project Management Institute, 2017). Utilizing peer reviewed studies between 2006 and 2019, this study aims to define these best practices for use by other project management professionals.

Download the entire Capstone research project.

Best Practices in IoT Implementations at Small Commercial Service Airports (2018)

Cathryn E. Stephens, assistant airport director, Eugene Airport—City of Eugene

The Internet of Things (IoT) is transforming the passenger experience and operational efficiencies at commercial service airports. Strategies and tactics employed to implement IoT infrastructure have direct impacts on successful decision-making processes and risk mitigation, especially at small hub airports. This paper identifies best practices in IoT in the aviation industry over the past five years. Airport executives and IT managers can benefit from this work to create business value within their organization.

Download the entire Capstone research project.

Best Practices in Project Management, Implementing Lessons Learned (2015)

Tim Vignos, enterprise project manager, Pitney Bowes, Inc

For good reasons, project organizational structures are becoming more dominant in business. Project managers must strive to continuously become more effective at managing projects by learning lessons from previous projects. This paper provides project practitioners and their managers with information on the benefits of lessons-learned practices and the next steps for improving existing practices.

Download the entire Capstone research project

Best Practices in Using Semantic Transformation in Data Integration to Address Data Integrity Issues (2019)

Saketh Balijepalli, data integration strategist, Oregon State University Foundation

Data integration is a digital technology used to combine data from multiple sources and provide users with a unified view of data assets (Chen, Hu, & Xu, 2018; Davidovski, 2018). Data is typically loaded into a data warehouse via Execute-Transform-Load (ETL) operations (Hose et al. 2015); sometimes the transformed data lack of data integrity. This paper explores best practices in using semantic transformation to address data integrity issues caused by data integration.

Download the entire Capstone research project

Best Practices to Obtain and Maintain PCI Compliance (2018)

Jennifer Blackwell, senior product marketing manager, CompTIA

PCI developed security standards to guide merchants in ensuring sensitive cardholder data is protected. However, data breaches continue, affecting the data of billions of customers and negatively affecting revenue and consumer confidence. Merchants must determine the best approaches to not only obtain, but also maintain PCI compliance. This annotated bibliography considers best practices published from 2004 to 2018 to assist IT departments in implementing security procedures to securely process payment card transactions.

Download the entire Capstone research project

Big Data and Data-Intensive Computing, What CIOs and CTOs Need to Know about (2012)

Robert P. Brehm, software developer, Zoom Software Solutions

The nature of business computing is changing due to the proliferation of massive data sets, referred to as big data, that can be used to produce business analytics (Borkar, Carey, & Li, 2012). This annotated bibliography presents literature published between 2000 and 2012. It provides information to CIOs and CTOs about big data by: (a) identifying business examples, (b) describing the relationship to data-intensive computing, (c) exploring opportunities and limitations, and (d) identifying cost factors.

Download the entire Capstone research project

Blending Agile and Waterfall Planning Methodologies, Benefits of (2016)

Candice Quist, senior business systems analyst, Nike, Inc.

With continuous changes in technology and the project management practices used to deliver successful software projects to the business and users, information technology leaders need to optimize and adapt to find more effective management approaches. Understanding the strengths and weaknesses of both the waterfall and agile methodologies in order to choose and blend the characteristics that align best to meet the needs for a project is key to delivering a successful project.

Download the entire Capstone research project

Bring Your Own Device (BYOD) Strategy in Higher Education, Factors for Consideration when Developing a (2012)

Scott Emery, co-CIO/director of academic technology, California College of the Arts

The consumerization of IT changes the way in which IT departments must plan for and manage technology. This annotated bibliography presents factors for consideration by IT leaders in higher education when developing an institution-wide strategy to address the use of personally owned mobile handheld devices, known as bring your own device (BYOD). Literature published between 2007 and 2012 is examined in regard to four categories: (a) policy creation, (b) data security, (c) user education, and (d) mobile learning.

Download the entire Capstone research project

Business Demographic Data Between State Governmental Agencies, Best Practices in Exchanging (2016)

Christopher Fowler, Chief Innovation Officer | Director of IT, Rhode Island Department of State

Exchanging data between government organizations can be painful. This annotated bibliography of 15 authoritative sources investigates the best practices of E-Government data exchanges by evaluating (a) Challenges of Data Exchange in E-Government, (b) Common Data Formats in Data Exchanges, (c) Designing Centralized Systems for Data Exchanges and (d) The Use of Service Oriented Architecture for E-Government. Government IT leaders will benefit from the discussion of technical and organizational challenges faced with creating governmental data exchanges.

Business Functions as an Initial Step in Creating a Business Recovery Plan (1995), Collection and Identification of

David Martin

Disasters are constantly in the news. Business recovery plans are created to provide a means to recover from all forms of work stoppage—including major disasters. A business analysis project was conducted, using North Pacific Insurance Company as one case.

Business Intelligence Enables Greater Efficiency when Strategically Designed and Tactically Implemented (2011)

Lee Averett, custom reporting manager, Cummins Northwest, LLC

This annotated bibliography summarizes 32 articles published between 2000 and 2011 as they address the question —Why should a company adopt a strategic approach to business intelligence (BI) and business analysis (BA) in addition to specific tactical approaches, to achieve efficiency gains? Factors are identified related to system design, employee education, and technology to capture, store, and analyze high quality data. The goal is to present upper managers a set of key factors for implementation success.

Download the entire Capstone research project

BYOD Policy, Identifying Best Practices for a (2016)

Joshua King, end user computing engineer, CoBiz Financial

Increasing numbers of employers permit employees to use personal devices to perform work-related tasks, posing security risks. This annotated bibliography includes literature that identifies best practices for analysis, design, and implementation of bring your own device (BYOD) policies. Research results impact CIOs/CTOs, security professionals, IT operations management, compliance and audit teams, and end users interested in BYOD.

Download the entire Capstone research project


Change Management and Customer Relationship Management (CRM) Implementations: Planning for Success (2005)

Nicholas Kanellakis, systems analyst, Sage Software

This paper identifies change management practices that facilitate Customer Relationship Management (CRM) (Nykamp, 2001) implementations. Selected literature published between 1994 and 2004 is subjected to grounded theory and constant comparison analysis (Strauss and Corbin, 1990). Results are grouped by four change management areas from Kale (2005): training, leadership, infrastructure change, and performance metrics. The outcome is presented to CIOs and CRM steering committee members, as a decision support tool in planning a CRM implementation.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Change Management for Successful Integration of Health Information Technology (HIT) Systems in Hospitals, Implementation of Effective (2009)

Pattarin Mekanontchai, IT manager, Thompson Metal Fab, Inc.

The purpose of this literature review is to examine change management strategies that chief information officers (CIO) and chief medical informatics officers (CMIO) need to understand to best implement health information technology (HIT) systems to effectively produce health services in hospitals. Two systems are examined: electronic medical record (EMR) and computerized physician order entry (CPOE). Leadership is the essential ingredient. Three key methods are identified to combat resistance to change: communication, collaboration, and empowerment.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Change Management in the Semiconductor Industry Using Computer Modeling and Simulation (1997)

Kelly Brown

This paper deals with effective change management using computer modeling and simulation following the principles of system dynamics. In the semiconductor industry, wafer yields are rising while package costs are falling. Currently, circuits go through wafer and final package test. With a convergence of the trends mentioned above, it is feasible that wafer test could be eliminated. This research focuses on computer modeling that allow managers to make an informed decision about bypassing wafer test.

Changing Role of CIO: From IT Leader to Corporate Strategist, The (2006)

Moritz G. Feldhues, senior business systems analyst, Affiliated Computer Services

This paper examines the changing role of the chief information officer (CIO) in large technology organizations, from 1995–2005. Using a pre-defined set of nine CIO leadership roles (Gottschalk, 2001), a content analysis is conducted to determine which CIO leadership roles have become more predominant. Conclusions are presented in a timeline graph (Corda, 2004) and a composite set of key job responsibilities in a current CIO job description, for use by executive recruitment teams.

Download the entire Capstone research project

Check Image Processing: Determinants for Implementation (1996)

Vicki Aimi Piersall

Check imaging is a new technology on the West Coast, and as such, there is limited experience with it. As with all new technologies, implementation requires a significant capital investment, time to produce technological expertise, and re-engineering of operations. Due to the vast resources necessary to implement image, this study identifies the critical success factors to check image technology implementation. Using these factors, a decision model is provided for organizations to employ.

Cloud-Based Document Storage in Law Firms, Integrating Best Practices for (2017)

Brianne Hansen, Assistant Controller, Rissman, Barrett, Hurt, Donahue, McLain, & Mangan, P.A.

The efficiencies, cost savings, and sustainability offered by today’s technological innovations are compelling law firms to migrate their document storage to cloud-based environments. For law firms to store their documents within the cloud, they must develop best practices to address legal, ethical, and security issues. This annotated bibliography provides managing partners, executive directors, information directors, chief information officers, and controllers of law firms with literature focusing on these issues and potential solutions.

Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners (2010)

Thomas J. Betcher, senior disaster recovery coordinator

Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance.

Download the entire Capstone research project

Cloud Computing (SaaS) Supports an Electronic Document and Records Management System (EDRMS), How (2013)

John Hidalgo, information manager, Macquarie Infrastructure & Real Assets, Inc.

This annotated bibliography identifies literature published from 2007 to 2013 that examines the use of cloud computing (specifically software-as-a-service [SaaS]) in support of an electronic document and records management system (EDRMS). The goal is to examine two factors: (a) cost effectiveness and (b) information security. Findings show that cost is affected by the type of cloud deployment model and particular use. A key security issue is regulation, which can be mitigated through audit and monitoring.

Download the entire Capstone research project

Cloud Computing Security Risks, Identifying (2011)

Paul Wooley, network analyst, Tyco Electronics

Cloud computing services including infrastructure as a service (IaaS) promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk.

Download the entire Capstone research project

Collaboration Challenges for a Global Organization with Distributed Personnel (2017)

Binh Bui

The purpose of this study is to examine the collaboration challenges global organizations face with distributed personnel. The annotated bibliography, intended for virtual team leaders and team members, provides resources that address the collaboration challenges global companies face with virtual teams, describes advantages and disadvantages of virtual teams, and identifies best practices and technology to address the challenges posed by virtual teams.

Collaboration for Successful Global Virtual Team Management, Using (2008)

Alex Bringas, IT manager, Intel Corporation

Virtual teams have become the norm in response to global business demands. This literature review poses the question, What can IT mangers learn about the nature of collaborative work that will improve their ability to successfully manage these teams? A synthesis of literature published in the past decade is examined to present unique characteristics of virtual teams and recommended strategies and tools to enable collaborative work, in support of more successful team management.

Download the entire Capstone research project

Collaboration Obstacles in Globally Distributed Teams, Overcoming (2017)

Blaire Gallagher

This annotated bibliography focuses on the obstacles which arise when using globally distributed teams. The references are meant to provide material to human resource (HR) and information technology (IT) managers on how to enhance and encourage collaboration within these teams. The documents examined were all published between 2008 and 2016 and focus on collaboration challenges, management best practices, and collaboration technology.

Collaborative Business Process Re-engineering Using Discussion Databases, Building a Framework for (1996)

Paul Edwinson

Information sharing and decision coordination are central problems for large scale business re-engineering efforts. This project proposes a framework for building a shared knowledge repository which serves as a communication medium among cross functional segments of an organization critical to the re-engineering effort.

The collaborative framework proposed here is designed to support and improve information sharing and coordination for tasks of capturing business process knowledge from experts, sharing ideas and concerns via electronic open forum. This electronic forum or discussion database is the focal point of this demonstration.

Collaborative Enterprise Architecture Governance Program within the Context of Service-Oriented Software Systems Development, Framing a (2007)

Mark McClure, enterprise technology architect, The Regence Group

The chief enterprise architect must employ different methods to govern enterprise architecture (The Open Group, 2005) and service-oriented architecture (Malinverno, 2006). Results from a content analysis of selected materials published between 2002 and 2006, help to form a framework of four artifacts including a glossary, conceptual model, a set of causal loop diagrams, and a guide for a collaborative enterprise architecture governance program. The framework is designed to support the analysis, design and development of service-oriented software systems.

Download the entire Capstone research project

Collective Intelligence for a Competitive Advantage (2010)

Sean Lane, global transition manager, Nike, Inc.

This literature review examines collective intelligence through analysis of literature published between 1985 and 2009. Focus is on (a) definitions and applications of collective intelligence related to crowdsourcing and open innovation, and (b) creation of competitive advantage. The final outcome presents five recommendations for how these two types of collective intelligence may be used to support innovation, including the need to create a collective intelligence (CI) system and use of an open innovation business model.

Download the entire Capstone research project

Combining Agile Software Development Practices and Knowledge Transfer Systems to Support Knowledge Sharing Between Subject Matter Experts (SMEs) and Software Developers (2012)

Stephan A. Hancock, software development manager, Rentrak Corporation

This annotated bibliography reveals that knowledge transfer systems, when combined with selected agile software development practices, may help overcome barriers that prevent knowledge sharing between subject matter experts (SMEs) and software developers. Social aspects of agile development practices (pair programming) and approaches to knowledge transfer (community of practice) are shown to address barriers including hoarding, linguistics, and bureaucracy. The goal is to mitigate risks associated with potential loss of intellectual capital related to legacy systems.

Download the entire Capstone research project

Commercial Print: Strategies for Improving Profit in a Contracting Market (2016)

Clint Wolford, Solutions Development Manager, RICOH USA

Pressure applied from the proliferation of digital media has constricted commercial print demand. This study identifies sources to inform the best workflow practices and technologies for commercial printers to reduce costs and manage profitability in the competitive environment. The audience for this paper is owners of commercial print shops that have experienced the reduction in print volume. This annotated bibliography provides potential strategies to overcome the reduced demand in the printing industry.

Communication Challenges Faced by Virtual Project Team Leaders, Selected Collaboration Tools that Address the (2008)

Andres Gutierrez, TSYS (Total System Services)

Communication is considered a key factor for effective project management and project success. This literature review examines information published between 1994 and 2007, about the communication challenges faced by project managers, when leading virtual teams. Results reveal three types of collaboration tools (information management, conferencing, and project management) that can be used to address three larger kinds of typical communication challenges. Research indicates that establishing trust and addressing information overload are two additional key elements.

Download the entire Capstone research project

Communication Tactics that Describe Innovation Advocacy Leadership as a Way to Inform Organizational Strategic Planning by Leveraging Networks and Building Consensus (2010)

Connie Atchley, associate director, Enterprise Computing Services, Oregon State University

This study presents six communication tactics that describe innovation advocacy leadership. It examines differences in communication abilities and behaviors represented by divergent processes, which develop new directions necessary to support innovative ideas, and convergent processes which represent the dominant organizational view necessary to support formal strategic planning (Pappas, 2004). Tactics provide advocates with a procedural bridge to the new ideas they propose and include defining innovation context, developing dynamic networks, channeling opportunities, and framing perceptions.

Download the entire Capstone research project

Comparing the Workforce 2000 Employee Prototype and Learning Theory to Existing Training and Education Delivery Systems to Identify Competitive Programs and Their Components (1995)

Janet Jaron-Jacobs

In spite of abundant information about work place skill requirements and effective teaching techniques, many educational institutions are not using the techniques and tools that would enhance initial and continuing learner preparation. This project documents existing learning theory and work place requirement studies; evaluates post-secondary institutions; and describes sample educational efforts based on adult learning and workplace needs.

Computer Based Training within a Corporate Environment, Conducting a Needs Assessment for the Implementation of (2007)

Brandon Maldonado, technical trainer, NW Natural

Computer based training (CBT) can fail to deliver real business value if implemented on the basis of assumptions alone (O'Connor, 2006). A training needs assessment can determine if CBT will address needs prior to implementation. Using content analysis, this study, structured in four steps, provides a guide to conducting a CBT needs assessment. Steps include: (1) conducting a gap analysis, (2) identifying priorities, (3) identifying performance problems, and (4) identifying solutions. CBT benefits and drawbacks are included.

Download the entire Capstone research project

Computer Instruction and Andragogy: Best Methods to Teach the Elderly E-mail as a Communication Tool (2005)

J. Michael Cuciti, owner/systems integrator, CBM Computer Solutions

Each year 351,000 people become senior citizens (U.S. Census Bureau, 2004). As families disperse geographically, there is a need for older adults to learn to use technology as a communication tool to remain connected to family. This study examines age-related barriers that hinder learning and identifies strategies and design considerations best suited to the elderly. Guidelines, grounded in andragogy (Knowles, in Bean, 2003) are provided to assist instructors who teach the elderly in face-to-face environments.

Download the entire Capstone research project

Computers in the Schools: An Examination of the Degree to Which Computers Have Been Integrated into the K-12 Curriculum (1996)

Howard Loewinger

While installation of modern computer technology in American public schools has been taking place at an accelerated rate, there has been increasing concern that teachers are ill prepared to deal with this technology. Based on a survey of computer use in Junction City, Oregon, this project examines how K-12 teachers are using computers as part of their instructional program. Focus is on how and how much computers are used as an instructional tool in the classroom and in labs. Findings from the survey are compared with data collected from similar studies.

Computer-Mediated Communication in the Workplace: Problems and Solutions (2015)

Charles Gilman, water quality enforcement officer, Washington State Department of Ecology

As workplace computer-mediated communication (CMC) rises, negative behaviors associated with toxic disinhibition effect (TDE) occur (Suler, 2004). Behaviors include bullying and flaming, which affect workplace productivity, and can lead to claims of hostile work environments. Laws shifting in favor of victims require managers and human resource staff to face these challenges. Potential solutions include policies designed to prevent the behaviors and CMC technologies such as videoconferencing and webcams to increase social presence and decrease dehumanization.

Computer Training for Nurses: A Review of Training Techniques to Optimize Transfer of Training (2000)

Ivy Holt

Computer training for nurses is an essential requirement for the conversion in health care to computerbased patient records. Training is expensive, with an estimated transfer rate of less than 20 percent to the work place. Techniques to optimize transfer of training emerged from a review of selected references published from 1991 to 2000. Results are presented as a list of techniques to facilitate transfer of training to be considered during the development of training programs.

Computer Viruses, Strategies for Managing (1998)

Kevin Conroy

This study considers the problem of computer viruses from a management perspective. The goal is to identify the most effective strategy for protecting organizations’ information systems. The research methods include a review of published literature and an analysis of survey data. All survey data used in this study were gathered between 1995 and 1997. The conclusion of this paper includes a set of steps to guide today’s managers in developing an effective antivirus policy.

Copyright Compliance Policy to Manage Risk in a Digital Publishing Environment; Framing, Defining, and Implementing a (2010)

Amy Norred, technical publications specialist, CH2M HILL

Digital technology allows unprecedented access to information (Armstrong, 2005). This study examines selected literature published between 1990 and 2010 to provide communications professionals working in the United States with a 14-point guide to help frame, build, and implement a copyright compliance policy related to the use of digital graphic elements including photos, maps, and pictographs. Focus is on the use of a policy to reduce financial liability as part of a larger risk management program.

Download the entire Capstone research project

Copyright Law and Massive Book Digitization Projects: A Current Interpretation (2007)

Darren Baker, vice president, Dijahnelos Homes, Inc.

Six pre-selected legal concepts related to copyright law (copyright infringement, fair use, intermediate copy, library exception, property, and transformative use) are examined in relation to massive book digitization projects, such as the Google Book Search (Jeweler, 2005). Content analysis is applied to literature, published between December 2004 to present, in order to develop interpretive narratives for each concept. These concepts present a "snapshot-in-time" that covers current discussion for people tracking topics of interest.

Download the entire Capstone research project

Corporate Training, Constructivism, and Electronic Performance Support Systems (EPPS): A Review of Literature (2008)

T. Trask, training consultant, Standard Insurance Company

A deeper understanding of EPSS website construction has the potential to benefit web developers and the enterprise through improved EPSS practice, and may add consistency to instructional design. The target audience is corporate web authors. Selected literature, published from 2000–2007, examines the following areas: (1) corporate training, including the role of EPSS systems, (2) principles of a constructivist learning theory, and (3) opportunities to align types of EPSS support structures to Constructivist pedagogy.

Download the entire Capstone research project

Correlating First Quarter 2000 Sales Performance and MCIF-Line (Marketing Customer Information File ) Usage within the Oregon Bank of America Branch System (2000)

Kurt Bonnema

This study investigates the relationship between branch level sales performance and the usage of MCIF-Line in the state of Oregon at Bank of America. Data was collected from MCIF-Line logs and products sales during the first quarter of 2000. The state of Oregon as a whole showed no significant correlation between MCIF-Line usage and sales performance. A positive correlation was found, however, in two smaller sub segments, Districts C and D.

Cost Allocation and Transfer Pricing in State Government Data Networks (1995)

John Radford

State data communication networks have significantly moved to multiprotocol/multivendor based networks. Advances in technology coupled with lower costs have significantly increased the demand for data networking communication investments for state governments. This project reviews the use of cost allocation methodologies currently found in state government data communication networks.

Costa's Web Content Management Taxonomy and Process, Interpretation and Augmentation of (2000)

Petra Langwald

Creating, managing, and delivering web content is increasingly important to companies as they realize that competitive advantage is connected to effective content management. This study examines selected web content management processes. Data for this study was collected from literature published between 1997 and 2000. Results are presented in the form of a descriptive table based on a taxonomy provided by Costa (1998), to be used by decision makers responsible for implementation of content management solutions.

Cultural Changes Necessary in Traditional Plan-Driven Software Development Organizations when Preparing to Adopt Agile Principles, Identifying (2011)

Susan S. McElfish, project manager, Intel Corporation

Organizational culture plays a critical role in the acceptance and adoption of agile principles by a traditional software development organization (Chan & Thong, 2008). Organizations must understand the differences that exist between traditional software development principles and agile principles. Based on an analysis of the literature published between 2003 and 2010, this study examines nine distinct organizational cultural factors that require change, including management style, communication, development team practices, knowledge management, and customer interactions.

Download the entire Capstone research project

Customer-centric Strategy to Enable CRM and Develop Customer Loyalty, Building a Strong (2008)

Kristen Ballard, Intel Corporation

Customer relationship management (CRM) requires a customer-centric focus that aligns business strategies with customer needs to generate profit through maximizing customer lifetime value. Many business managers implement CRM technology without addressing the customer-centric strategic orientation that must be present for CRM to be successful. This Review of the Literature examines 22 articles published between 1973 and 2007 that emphasize customer-centric business strategy as a foundation for CRM and a facilitator for customer loyalty.

Customer Complaints in Social Media, Evaluating Best Practices for Addressing (2016)

Stephen W. Kooyman

The number of complaints and negative feedback delivered via social media continue to increase, and marketing, public relations, and customer service leaders need to develop comprehensive, integrated corporate plans to successfully monitor and respond to these customer issues. This annotated bibliography presents selected literature on understanding customer social media usage, its impacts on customer complaint interactions, and the best practices for successfully addressing customer complaints in social media.

Download the entire Capstone research project

Customer Connection via the Internet: A Competitive Advantage Model for Merix Sales and Marketing (1995)

Douglas Eng

Despite the mass media coverage on the growth of the Internet, a good understanding is lacking as to what an organization can and should do once the connection is made. This project explored the utilization of the Internet for creating competitive advantage within the Merix sales and marketing functions.

Cybersecurity Awareness and Compliance in Nonprofits, Training Programs to Increase (2015)

John Randy Ray, business application specialist, South Bay Family YMCA

Most nonprofits accumulate and store sensitive and vital business information digitally and are becoming increasingly reliant on technology; they are therefore more at risk for cyberattacks (Goldernberg, 2013). Despite technical cybersecurity efforts, the employee remains the most vulnerable target for cybercriminals (Hu, Dinev, Hart, & Cooke, 2012). Educating employees through cybersecurity awareness programs ultimately contributes to an organization’s cybersecurity efforts (Kolb & Abdullah, 2009). This annotated bibliography presents literature about common cybersecurity vulnerabilities, stakeholders, and training.

Download the entire Capstone research project


Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs) (2011)

Jeffery S. McLean, information security systems engineer, Harris Corporation

As the number of mobile information systems (ISs) increases, so does the amount of data-at-rest (DAR) susceptible to attacks. Literature published from 2001 to 2010 is examined to describe (a)13 selected standards, regulations, and policies requiring DAR security solutions; and (b) currently available DAR security solutions of two types: hardware (encryption) and applications. Focus is on affordability and interoperability. Solutions are presented as a guide to help curb loss of DAR and identity theft.

Download the entire Capstone research project

Database Security: An Inventory of Threats, Vulnerabilities, and Security Solutions

Ryan Nichols, project leader systems data base administrator, HBO

Databases are being compromised today at an alarming rate (Britt, 2007). This content analysis study provides database administrators and security managers with an inventory of five common threats to and six common vulnerabilities of databases of large corporations where more than 1,000 devices require security management (Whitman and Mattord, 2004), aligning these threats with potential security solutions. As noted by Vizard (2007), while companies are becoming adept at fighting data breaches, attacks are gaining in sophistication.

Data Governance Frameworks to Manage Big Data as an Asset, Using Aspects of (2013)

Allen Chamberlain, senior practice consultant, EMC Corporation

The emergence of big data has transformed how organizations realize the benefits of large datasets. This annotated bibliography examines how data governance frameworks may enable organizations to more effectively implement big data systems and maximize the rewards. Literature published from 2004 to 2013 is reviewed, key aspects of big data governance systems are identified. Aspects are aligned within a set of five domains (Khatri & Brown, 2010) to guide effective data governance.

Data Governance from the Private Sector to Public Higher Education, Applying Aspects of (2011)

Marsha Poor, HRIS specialist, Mount Wachusett Community College

The purpose of this annotated bibliography is to identify ways to better manage enterprise-wide data assets within institutions of higher education through data quality actions and data governance options. The goal is to present selected data governance practices within the private business sector for consideration by individuals in public higher education who promote and support data quality initiatives. Topics include data quality barriers, data quality models, data quality management practices, and data quality drivers.

Download the entire Capstone research project

Data Security and Accessibility in Higher Education, Balancing (2016)

Stephen J. Brouwers, applied information technology specialist, Clackamas Community College

Regulatory requirements and data breaches are both on the rise and beg for increased data security, while ever-growing expectations within higher education to be more efficient and help students succeed demands data be more accessible to answer endless business questions. It is now more essential than ever that higher education institutions determine how to balance data security with accessibility—two major aspects addressed by data governance. This literature review identifies tools and techniques that can help leadership within higher education institutions balance data security with the high levels of accessibility necessary to provide value to the organization and answer key business questions in a timely manner.

Download the entire Capstone research project

Data Warehouse at an Architectural/Engineering Design Firm, Building a Prototype (1997)

Fred Stuart

Data warehousing has generated interest among information technology professionals and business executives because of its potential to turn data into information. This project reviews current thinking among practitioners, describes a design approach in non-technical terms, and demonstrates a prototype data warehouse for an architectural/engineering firm. The prototype substantiates the correlation between the quality of source data and extracted information and reinforces the need for an iterative, incremental approach to ensure the data warehouse meets expectations.

Data Warehouse Development in K-12 Public Education: A Guide for IT Directors, Steps to (2007)

James Rose, director of technology services, Multnomah Education Service District

This study explicates data collection and reporting steps when designing a data warehouse for public education. Literature published from 2002 to 2006 in education-related periodicals concerning data warehouse design and implementation is analyzed. Content analysis is utilized to identify information related to eight steps of data warehouse design for public school districts, proposed by Pare & Elovitz (2005). The outcome is a data warehouse development guide that includes practical examples from the field.

Download the entire Capstone research project

Data Warehouses as a Decision Support Tool in K-12 School Districts, Use of (1998)

Andrew Hill

The purpose of this study is to investigate the use of data warehouses for decision support in K-12 school districts. The study was conducted through a review of literature from the ERIC database from 1990 through 1997 on information technology in school districts, particularly where site-based management is in place. The result of this study is a list of considerations to help school districts decide whether to implement data warehouse technology.

Definitions of Anti-Patterns in Software Development Project Management (2001)

David Frackelton

This study discriminates among existing definitions of antipatterns, one subset of object-oriented pattern languages. Emphasis is placed on the relationship to software development project management processes. A review and content analysis of selected literature published since January 1995 identifies four conceptualizations of antipattern definitions, including (1) generative, (2) nongenerative, (3) metaphoric, and (4) pictorial. The definitions of antipatterns were coded for these conceptualizations and recommendations were made concerning the advantages and disadvantages of each.

Design of a Knowledge Management System to Support Corporate Internal Intellectual Property Control, Factors that Influence the (2004)

Hillary Collier, process specialist, Vertek Corporation

The purpose of this study is to identify factors that impact the design of a knowledge management system that supports corporate intellectual property. Such systems enhance corporate productivity and innovation. A literature review (1994–2004) and content analysis result in a roadmap for use by corporate decision makers, outlining a comprehensive set of factors addressing: information design and usability; groupware considerations; use of a knowledge repository; general KMS design factors and management of intellectual property.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Design, Layout, and Review Factors that Influence Consumer Trust in Online Stores and Best Practices for Optimization (2016)

Matthew M. Shirk

Website trustworthiness is recognized as one of the primary factors driving consumer intentions to buy products online. Many aspects of website design, information layout, and consumer reviews impact how customers perceive trustworthiness of an online retailer. This literature review, utilizing sources published between 2010 and 2016, identifies some of the most prominent aspects of retail website design, layout, and consumer reviews that have the most significant impact on a potential customer’s perception of website trustworthiness, as well as best practices for improving it.

Download the entire Capstone research project

Desktop Online Analytical Processing as a Strategic Tool for Sales Analysis, An Evaluation of

Paul Teaford

Online analytical processing (OLAP) is a class of database query and reporting tools, delivering multi-dimensional views of data to users. This project investigates OLAP as a productive and strategic information technology for sales analysis. Two types of systems used for business information analysis, a desktop OLAP system and a transaction processing system, are compared to explore OLAP's potential as a decision support tool. Additionally, a review of desktop OLAP by sales and marketing management provides input on the information requirements of management and the ability of OLAP to meet these requirements. Conclusions address the role of desktop OLAP as a complementary technology in business information analysis.

Digital Asset Management Strategy: A Study of Issues Related to Planning for Marketing Communications Professionals (2001)

Lynda Gansel

Companies are looking for ways to manage their digital assets, both to contain costs and to enable cross-media publishing, which utilizes the same assets for all media. This study examined ideas found in literature published from 1996 through 2001 by professionals involved in electronic or print publishing. Results are presented as annotated concept maps (Trochim, 2001), to be used by marketing communications professionals to assist them in planning a digital asset management strategy.

Digital Cellular Technology of Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) as Solutions to Increasing Capacity on the Analog Network, A Study of the

Norman Newkirk

In order to add more customers, analog cellular companies need to increase the capacity on their networks. This study examines two digital technology solutions that can provide capacity gains: CDMA IS-95 and TDMA IS-136. A literature review was conducted on collected data from telecommunication literature published between 1994 and 2000. Results are presented as a list of definitions and features for radio frequency and system engineers concerned with increasing capacity on their analog network.

Digital Data Preservation Practices to Ensure Long-Term Information Accessibility (2013)

Amir Rizk, network analyst, Inland Northwest Health Services

This annotated bibliography describes data preservation practices used by organizations to ensure long-term digital content accessibility. It is intended for information professionals working in data management roles. Selected literature is published between 2001 and 2013. Practices designed to ensure data accessibility for as long as needed include: (a) an interconnected network of trustworthy repositories, (b) guidelines for data stewardship, (c) a trustworthy digital object (TDO) design (encapsulation and encoding), and (d) preservation self-assessment tools for libraries.

Digital Divide in K-8 Education: Contributing Factors and Mitigating Teaching Strategies, The (2005)

Kel Farley, support center specialist, University of Nevada Reno

Lynch (2002) defines the Digital Divide as "the gap between those who have access to and can effectively use information technologies and those who cannot" (Lynch, 2002 p.2). This paper examines a primary factor, socio-economic status (Chen and Wellman, 2003), along with Internet access (Birdsall, 2000) and teacher technological skills (Castells, 2002) in K-8 education. Literature published between 1995 and 2005 is analyzed to suggest ways to successfully mitigate the Digital Divide in the classroom.

Download the entire Capstone research project

Digital Video-on-Demand (VoD): A Study of the Correlation between Price and Video Distribution Windows, The Impact of (2000)

Michael Johnson

This exploratory study correlates the price a VOD consumer is willing to pay to view a movie and the length of time the movie has been in release. Data gathered by telephone survey is analyzed using statistical methods to conclude that price is weakly associated with distribution window in a negative correlation. Further research is warranted to confirm price point, as well as a multivariate study to correlate additional factors of convenience, variety, and popularity.

Disaster Recovery Planning for Time-critical Business Information Technology Systems, Key Stages of (2009)

Travis S. Luckey, director of information technology, VTM Group

When disasters interrupt services provided by vital information technology (IT) systems, many businesses never recover (Decker, 2005). This review of literature published between 2001 and 2008 identifies key stages for consideration when performing IT disaster recovery (DR) planning to ensure business viability if disasters occur. Planning stages, presented as a guide for IT professionals, include project initiation, conducting a business impact analysis, developing a DR plan, testing a DR plan, and maintaining a DR plan.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Document Imaging Standards for Migration of Student Records from a Paper to a Digital System (2001)

Dave Karlson

In Oregon, public schools maintain permanent student records on paper. Document imaging technology can change this by migrating them to a computerized system that provides several benefits. A review and content analysis of selected literature published between March 1993 and May 2001 identifies the technical criteria for each of the five components of an effective document imaging system. Criteria are presented as a guideline for selecting a system to be used in a K-12 environment.

This author of this study is a corecipient of the 2001 AIM Director's Capstone Award.

Driverless Cars: Preparing for the Impact on the Automobile Insurance Industry (2017)

Chase Ryan

The purpose of this study is to investigate the problem of uncertain legal liability, and the related problem of declining profits, for automobile insurers pertaining to driverless cars. Resources published from 2012 to 2017 are presented to the chief executive officers of automobile insurers, the Highway Loss Data Institute division of IIHS, and the Casualty Actuarial and Statistical (C) Task Force of the NAIC for the purposes of planning for a future with driverless cars.

Dynamic Part Selection Within Component Library Management, An Approach to

Ron Wold

Existing electronic design and analysis (EDA) design tools employ static part selection technologies as a means of acquiring parts from an EDA component library. This study identifies the problems associated with static part selection, and promotes a dynamic approach.


E-Commerce Website Design Best Practices for Executive Education Providers (2004)

Wilfred M. Curtis, The University of Michigan

Executive education providers rely on the Internet to attract students. This study identifies best practices for use by these providers in the design of e-commerce websites to attract registrations for open enrollment programs. Selected literature (1999–2004) was analyzed to identify website communication elements and design best practices. E-commerce communication elements and best practices are aligned with Sharp's (2001) six positive response action categories, supplemented with two emergent categories: strategic planning and performance metrics.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Effective Implementation of ITIL/ISO 20000 Problem Management (2019)

Seth A. Dryden, business enablement manager, Nike, Inc

Significant documentation indicates that individuals and organizations that are responsible for the quality operation of information technologies do so through the use of well defined, established processes. Problem Management has been found to be an effective practice to improve IT service quality when implemented correctly. Challenges can be overcome by noting lessons learned from experienced Problem Management practitioners and scholars through a literature review of works published between 2005 and 2019.

Download the entire Capstone research project

Effectiveness of a Survey Designed to Measure Organizational Culture Change, Criteria for Evaluation of the (2000)

Holly Schroeder

In trying to create organizational culture change, many organizations rely on surveys of organization members to determine the degree to which the change is progressing. A review of selected literature identifies criteria by which an organization can evaluate the validity of an organizational survey designed to measure culture change. The use of these criteria is then demonstrated in a pilot test on a survey developed at the Oregon Department of Environmental Quality.

Efficiency and Effectiveness of the Collaborative Process as Used by Teams in Computer Assisted and Face-to-Face Communications, A Comparison of the

Wendy Willow

This study compares the effectiveness and efficiency of computer assisted collaboration to face-to-face collaboration in small groups through the use of four research studies conducted during the past four years. Face-to-face collaboration is more efficient than computer assisted collaboration; however, computer assisted collaborative results are equal to face-to-face collaborative results. The type of task impacts the efficiency and effectiveness. This study raises further questions about why there are differences between the two methods of collaboration.

eLearning Technologies in Blended Learning Models: Potential Impacts on Assessment in K-12 Schools, Using (2006)

Scot W. Moye, product manager, IT, Intel Corporation

In an era of increased accountability and shrinking resources for primary and secondary educational institutions, recent eLearning technologies could play a significant role in reaching goals of the No Child Left Behind Act. This paper presents a review of selected literature published between 1996 and 2006, explores the most commonly used eLearning technologies, examines potential impacts on assessment, and reveals possible benefits of introducing them in blended K-12 environments to present curriculum content.

Electronic Distribution of Computer Software (1995)

Scott Fenton

The purpose of this project is to discuss issues regarding the electronic distribution of computer software from the manufacturer to the customer. Issues and costs of electronic software distribution (ESD) are reviewed from both the manufacturer and the customer perspective.

Electronic Document and Records Management System (EDRMS), How Cloud Computing (SaaS) Supports an (2013)

John R. Hidalgo, information manager, Macquarie Infrastructure & Real Assets, Inc.

This annotated bibliography identifies literature published from 2007 to 2013 that examines the use of cloud computing (specifically software-as-a-service [SaaS]) in support of an electronic document and records management system (EDRMS). The goal is to examine two factors: (a) cost effectiveness and (b) information security. Findings show that cost is affected by the type of cloud deployment model and particular use. A key security issue is regulation, which can be mitigated through audit and monitoring.

Electronic Health Record (EHR) Interoperability Gap, Bridging the (2015)

Dar'ya Sims, provider medical development planner, PeaceHealth Medical Group

In order to provide interoperability between healthcare organizations, healthcare IT must provide tools to exchange and coordinate patient information among electronic health record (EHR) systems. This annotated bibliography contains research published between 2005 and 2015 that targets interoperability options for EHRs with a focus on articles published since the 2010 passage of the Patient Protection and Affordable Care Act (Anderson & Zanzi, 2013). The report identifies best practices in designing the tools to bridge the EHR interoperability gaps.

Electronic Mail Policy and Management (1996)

Cynthia A. Berg

E-mail changes the way we communicate. Employees spend increasing amounts of time sorting, reading, forwarding, storing, replying, and deleting electronic mail messages. As more organizations incorporate e-mail, information system (IS) managers are increasingly aware of issues involved in adequately managing e-mail systems. Issues range from the legal complexities of e-mail ownership to the economic impact of e-mail storage and retention. Based on a survey of 20 e-mail administrators, this research explores current management practices and illustrates the need for e-mail policy development. A draft e-mail policy incorporating acceptable practice guidelines is included.

E-mail Overload, Enterprise Wide Techniques to Remediate or Avoid (2013)

Jonathan Dolan, director of network services, Oregon State University

Modern knowledge workers (especially managers) are faced with an ever-increasing volume of information in the form of e-mail, yet e-mail management advice often fails to reduce the feeling of overload. This annotated bibliography presents selected literature published from 1988 to 2013 on e-mail overload to identify techniques for combating the problem. Enterprise-wide techniques identified include training on e-mail client features to filter and sort, use of assistants, and setting organizational policies about reading and responding.

E-mail Overload: A Review of Employee E-mail Management Problems and Solutions to Consider When Designing a Targeted Skills-Based Training Program (2004)

Lynda Olin, research administrator, Colorado State University

E-mail volume continues to grow and many employees are unable to manage it (Kubicek, 2003). Employees can learn e-mail management skills, but most organizations do not offer e-mail training (Kubicek, 2003). This conceptual analysis study reviewed documents published between 1995 and 2003 to determine key problems and solutions. Results of the study can be used to inform the design of a customized e-mail skills training program that in turn, can reduce stress and increase productivity.

E-Mail Policies and Employees’ Rights to Privacy in the Workplace, A Study of

Mary Bremen

In the last decade, electronic mail (e-mail) has grown dramatically, as the primary tool for business communications. A selective review of the literature published from 1995 through mid 1999 provides an overview of the complicated issues surrounding e-mail and employee privacy rights. The conclusion of this research is that a clearly stated company policy defining appropriate use of e-mail in the workplace may help avoid both litigation and intrusion on the employees’ rights to privacy.

Emergency Notification Systems within a Community College Environment (2010)

Stuart Long, director of technical services, Clackamas Community College

Emergency Notification Systems (ENS) are in wide use in higher education, including community colleges. Literature published between 1990 and 2010 is examined regarding the use of ENS in the community college setting in light of the distinct and broad-based community college mission and recent reductions in funding sources. The analysis produces 11 recommendations to guide planning and implementation of ENS in an open community college environment, for use by community college technology and safety administrators.

Download the entire Capstone research project

Emergent Practice in Online Corporate Reputation Management (2010)

Chae Pak, managing partner, RowHouse LLC

The Internet culture presents a paradigm shift for corporate communicators; organizational success is increasingly dependent on stakeholder activities online. This study examines online corporate reputation management initiatives, through analysis of literature published since 2000. Three overarching principles emerge: (a) demonstrate sincerity and respect as the essence of all exchanges, (b) use a multistep approach for the most effective online reputation management initiatives, and (c) integrate the corporate communications function within the core of the organization.

Download the entire Capstone research project

End-User Training Best Practices for Enterprise Systems: Improving User Adoption, Identifying (2016)

Laurel Hodgins, Content Discovery & Migration Analyst, Suncor Energy

This study seeks to identify pedagogical best practices and instructional techniques that will facilitate end-user learning and improve adoption of enterprise systems. The study summarizes fifteen sources that explore how training and knowledge management represent challenges for Enterprise Systems implementations, why successful end-user training is important for system adoption, and what best practices and instructional techniques can be applied to more effectively train end-users during an Enterprise System implementation to support a successful project.

Engaging Alumni to Increase Charitable Donations to their University (2016)

Dan Whitinger, director, information technology services, Oregon State University Foundation

State funding in higher education remains lower than before the effects of the last recession, while education costs have risen. Higher education uses fundraising to keep the quality of education from diminishing and control tuition. This annotated bibliography presents selected literature on identifying best practices for increasing alumni philanthropic participation through social media.

Download the entire Capstone research project

Engineering Change Order Methodologies in Electronic Manufacturing Organizations, A Comparison of

Mark Warner

Effective design, management, and operation of Engineering Change Order (ECO) systems in modern manufacturing operations are becoming critical components for competitive survival. In this project, engineering and documentation personnel from electronic manufacturing organizations were interviewed and the ECO systems at their companies were compared.

Enhancing Home Computer User Information Security: Factors to Consider in the Design of Anti-phishing Applications

Melinda Geist, Intel Corporation (2008)

As home computer users increase dependency on the Internet to complete electronic transactions, the need to resolve phishing vulnerabilities in the user interface becomes more urgent (Dhamija & Tygar, 2005a). Selected literature published between 2004 and 2007 is analyzed to provide designers and developers of anti-phishing applications with a set of fundamental user-centered design principles to consider prior to system design and technology solutions selection. The significance of anti-phishing user education is also examined.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Enterprise Architecture Model to Support Alignment of Information Technology Efforts with Strategic Business Goals, Selecting an (2005)

Linda Ballas, software architect, Standard Insurance Company

Waddington (2004) and Bloomberg (2005) believe that organizational characteristics should help determine the choice of an enterprise architecture model. This paper examines key existing models and aligns these with variations in organizational maturity level, including business process definition, system development life cycle, and enterprise data warehouse (Phillips, 2004). Outcomes are provided for enterprise architects and systems analysts who seek to model both technical and business components to support strategic planning efforts (Baker and Janiszewski, 2005).

Download the entire Capstone research project

Enterprise Architecture Tools to Improve the Requirements Gathering Process of IT Projects, Use of (2009)

Kaushik Mandal, business analyst

The purpose of this literature review is to identify ways that the application of enterprise architecture tools might enhance the initiation phase, also known as the enterprise analysis phase, of the requirements gathering process. Selected literature is examined from three areas: IT project management, requirements gathering, and enterprise architecture. The advantages and disadvantages of using specific tools, including the Zachman Framework, are discussed in relation to business processes and the needs of the business analyst.

Enterprise Content Management Using Microsoft SharePoint™, Implementing (2008)

Dana Fowler, Key Knife Incorporated

Enterprise Content Management (ECM) refers to technologies used to capture, manage, store, preserve, and deliver content and documents related to organizational processes (Duhon, 2005a). Microsoft SharePoint™ provides the ability to create, publish, and manage content (Microsoft, 2007a). Through analysis of 25 sources published between 2002 and 2007, this literature review provides an introduction to SharePoint and describes its role as a specific selected ECM in order to assist information managers in the implementation of ECM.

Download the entire Capstone research project

Enterprise Resource Planning for Prolonged Success, Anatomy of a Startup: Exploring (2016)

Jennifer Ogren

Enterprise resource planning (ERP) systems are often utilized to provide key decision makers with accessible data and information. However, the implementation of ERP systems frequently proves to be costly, resource intensive, and frequently involves infrastructure disasters for small startup organizations struggling to stay in business. This annotated bibliography presents literature to explore common best practices for entrepreneurs and investors involved in a growing startup organization for implementing key ERP systems and modules to increase the probability of startup success.

Enterprise Resource Planning System for Small and Medium Enterprises, How to Select an (2014)

Christian Page, information technology manager, Axiom Electronics

The purpose of this annotated bibliography is to address the key criteria for consideration at each stage when (a) identifying ERP system options, and (b) evaluating these options for the selection of an ERP system that best meets the needs for small and medium sized enterprises.

Download the entire Capstone research project

ERP Implementations, Critical Success Factors for (2015)

Lori Hogan, senior process manager, Nike

Enterprise resource planning software integrates the administration of all parts of a business into one system that provides process efficiencies and real-time visibility of business activities. ERP projects are complex and require a review of critical success factors before implementation. Determining the key critical success factors and their application is critical for all project stakeholders. This study focuses on these elements and provides relevant information for project managers, project teams, steering committees, and project sponsors.

Download the entire Capstone research project

Evidence Linking Organic Chemical Pollution to Human Health Problems, The Weight of (1998)

John Kinney

The weight of evidence against synthetic organic chemicals is sufficient to establish more stringent safeguards against their use. This research employed a weight of evidence method. Epidemiological data, laboratory studies, and compiled environmental research was reviewed using a text analysis method against the dimensions of time, cause and effect, consistency of association, collaborating research, and coherence of the association. The research results suggest modification of current environmental regulatory programs is indicated.


Fact-Finding with Digital Libraries, Faster (1996)

Mark R. Barnett

This research covers the usability testing of a prototype digital library. The library holds technical manuals for scientific instruments. Findings show test subjects can locate desired documents faster with this digital library than a corresponding paper library. However, at this point in time, the same subjects can locate desired information faster in a paper document than a digital one. Most importantly, subjects reported they preferred using the online library of technical documents over the traditional paper library.

Factors that Limit Wireless Web Use in the United States, A Study of

Keith Lim

This paper identifies factors that lead to the low level of wireless web use in the US. Particular attention is paid to use of the wireless web in an e-commerce context, including m-commerce (Charnoff, 2001). Selected literature published between 1998 and 2001 is subjected to concept analysis (Carney, 1972). Results indicate there are thirteen distinct factors that hinder wireless web adoption in the US. Factors fall into these three general categories: legalistic, technological, and societal.

Faculty-centered, Peer-reviewed Online Course Development Models for Application within Accredited Institutions of Higher Education, An Overview of (2011)

Linda Mears, communications director, College of Education, University of Oregon

The engagement of faculty in development, course design, and peer review is central to quality online instruction. Thirty refereed case studies of standards-driven online course development in higher education since 2004 are annotated and analyzed for common principles, procedures, or recommended practices. Discussion explores strategic planning for faculty and online administrators, including four phases of implementation, faculty support needs, barriers to engagement, and instructional and technology characteristics faculty must weigh carefully in specific pedagogical designs.

Download the entire Capstone research project

Four Web-Based GIS Software Packages, An Evaluation Of

Ronald S. Salz

Web-based geographic information systems (GIS) software development has grown since its inception in 1996, enabled by the Internet and extending traditional desktop GIS applications. This study evaluates four selected current web-based GIS software products along three key attributes and a defined set of criteria. Results are presented in a summary table and brief discussion. The evaluation is designed to assist GIS managers responsible for selecting web-based GIS for implementation in their organizations.


Generally Accepted Recordkeeping Principles® (GARP®) to Identify Practices for Efficient and Compliant Electronic Records and Information Management, Employing the (2010)

Jason C. Stearns, CRM, corporate vice president, corporate records manager, New York Life Insurance Company

Information Technology (IT) and Records and Information Management (RIM) professionals must work together to manage the expansion of electronic records and information (ARMA International, 2009e). This study, based on literature published between 2005 and 2010, employs the Generally Accepted Recordkeeping Principles® (GARP®)to identify 23 practices for effective and compliant electronic RIM. Practices, framed in relation to eight GARP® principles, are presented as a comprehensive guide for RIM and IT professionals tasked with recordkeeping responsibilities.

Download the entire Capstone research project

Global Information Infrastructure: An Overview of Conditions that Facilitate Global Electronic Commerce, Components of a (1999)

Elizabeth Higgins

The development of a global information infrastructure may create electronic commerce opportunities in the United States for companies that seek to market their digital products or services to other countries. A selected review of literature published by global infrastructure organizations and individual researchers identifies components of infrastructure development that support a global exchange of digital information. A combined perspective of these conditions provides guidance to U.S. businesses that seek worldwide opportunities in electronic commerce.

Governance of IT Systems, Applications, and Operations in the Cloud, Best Practices for (2016)

Susan Bowman, IT project management consultant

This study presents literature on best practices with respect to governance in the cloud to promote an industry-wide secure cloud environment. Materials provide information on cloud computing and inherent risks associated with moving to the cloud. References pertain to the transfer of knowledge and learning to move to and use cloud-computing services. The successful transfer of IT systems from a traditional IT environment to the cloud depends on a defined governance plan.

Download the entire Capstone research project

Graduate e-learning Environments, Best Practices for Adult Student Engagement in (2016)

Adam Pritt, e-learning technology specialist, Educational Methodology, Policy, and Leadership, University of Oregon

This annotated bibliography examines literature published between 2010 and 2016 that addresses educational best practices for adult learners and how these practices can be combined with online and CMC technologies to influence engagement. It provides information to higher education administrators and instructors of adult learners about: (a) educational practices for adult learners; (b) online and CMC technologies; and (c) developing online and blended environments that create, sustain, or enhance adult learner engagement and learner motivation.

Download the entire Capstone research project


Health Maintenance Organization Financial Performance and Quality Performance in Oregon, A Comparison for

Peter Batten

Members of health maintenance organizations (HMOs) are demanding effective management of HMO finances, clinical quality, and service quality. An understanding of the relationships between financial performance and quality performance may help health plan managers and consumers make better health care decisions. A positive correlation was identified between operating income and Healthcare Effectiveness Data and Information Set (HEDIS) quality performance indicators for five Oregon HMOs during 1995 and 1996. Selected literature supported the design of the study and analysis of the correlation.

High Deductible Health Insurance Plan Consumers, The Essential Role of Information for (2007)

Matthew Van Sickle, provider training and communications consultant, Regence BlueCross BlueShield of Oregon

Key categories of medical information needed by high deductible health insurance plan members are identified in relation to cost and quality of care (Kelley & Attridge, 2006). This type of plan is also called a consumer driven health plan. A report card (Schauffler & Mordavsky, 2000) is developed for use by members to lobby employers, and for employers to use on behalf of their (Robinson, 2004) employees when negotiating with insurers who provide health plans.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

How Expectations of Mobile Device Features Could Impact Desktop Software Design (2012)

Tim Esau, systems analyst, Intel Corporation

Prevalence of mobile computing technologies has led to astounding changes in the way people work; changes don't always harmonize across the mobile/desktop computing continuum. This annotated bibliography reviews popular features of selected mobile devices concerning mobile tasks, mobile technologies, and mobile context in order to examine the impact of user expectations on desktop computing software development. Developers should consider communications, customization, and portability, with the goal to create a unified experience across interfaces.

Download the entire Capstone research project

How Internet Access Affects Minority Students in Secondary Public Schools (2005)

Erica Banks, technical analyst

This paper examines Internet access as a factor to the limited numbers of qualified minorities, African Americans and Hispanic Americans, eligible for employment in corporations throughout the United States (Bennett, 2005). Selected literature published between 1995 to 2005 is analyzed to examine access and success rates in schools. Content analysis results in textual and graphical displays designed for diversity coordinators, working in corporations, who want to incorporate a diverse pool of employees in the workplace.

Download the entire Capstone research project

How the Use of Interorganizational Systems by Participants of a Retail Supply Chain Supports Competitive Advantage (2010)

Eric Reese, global messaging, ModusLink Global Solutions

This review examines how interorganizational systems (IOS) are used to provide a competitive advantage to both individual firms and the supply chain as an aggregate. Selected literature published between 2002 and 2009 is analyzed to provide IT managers an understanding of how IOSs are being used in support of competitive advantage. Focus is on the evolution of IOS, from electronic data interchange (EDI) and electronic markets (EMs), to extensible markup language (XML).

How to Modify Technology and Business Practices within the Mid-sized Service Organization as a Way to Mitigate the Carbon Footprint (2011)

Ryan Hogan, Sedgwick CMS, Inc.

The purpose of this study is to identify a set of selected modifications that can be made in relation to both technology and business in a mid-sized service organization, as a way to mitigate the size of an organization's carbon footprint. Literature published from 2000 to 2011 is examined to identify carbon footprint reduction activities and related practices that are deemed socially responsible that, when implemented, can strengthen the triple bottom line sustainability business model.

Download the entire Capstone research project

Hybrid Cloud Architecture Best Practices with a Focus on Data Center Optimization and Orchestration Gap Avoidance, Identification of (2015)

Jake Agard, project manager, Intel Corporation

This annotated bibliography provides a source of scholarly references that highlight hybrid cloud solutions developed within the past decade to reflect the most recent changes in technology. Current challenges in designing hybrid cloud solutions are to optimize the data center and avoid orchestration gaps. The target audience members for the study are marketing groups within the enterprise who market hybrid cloud solutions.

Hypertext Interface for Use with the Product CSDB (Corporate Subject Database), Development of a (1995)

Karen Campbell

This project explores the problem of building a hypertext interface to an existing relational database. It includes a review of methodologies and tools, designing a conceptual model, constructing a prototype, and consideration of future directions.

Hypertext in Web Pages: Recommendations for Managers Who Oversee Website Development, Issues Surrounding Usability Factors of (2001)

John Barrow

When corporate website style guides do not address usability issues, web managers and designers risk losing potential customers because of inadequate website design. Web navigation and hypertext design are particularly important usability issues to be addressed. A review of five selected usability studies published between 1989 to 2001 reveals nine issues related to the usage and development of hypertext. Recommendations include to: avoid secondary browser windows, group information clearly, and provide complete cross-referenced links.


Identifying and Mitigating Bias in Machine Learning Applications (2019)

Laura Bald, admissions and systems manager, Portland State University

This study addresses the existence of bias in machine learning applications and examines techniques for identifying and mitigating bias using scholarly literature published between 2012 and 2019. The intended audience is machine learning engineers, system analysts, and data analysts of any industry. This study is significant because there may be considerable ethical implications caused by machine learning bias; identifying and mitigating these biases is key to the development and deployment of effective machine learning algorithms.

Download the entire Capstone research project.

Impact of Marketing Databases on the Right to Privacy Under the Fourth Amendment, A Study of the

Carol Squire

The right to privacy guaranteed under the Fourth Amendment is being impacted by the use of electronic databases to market products and services. Using literature review and informal interview, this study analyzed how the use of marketing databases has affected the individual’s right to be left alone and the right to control personal information. Results are presented as a list of issues concerning the right to privacy for consideration by users and managers of electronic databases.

Implementation of a Cross-Functional Work Team as the First Step in the Application of Concepts and Methodologies of Business Process Re-engineering in an Information Systems Organization, Examination of the (1995)

Erick Keating

Business Process Re-engineering has been touted as a strategy that can result in large scale gains in efficiency and productivity. This study examines the implementation of a cross-functional work team in order to compare the actual experience with current work team literature, and to examine the question: Do cross-functional work teams outperform more traditional work groups?

Implementing Agile Methodology: Challenges and Best Practices

Jeffrey Verret

Information Technology (IT) projects have a reputation of not delivering business requirements. Historical challenges like meeting cost, quality, and timeline targets remain despite the extensive experience most organizations have managing projects of all sizes. The profession continues to have high profile failures that make headlines, such as the recent initiative. This research provides literary sources on agile methodology that can be used to help improve project processes and outcomes.

Download the entire Capstone research project.

Implementing Earned Value Management on Agile Projects

Kyle Manship

This study addresses the problem of implementing and integrating earned value methodologies on Agile projects. The intended audience is program and technical managers and team members on projects that lead functional groups. In a broader sense, the audience is key project stakeholders. This study is significant because Agile has rapidly emerged, yet traditional earned value methods are still in place in many industries and organizations. This study addresses the compatibility between the two methods.

Download the entire Capstone research project.

Implementing Network Access Control (NAC) Solutions for Small and Medium Sized Businesses (SMBs), Factors for Consideration when (2010)

Oscar Hicks, information technology services director, Clackamas Fire District #1

Implementing network access controls (NAC) requires an awareness of various factors pertaining to information authentication, security, and access. Selected literature published between 1990 and 2009 is examined, based on three factors for consideration: assessment, scope of implementation, and costs. The outcome presents guidelines for small and medium sized businesses in the areas of governance, stratagem, and budgetary impacts. Selected annotated references are provided to emphasize best practices and security framework models currently in use.

Download the entire Capstone research project

Implementing SMART Boards in the Classroom: Creating Faculty Buy-in Through Change Management (2017)

Edis Worden, educational technologist, Oregon Institute of Technology

This annotated bibliography addresses implementation of Smartboards in the classroom, how the Smartboard affects faculty pedagogy and how change management can ease the implementation of this educational technology in a higher education institution. The sources selected for this study contains information on understanding faculty resistance to or reluctance use new technology in the classroom and introduces Roger’s Diffusion Theory and Technology Acceptance Model (TAM) frameworks that can be used in the change management process when implementing these technologies.

Download the entire Capstone research project

Improving Asset Visibility: Fundamental Practices for Implementing RFID Technologies (2007)

David Dederick, senior systems consultant, Motorola, Inc.

Radio Frequency Identification (RFID) has the potential to enhance tracking and identification activities across business processes (Finkenzeller, 2003). This study examines the potential for improved asset visibility in three RFID technologies: (a) low frequency (LF); (b) high frequency (HF); and (c) ultra-high frequency (UHF). Outcomes, presented in summary tables, highlight factors that influence choices information managers must make to incorporate these technologies in medium to large organizations, with emphasis on pros, cons, and costs.

Download the entire Capstone research project

Improving the Data Warehouse with Selected Data Quality Techniques: Metadata Management, Data Cleansing, and Information Stewardship (2005)

Brian Evans, IT business systems analyst, Mentor Graphics Corporation

The corporate data warehouse provides strategic information to support decision-making (Kimball, et al., 1998). High quality data may be the most important factor for data warehouse success (Loshin, 2003). This study examines three data management techniques that improve data quality: metadata management, data cleansing, and information stewardship. Content analysis of 14 references, published between 1992 and 2004, results in lists of themes, synonyms, and definitions for each technique, designed for data warehouse analysts and developers.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Improving Information Findability within an ECM System to Increase Knowledge Worker Efficiency and Effectiveness (2014)

Tony Harper, level I/SUBSAFE program manager, United States Navy

The purpose of this annotated bibliography is to discuss ways in which an enterprise content management system in general, and findability in particular, may help knowledge workers be more efficient and effective in the execution of their duties.

Download the entire Capstone research project

Improving Maritime Electronic Navigation Systems to Improve Collision Avoidance (2019)

George Perez, Captain, United States Navy

Collisions at sea continue to be one of the most serious challenges facing the maritime industry, despite advances in marine electronic navigation systems. These electronic navigation systems can be improved with better collision avoidance algorithms to reduce marine accidents. This study reviews research in collision avoidance, mariner decision-making and electronic navigation systems since 2006. Military and commercial navigation system design and procurement personnel can benefit from this study to improve vessel safety and reduce losses.

Download the entire Capstone research project

Incorporating Collaborative Technologies Into the Pedagogy of Instructor-Led Training (2015)

Julie Rhodes, senior trainer/system application analyst, Oregon Health and Science University

This annotated bibliography examines literature published between 2008 and 2014 as they address collaborative technologies and how these technologies may be combined with formal learning approaches to maximize learning outcomes. It provides information to corporate trainers and instructors of adult professionals about: (a) collaborative technologies, (b) formal learning and informal learning, and (c) learner satisfaction, learner motivation, and the transfer of learning.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Increasing Generation Z Enrollment in Four-year Universities (2019)

Natasha Roman, assistant athletic director for business operations, Western Oregon University

This annotated bibliography addresses the decline in enrollment and increase in cost at four-year institutions over recent years. The issue of declining enrollment is compounded by the introduction of a new generation to college campuses, Generation Z. The references presented address the use of academic analytics to identify factors that may encourage the enrollment of Generation Z students at four-year institutions. This work is intended for higher education administrators and trustee boards of four-year institutions.

Download the entire Capstone research project

Information and Communication Technologies to Improve Food Security Management: The Case in Oregon, Examining the Role of (2012)

Amy R. Cissell, grants and contracts administrator, Oregon Health & Science University

This annotated bibliography describes information and communication technologies in use around the world that can be applied to the growing food insecurity problems in Oregon. Articles written since 2000 are reviewed to identify technologies that can be implemented to positively affect food security and to support policy recommendations. Topics include ICT infrastructure, GIS mapping, and agricultural information and knowledge management. Tools include information and knowledge networks, accessible databases, community food assessments, and food traceability systems.

Download the entire Capstone research project

Information and Technology Managers as Influential Change Implementation Agents: An Organizational Culture Perspective (2004)

Tye Trimpey, Information Technology Department, Josephine County, Oregon

This study examines change implementations and opportunities for information and technology managers to influence organizational culture as part of the change process. Four cultural traits offered by Denison and Mishra (1995) (involvement, consistency, adaptability and mission) are aligned with four change concepts (IT change implementation, strategic change management, impact of change, and organizational learning). Selected literature (1980–2004) is analyzed to produce a reference for use by managers when planning and implementing technological changes.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Information Architecture and the Role of Findability in Two Museum Websites (2002)

Demetra Gilmore Arnett

Findability, a vital attribute of information architecture (IA) was analyzed in two museum websites: the American Museum of Natural History and the Museum of Modern Art. A literature review from 1990 to the present generated an a priori list of findability elements including sitemaps, navigation, and other browsing and searching aides. Conclusions state that the wayfinding experience is vital to the success of virtual museums. Outcomes include a list of specific ways to increase findability.

Information Management on the Internet: A Study of Recent Advancements in Search Technologies (1999)

Dale LaFountain

Locating relevant electronic information on the web has been complicated by the rapid growth of online resources. Providing better interfaces to locate relevant documents has become more important than returning the greatest number of matches. A review of selected literature from January 1997 through March 1999 identifies changes made by eight companies to improve query results. Conclusions are presented as recommendations and instructions to improve search engine selection, query construction, and results refinement.

Information Quality Dimensions for Assurance in the Pre-Processing Stage of Data Storage for Business Intelligence, Identifying and Prioritizing (2011)

Hope Angel, information systems manager, Pacific Star Corporation

As business intelligence systems increase the amount of information stored in data warehouses, quality of content becomes more critical (Fisher, Lauria, Chengalur-Smith, & Wang, 2008). Selected literature published between 2001 and 2011 is analyzed to define key dimensions of information quality for consideration at the pre-processing stage, before data reach the warehouse, to ensure maximum quality assurance. The goal is to provide a framework to prioritize dimensions that align with business intelligence goals and objectives.

Download the entire Capstone research project

Information Requirements in Relationship to Outsourcing PWB Assembly Manufacturing, A Study of

Charles Gault

This study provides identification of information used in the design, manufacture and potential outsourcing of printed wiring board (PWB) assemblies. A literature review presents the analysis of over 200 selected references and publications from 1991–1999. A prototype questionnaire was designed for use by professionals working in Original Equipment Manufacturer (OEM) and Electronic Manufacturing Service (EMS) companies who may need to outsource this work and identify only the specific manufacturing information required for success.

Information Security Culture: Fusion of Professional and Personal Lives (2015)

Dennis Copas, network administrator, OnPoint Community Credit Union

This annotated bibliography explores the core values organizations must possess in order to implement information security cultures that incorporate information security awareness and develop information security behaviors while maximizing productivity and reducing the number of security incidents caused by end users. The bibliography is based on literature published from 2005 to 2015. Conclusions drawn from the literature describe the different corporate culture frameworks and training methodologies needed to cultivate an information security culture.

Information Security Management Strategy, Critical Elements of an (2008)

Gary R. Lomprey

Not only is information security strategy crucial to protect information systems, but it is central to organization survival. Harris (2006) believes security strategy should be customized because each organization is unique. Literature published from 2000 to 2008 examines information systems in the context of information security. Conclusions provide discussion of six key security policy components selected from ISO-27002 (2005), spanning definitions, objectives, management goals, controls, risk assessment, policies and standards, compliance requirements, and supporting references.

Download the entire Capstone research project

Information Security Metrics Program Plan, Key Components of an (2009)

Scott E. Schimkowitsch, senior security specialist, Harland Financial Solutions

An information security metrics program can provide organizations with a resource to manage, monitor, control, or improve aspects of an information security program. A set of five key components necessary to include when developing a plan for an information security metrics program is presented. Components are framed in relation to criteria from Chew, et al. (2008), and include associated tasks designed to a) increase accountability, b) improve information security effectiveness, and c) demonstrate compliance.

Download the entire Capstone research project

Information Security Policies and Governance to Safeguard Protected Health Information (2011)

Christi Noyes, business analyst, University of Arizona

Healthcare organizations must comply with the Health Insurance Portability and Accountability Act of 1996 and develop information security policies that ensure the confidentiality, integrity, and accessibility of sensitive information; however, guidelines are vague. This bibliography identifies policies and describes information security governance strategies designed to ensure compliance. Organizations must create a leadership committee to (a) assess current policies, (b) oversee policy enforcement, (c) note the effects of internal and external influences, and (d) maintain currency.

Download the entire Capstone research project

Information Sharing Strategies that Successfully Expand the Knowledge Base Within a Small Non-Profit Organization and Increase the Potential to Deconstruct Project Silos (2009)

Alesha Fox, lead program specialist, Educational Policy and Improvement Center

This literature review examines information sharing systems for use in a project-oriented non-profit organization to expand the organizational knowledge base, resulting in the potential to deconstruct project silos. Companies that work in a fast-paced project environment run the risk of creating project silos (Curran, 2002), which segregate employees by task and prevent them from understanding the larger scope of the project (Mohrman, 1999). Systems examined include group decision support strategies, databases, and computer based technologies.

Download the entire Capstone research project

Information Systems, Management of Data Quality in (2014)

Bill Worth, engineer in charge, Applied Materials Field Operations

The purpose of this annotated bibliography is to address how to improve management of data quality within information systems in relation to four categories: accuracy, consistency, currency, and completeness.

Download the entire Capstone research project

Information Technology Governance for Consideration by Boards of Directors, Five Domains of (2006)

Matthew Fletcher, information management project manager, NW Natural

This study provides boards of directors of publicly traded companies with checklists for assessing the practice and structure of their boards in the area of IT governance. IT governance is an integral part of overall enterprise governance (ITGA, 2003) and as such, is the responsibility of boards and executive managers. Five IT governance domains are examined, including IT Strategic Alignment, IT Value Delivery, IT Resource Management, IT Risk Management, and IT Performance Management

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Information Technology Solutions to Expand and Sustain Community Oriented Policing (2013)

Corey Brant, education consultant, IBM Industry Solutions

This annotated bibliography examines how law enforcement agencies are deploying technology solutions to expand and sustain community oriented policing. Articles published between 2000 and 2012 are reviewed to identify technologies that can be implemented to positively affect the ability to build community partnerships and solve community problems. Topics include law enforcement staffing trends, community oriented policing practices, and law enforcement technology solutions. The most effective solutions include social media, crime analytic software, and information sharing.

Information Technology Strategies to Prepare for Implementation of Multi-Function Devices in a Large Office Environment, A Study of

Dave Ryan

Digital technology has transformed traditional copiers and printers into a new class of office products referred to as Multi-Function Devices (MFDs) which combine the features of copiers, printers and facsimile machines into a single, networked device. An exploratory review and content analysis of selected literature published between 1995 and 2001, along with an analytical review of a survey of IT professionals, identifies common approaches and strategies to prepare for implementation of this new technology.

Information Visualization: Concepts and Techniques Enabling Exploration, Discovery, and Insight within Large Data Sets (Big Data) (2013)

Brian T. Fabrizio, knowledge base analyst, Givaudan

This annotated bibliography examines information visualization concepts and techniques supporting exploration, discovery, and crystallization of new knowledge based on visual recognition of hidden patterns and structures in big data (Offenhuber, 2010), and effectiveness evaluation methodologies within specific domains. Literature published between 2000–2012 suggests considerations for software development teams tasked with creating information visualization solutions. Results include a taxonomy of terms and concepts, a concept map, and over a dozen images demonstrating visualization techniques.

Installed Information Systems in Automated Manufacturing Environments, Exploitation of (1998)

Steve Knipple

This paper discusses the potential for exploitation of installed information systems in automated manufacturing environments. The paper presents and demonstrates a model to help business managers and technology users exploit existing information systems. A literature review discussing the concepts of business strategy, information strategy, modern application design, and project management provides a basis for the model’s development and usage.

Integrating Selected Web 2.0 Tools into the High School Curriculum to Enhance Student Engagement and Promote Learning Among the Millennial Generation (2012)

Asthika Welikala, director of technology, Douglas Education Service District

This annotated bibliography explores the unique learning style of the millennial generation and examines how web 2.0 tools can be used by high school teachers to enhance student engagement. The bibliography is based on literature published from 1996 to 2012. Conclusions describe examples of using video sharing websites and social networking technologies in the classroom as well as some of the challenges that an educator might face when incorporating these tools into the curriculum.

Download the entire Capstone research project

Integrating Speech Recognition into the Human Computer Interface: A Review of Research from Selected Companies, Universities and Special Interest Groups, Guidelines for (1998)

Jack Baker

The human-computer interface must include speech to make computers more usable by the general population. Only specialized applications could use speech in the past. Advances in technology have made it possible to integrate speech into generalized applications. Currently, only a few researchers and experts are building applications that incorporate speech. This research focuses on design guidelines for developers to use when building speech interfaces.

Integrating Systems Planning with Overall Corporate Plans and Goals: A Case Study (1995)

Ann McElligott

This project is a case study of a multi-divisional corporation's situation as it relates to systems planning. The study examined the integration of systems planning with overall corporate plans and goals.

Intellectual Property Policy: Risk Identification and Protection in the Global Market (2010)

TracieLyn Rydzewski, information manager, Intel Corporation

Organizations that conduct business in the global market expose themselves to potential information risk, including intellectual property (IP) theft, exposure, and breach of laws and regulations (Corbin, 2002). Key elements of this study examine IP risk management and identification practices, IP protection, and the value of building a security awareness IP culture. The creation of an IP policy should evolve to accommodate the shifting economic environment and the organization’s business goals, culture, and operating environments.

Download the entire Capstone research project

Intelligent Tutoring Systems: A Definition and Selected Examples (2013)

Bart Sumner, operations manager, Bookworm Tutoring

Intelligent tutoring systems are altering conventional approaches to tutoring and student learning models. This annotated bibliography presents literature published from 1992 to 2013 on intelligent tutoring systems (ITS), their current definition and selected examples. Special attention is given to the theoretical principles of intelligent tutoring systems, technology-based ITS products, and examples of ITS tools that have demonstrated success in a virtual school environment. Components of an ITS are also examined and identified.

Internet-Based Collaboration: Using an Application Service Provider to Facilitate Project Coordination between Utilities and State DOTs (2005)

Ron Howard, senior application architect, NW Natural

The lack of adequate communication and coordination with utility companies are measurable contributors to cost overruns on highway construction projects (U.S. DOT, 2002). This study examines the viability of an Internet based application service provider (ASP) (Chen, Frolick & Soliman, 2000) as a tool to alleviate communication and coordination obstacles. Selected literature published between 1999 and 2004 is analyzed. The analysis is framed by Bruck's (2000) methods of online collaboration.

Internet-based Hate, Bias, and Terror Crimes, Investigative Strategies for (2004)

Rick Putnam, detective sergeant, Investigative Services Bureau, Springfield Oregon Police Department

This study examines the investigative strategies law enforcement professionals are implementing to meet the challenges of Internet-based hate, bias, and terror crimes. Internet-based strategies are compared to conventional hate, bias, and terror investigative strategies already in use by law enforcement. The result is the design of a comprehensive guide for law enforcement personnel to use when investigating such crimes, including specific key questions to ask, decisions to make, and procedures for seizure of electronic evidence.

Intranet Implementation: The Application of Diffusion Drivers and Interventions in the Public Sector Environment (2002)

Aaron Karjala

This literature review of public sector resistance to innovation and Intranet implementations describes potential actions managers can take to ensure Intranets are fully adopted in a government organization. Using sequential coding, selected literature is analyzed within pre-existing categories derived from King (1994): knowledge building, knowledge deployment, subsidy, standards setting, mobilization, and innovation directive. The result is a list of diffusion drivers managers can use to gain organizational acceptance of Intranet implementation in public sector organizations.

Intrusion Detection Systems: A Study of Network- and Host-Based Systems, Two Approaches to (2002)

John R. McKean II

Computer information systems and information assets are under attack. Benefits derived from interconnected networks are often offset by the dangers inherent in these connections. Host-based and network-based intrusion detection systems (IDS) provide means of protecting interconnected computer systems. Through literature review and analysis, this paper outlines benefits and limitations of IDS and provides a checklist that can be used by information systems managers to both understand IDS protection and as a guideline for deploying IDS.

IT Offshore Outsourcing: Best Practices for U.S.-Based Companies (2019)

Damian Murberg, senior IT support specialist, Fiserv, Inc.

Outsourcing IT services from onshore to offshore allows an organization to access skilled labor while reducing development and testing times and expenditures (Trickett, 2003). As the trend of outsourcing IT services to offshore locations continues (Storti, 2015), organizations must understand how to mitigate the associated risks. This study examines the best practices and tools U.S. companies can utilize to overcome the challenges associated with offshore outsourcing, including cultural differences, language barriers, distance, and time differences.

Download the entire Capstone research project

IT Outsourcing in US Hospitals: Potential Benefits and Risks (2004)

Trevor Jacobson, systems analyst, Decision Support Department, Southwest Washington Medical Center

Faced with complex information system needs and narrow profit margins, large US hospitals are outsourcing IT support as a solution. This study examines current trends in IT outsourcing in US hospitals as reported in trade journals and vendor white papers. Research on IT outsourcing in other industries from (1990 to 2004) is examined to provide a comparative context. Potential benefits and risks are presented to help hospital executives make better-informed decisions regarding IT outsourcing.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.


Joint Ventures between US-based Companies and the People's Republic of China: A Review of Cultural Differences, Establishing (2003)

Gregory Houfek

While the People's Republic of China (PRC) presents a valuable opportunity for US-based companies to tap a skilled workforce and large consumer market, the national cultures of the two countries are substantially different. This study uses Hoftstede's (1980) four cultural dimensions to examine cultural differences between the PRC and the US as reported in selected literature and the impact differences may have on management and labor practices in joint ventures between US-based and PRC-based companies.

Just-In-Time Training Through the Use of Current Cognitive Approaches and Delivery Mechanisms Utilizing the World Wide Web (2006)

James K. Robbins

Recent studies conclude that American workers are losing their competitive edge, in part due to inadequate training. Problem solving and communications skills are particularly lacking. Training journals frequently discuss just-in-time training, however little has been accomplished toward realization of this concept. The bandwidth constraints of the Internet require a careful balancing of media in order to provide the learner with a rich and rewarding experience. This project demonstrates sophisticated instructional methods using the World Wide Web to provide effective training when and where needed.


Key Components of Business Intelligence Systems and Their Role in Managerial Decision Making, Identifying (2011)

John Lloyd, senior physical design engineer, Intel Corporation

Business intelligence systems by definition are used to create knowledge to enable business decision-making (Olszak & Ziemba, 2006). This study examines literature published between 2001 to 2010 and identifies the four most common components of a business intelligence system: ETL tools, data warehouses, OLAP techniques, and data-mining. Functions that each component performs are detailed. How each component is used to facilitate managerial decision-making at three levels of organizational management (operational, tactical, and strategic) is described.

Download the entire Capstone research project

Key Issues to Consider when Implementing Monetary Team Incentives to Motivate a Virtual Project Team, A Study of Selected

Leo Cuellar

Compensating teams often proves challenging to employers, particularly related to virtual teams. Using content analysis, this study examines the issues, as defined by Fredric Crandall and Marc Wallace (1998), and Steven Gross (1995), that arise when implementing monetary team incentives. The purpose of this study is to provide managers with a description of issues to increase their chances of implementing monetary team incentives in order to ultimately contribute to the overall performance of organizations.

Knowledge as a Strategic Asset: Aligning Knowledge Management Practices in Support of Strategic Management Processes and Goals (2004)

Ben Pacewic, manager, data analysis and reporting, PacificCare Health Systems

Knowledge is a valuable driver of business strategy (Zack, 1999b). Establishing the link between knowledge and strategy is essential for competitive advantage (Von Krogh, Ichijo, & Nonaka, 2000). A content analysis (Palmquist, 2001) of selected literature in the areas of knowledge management (published 1996–2004) and strategy (published 1986–2004) provides the foundation for development of the connection. The outcome of this study is a table for evaluating several methods of linking knowledge and strategy.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Knowledge as Defense: An Exploratory Study of Knowledge Management Concepts in Two Pieces of U.S. Government Counterterrorism Legislation (2003)

Brian Hull

The USA PATRIOT Act (2001) and the Homeland Security Act (2002) are analyzed to demonstrate instances of four knowledge management concepts, defined by Campbell & Pellisier (2000). Concepts include innovation, responsiveness, productivity, and competency. Results reveal a primary focus on innovation, the ability of an organization to support new ideas in collaborative and virtual environments. Conclusions suggest that software vendors and developers should focus on prominent attributes in creating government counterterrorism knowledge management technologies.

Knowledge Management Best Practices (2016)

Joshua Croteau, maintenance control officer, United States Army

This paper explores best practices in knowledge management for soldiers, organizational leaders and human resources' professionals. Literature published after 2000 is reviewed for knowledge management best practices, tools and governance. Conclusions are presented to guide decision-making regarding knowledge management program implementation, development, and maintenance.

Download the entire Capstone research project

Knowledge Management Best Practices (2016)

Nathan Haskett, application support team lead, Fiserv

This literature review focuses on resources that address failure within business knowledge management programs. The literature will help to establish best practices that may be leveraged by organizations attempting to successfully implement new knowledge management programs or analyze or review their existing solutions. A total of 16 resources are reviewed and have been divided into three knowledge management categories: (a) background, (b) challenges or problems, and (c) solutions within knowledge management.

Download the entire Capstone research project

Knowledge Management Practices: Creating Effective and Efficient Processes in Globally Distributed Teams (2016)

Jeremiah J. Kero, Analyst III, Production Support, GCI, Inc.

This literature review focuses on the creation of effective and efficient knowledge management processes for teams distributed across the globe. The literature illustrates the importance of knowledge management to organizations, while providing key tools and ideas that can be applied in organizations with distributed teams to drive efficiencies. Fifteen sources are reviewed and divided into three categories: (a) knowledge management background, (b) creating efficient knowledge management processes, and (c) knowledge management in distributed teams.

Knowledge Management System in Small and Medium Enterprises, Best Practices for the Implementation of a (2016)

Dennis Aiken, IT/marketing administrator, WHA Insurance

This literature review focuses on the best practices for implementing a knowledge management system in a small- to medium-sized enterprise. The literature helps to illustrate common challenges businesses face when implementing a knowledge management system. Fifteen sources are reviewed and divided into three main categories: (a) challenges in implementing knowledge management systems, (b) best practices and key success factors in implementing knowledge management systems, and (c) knowledge management in small and medium sized organizations.

Download the entire Capstone research project

Knowledge Management Within the Naval Aviation Enterprise, Best Practices for (2016)

Gabriel V. Edwards, Lieutenant Commander, United States Navy

Absent a viable knowledge management strategy, organizational effectiveness declines, including within Aviation squadrons of the United States Navy. The recent declines in retention of aviation officers and the short career cycles of the squadron pilots have helped to erode the body of knowledge that should be alive within each unit. Grounded by the information industry’s best practices and Navy doctrine, this research organizes and prioritizes the assets and functions of knowledge management strategies.

Knowledge Transfer Methods: Identifying "Best Practice" Methods for use in a Manufacturing Environment, A Study of

Ryan Northam

Knowledge management and knowledge transfer methods are significant in fulfilling key strategic business goals for high-tech manufacturing corporations as ways to maximize advantage in their marketplace. A literature review and comparative analysis was conducted to define "best practice" of knowledge transfer methods. Results were categorized by type of knowledge transfer method, including Serial, Near, Far, Strategic and Expert. Using this categorization scheme, managers can better select a knowledge transfer method for a given situation.


Lack of Access to the Information Superhighway: What Questions Must be Asked to Determine the Impact? (1995)

Norm Trost

The Internet and the World Wide Web appear to be the on-ramp to the information superhighway. What will be the impact on American society and on the world community of leaving some of our members behind? This project develops a series of questions which, once answered will provide the beginnings of an answer to this question.

Large-Scale Software Acquisition Projects in the Public Sector, A Process Model for

Bonnie Lindberg

Public agencies face increasing complexity and expense in purchasing software systems to manage business and service delivery functions. This project develops a process model to guide agencies through a successful acquisition process. The model is based on current thinking in both the private and public arena, and incorporates the experiences of a selected group of public managers. Centered around the agency's overall business and information technology strategies, the ten-step model describes a path which begins with resource allocation and project planning, filters through the available options, and concludes with planning for the next acquisition cycle.

Leading Small and Medium-Sized Enterprise (SME) IT with Agility

Bjørn Bulthuis

Aligning IT strategy with organizational strategy is a key contributor to success. IT governance has historically been used to maintain this alignment. More recently, agile methods have been used to remain competitive in rapidly changing environments. By reviewing literature from the past decade, this annotated bibliography seeks to apply the established IT governance frameworks to small and medium-sized enterprises (SMEs) pursuing agility and provide direction for IT leaders attempting to integrate these ideas.

Download the entire Capstone research project.

Learning Analytics to Predict Academic Outcomes of First-year Students in Higher Education, Using (2016)

Pete Sander, manager, Information Services, Oregon State University

This annotated bibliography explores scholarly literature published between 2010 and 2016 that addresses the analysis of student-generated data, called learning analytics (Fiaidhi, 2014), with the intention of providing early intervention to promote better academic outcomes. It provides information to higher-education instructors and administrators who are interested in learning about (a) reducing attrition of first year students, (b) when the application of learning analytics produces the best results, and (c) predicting academic outcomes using learning analytics.

Download the entire Capstone research project

Learning by Design: Cognitive and Emotional Factors Influencing Informal Learning Experiences in Interactive Environments

Nicole Leaper, senior communication designer, Bullseye Gallery/Bullseye Glass Co. (2011)

This study synthesizes current literature in educational and design psychology, information design, human-computer interaction, and museum studies to identify cognitive and emotional factors that influence learning. The purpose is to produce a set of cognitive and emotional factors that museum educators, exhibit designers, information designers, and interaction designers should consider when designing informal learning experiences in interactive environments. Nine identified factor groups include affect, cognition, context, engagement, experiential learning, interactivity, narrative, self concepts, and usability.

Download the entire Capstone research project

Leveraging Information Technologies to Streamline Materials Procurement Processes in a Personal Computer Manufacturing Firm (1995)

David Galbraith

In response to increased competition many firms are streamlining their organizations in an attempt to eliminate excess and cut operating costs. This project documents the results of the Supplier Activated Materials (SAM) pilot program designed to streamline the raw materials procurement process.

Local Government Business Intelligence Implementations, Best Practices for (2016)

Gary Mix

The report develops best practices to guide local governments in implementing business intelligence (BI) systems. Fifteen academic sources were reviewed and categorized as: challenges in BI implementations, best practices in BI implementations, and lessons learned from local government IT projects. The sources examine BI from the private and public sector. There are limited sources specific to local government; therefore, best practices were developed from all sources. The best practices are intended for local government leaders, managers, and project leads implementing BI.

Download the entire Capstone research project

Lowering the Carbon Emissions Footprint of Enterprise Data Centers Through Energy Efficiency Gains (2010)

Cecilia Tomory, principle data base administrator, PacifiCorp

Selected literature published between 2004 and 2009 is mined for emerging trends and best practices regarding green IT and data centers. Environmental issues are becoming a serious industry concern, spurred by local and global initiatives (Kumar, 2009). Steps are identified for enterprise data center managers, in order to measure, manage, and improve power consumption efficiency within their facility. Data center energy efficiency gains save power, lower energy costs, and decrease overall corporate carbon footprint (Freeman, 2009).

Download the entire Capstone research project


Mainframe or Cloud-Based Data Center Environments, Cost Factors that Influence Ownership of (2015)

Nicholas Bingell, systems programmer, State Employees’ Credit Union

This annotated bibliography focuses on organizations considering the move from mainframe data center environments to cloud-based alternatives and the true total cost of ownership of the latter solution. Literature published from 2010 to 2014 is included to help executives clarify evaluations of mainframe versus cloud-based solutions by comparing cost differential and potential advantages and disadvantages of the environments. Ultimately, the intent is to understand whether to stay with existing mainframe architectures or move to cloud-based environments.

Download the entire Capstone research project

Managing Culturally Diverse, Virtual Teams (2019)

Jen Mayer, supply line manager, Intel

The rise in the use of culturally diverse, virtual teams in business has resulted in unique challenges for managers attempting to lead these teams. This study includes a review of sources published within the last ten years. The purpose of the study is to uncover potential challenges that managers who lead culturally diverse, virtual teams may face as well as highlight best practices they can employ and help foster to address the challenges.

Download the entire Capstone research project

Managing Energy Consumption of Office Equipment in Small To Mid-Size Companies for Economic Viability (2008)

Brandon Gatke

This study examines the proposition that sustainable business practices can decrease the use of energy for office equipment and have a positive impact on profitability, productivity, and performance (Hitchock and Willard, 2006). Literature published between 1992 and 2008 are analyzed. Industry terminology is presented, along with recommended sustainable business practices for management of selected equipment. Management systems incorporating sustainable concepts include Smart Management System Automation, data center design techniques and energy efficient office equipment applications.

Download the entire Capstone research project

Managing ISO 9002 Compliance within a Manufacturing Automation Systems Department, A Model for

Ken Bragg

The ISO 9000 series of quality standards and guidelines has become an internationally recognized set of tools for structuring, certifying, and maintaining quality systems. A search of the literature, existing factory quality systems documentation, and interviews with the Automation Systems Department ISO 9002 coordinators in three factories within the company, identified eight elements that needed to be addressed at the automation systems department level. A model presents policies and procedures designed to address these elements.

Marketing Tactics Most Commonly Used by Small Internet-based Retailers to Sell Specialty Products (2006)

Lane Pughe, police officer, Springfield Police Department

The rapidly evolving nature of e-commerce presents Internet retailers (e-tailers) with a myriad of marketing choices, further complicated by a lack of industry-specific guidance (Biswas & Krishnan, 2004). Using content analysis of sources published between 2000 and 2006, this study documents and defines marketing tactics used by e-tailers. Tactics are synthesized into a list of best practices in three areas: consumer purchasing behaviors, e-tailer marketing practices, and traditional marketing practices adapted for e-commerce.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Maximizing Information Systems Resources in a Multi-Project, Cross-Functional Organization (1995)

April Stearns

This project presents a model which describes the current state of integrated project management, and explains the dilemma faced by modern software development organizations: How to assign the "right" technical resources to projects in a rapidly changing technological environment.

Media Tool Selection, Design Analysis of a Prototype Expert System for (1995)

Rahul Ravel

High technology is rapidly producing the type and number of tools necessary for creating software applications. The purpose of this project is to apply object-oriented design principles and expert knowledge towards the analysis and initial design of an expert system for selecting media tools, i.e., printed manuals, hypertext applications, and multimedia applications.

Medical Charting with MedicaLogic's ClinicaLogic Software: A Comparison of Two Physicians Experiences with Electronic Patient Medical Records (1995)

Peter Reverman

The future of medicine will see the extensive computerization of the medical office. The use of electronic patient medical records will be the focal point of high quality health care decision support systems. This project evaluates the results of structured interviews with an internal medicine specialist and an orthopedic surgeon regarding their experience using PC medical record software called MedicaLogic's ClinicaLogic.

Methods for Use by Knowledge Managers Involved in Implementing or Improving Organizational Knowledge Creation Strategies, A Summary of

Beth Barrer

Knowledge management has become a key strategic objective in many of today's organizations. A critical component of that strategy is the creation of organizational knowledge. The knowledge creation model developed by Ikujiro Nonaka and Hirotaka Takeuchi (1995) provides a foundation for identifying appropriate knowledge creation activities. Methods for knowledge creation were derived from selected literature. Methods and resources for organizational knowledge creation are presented for knowledge managers who are developing their organizational knowledge creation strategies.

Microcommerce and Payment Protocols: An Examination of Three Micropayment Systems—Millicent, PayWord, and MicroMint (2000)

Barbara von Gaertner

This study examines three micropayment systems—Millicent, PayWord, and MicroMint, with focus on seven attributes, including security, anonymity, portability, durability, transferability, availability, divisibility, and user-friendliness. (Matonis, 1995) Selected literature from 1995–1999 addresses emerging digital cash technology, payment protocols, and the role of cryptography as support for digital payment schemes. Results are presented as a comparative summary of attributes, to be weighted and matched against individual requirements profiles to ensure optimal alignment to business needs.

Mobile Applications through Context-awareness, Improving the Usability of (2006)

Donald J. Davies

The usability of mobile applications is threatened by limited input/output capabilities and varied access situations (Bertini, et al., 2005). Through context-awareness, applications are programmed to respond to contextual information as an input source (Schmidt, et al., 1999). Based on analysis of literature published between 1998 and 2006, techniques to both interpret and apply contextual input to improve mobile application usability are identified among four primary context types: location, identity, time, and activity.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Mobile Data Devices in a United States Criminal Justice Agency, Operations for Secure Use of

Richard T. Habgood, IT security manager, Orange County Sheriff's Office

USB flash memory devices, mobile smartphones and mobile tablets are in wide use in organizations and personal life. United States criminal justice agencies are developing operations for mobile device adoption. Organizations responsible for the protection of citizens need to maintain confidentiality, integrity, and availability of information whether it is stored, being processed or in transit. This annotated bibliography examines literature published between 2005 and 2012 to identify operations for secure mobile device implementation and use.

Mobile Instructional Design Principles for Adult Learners (2012)

Andrea Dillard, program manager, GP Strategies Corporation

This annotated bibliography explores the need to design effective and efficient mobile learning for adult learners. Mobile approaches, projects, and environments are explored to compile a set of instructional design principles for the mobile learning context. Conclusions present six key principles for use by instructional designers including the need to design: a simple and intuitive interface, interactive multi-media, short and modular lessons, engaging and entertaining activities, contextually relevant and meaningful content, and just-in-time delivery.

Download the entire Capstone research project

Multimedia Curriculum Model, A

Helen Van Phan

Multimedia is exploding into people’s lives at work and at play. Currently there is no comprehensive multimedia curriculum in colleges or universities. The purpose of this project is to develop a multimedia curriculum model, designed to educate students and fulfill industry’s need for multimedia specialists. This curriculum model was developed utilizing information gathered through a review of multimedia literature and curricular research. A survey was conducted among professionals in both academic and professional settings to validate the model.


Navigational Strategies for Interactive Virtual Environments, Designing Effective (1999)

Jon Crowell

Three-dimensional, interactive virtual environments are increasingly employed in advanced computer interface design. While these interfaces are intended to capitalize on users’ abilities to work with three-dimensional objects, navigation techniques are often complex. Using literature review, this study examines research from 1995 to 1999 in the area of navigation. Guidelines are developed to assist interface designers to develop appropriate navigational metaphors within these environments. These guidelines are demonstrated through the development of a prototype three-dimensional interface.

Network-Based Surveys: A New Model for Computerized Self-Administered Questionnaires (1996)

Tom Sedory

Combining e-mail and World Wide Web technologies traditionally, social science researchers have had three main categories of tools available for survey data collection: paper questionnaires, telephone surveys, and personal interviews. While there has been some study on Computer-Assisted DAta Collection (CADAC), it is currently not considered a fourth type. Additionally, very little research has been conducted on network-based surveys (NBS), an emerging form of CADAC which uses a combination of e-mail and the World Wide Web (WWW). This paper presents network-based surveys as a unique tool category for the collection of survey data, one that can stand alongside paper questionnaires, telephone surveys, and personal interviews. A model of NBS is developed depicting its design, delivery, and analytic methods.

Nonprofit Network, Technologies and Practices to Promote Collaboration in a (2016)

Braden Hassett, business administrator, Virginia Film Festival

Nonprofit organizations form networks with other nonprofits and relevant stakeholders that are categorized by regular communication, resource sharing, and aligned goals. Collaborative technologies provide these networks with systems for streamlining work processes, collecting information, and making knowledge more accessible. Collaborative technologies can be further utilized to provide project management and web-communication tools that facilitate collaboration and camaraderie amongst users. This research study notes best practices including knowledge of system features and considerations, implementation techniques, and user engagement.

Download the entire Capstone research project


Object Modeling as a Business Reengineering Tool: A Case Study of the Pacific Northwest Research Station, Using (1996)

Thomas C. Peters

Successful business process re-engineering (BPR) requires that processes be modeled using methodologies sufficiently expressive while simultaneously clear and understandable. Object-oriented modeling, successfully used in software development, is believed to hold great promise for business modeling. This project is designed to examine and illustrate the use of object-oriented modeling as a BPR tool. Recently available, off-the-shelf software is used to model the reengineering of a budget distribution process of the U. S. Department of Agriculture, Forest Service, Pacific Northwest Research Station.

Object-oriented Class Library as a Tool to Reduce Application Development and Maintenance Time, Using an (1998)

Russell D. Campbell

This study is designed for use by application developers and information systems managers. The goal is to increase understanding of the use of an object-oriented (OO) class library as a tool to reduce client-server development and maintenance cost. Review of literature (published 1993–1998) frames background issues. A current project presents a concrete example. Results are presented in the form of four informational elements that highlight advantages of using an OO class library.

Offshoring Tradable Standardized IT Services: Social Factors and Ethical Frameworks

Nali Thanasouk, controller, IT, Vestas America Wind Technology

Globalization of standardized IT services has made offshoring a common practice for multinational corporations. This annotated bibliography presents an analysis of selected literature published from 2004 to 2013. Literature defines offshoring and identifies social factors and ethical frameworks to consider related to offshoring standardized IT services (specifically call center and IT data management activities). When viewed within Rawls' Principles of Justice (in Lamont, 2013), factors include codes of conduct, family connections, and national religious holidays.

Online Channels by Pet Care Small Businesses, Benefits of Successful Adoption of (2017)

John E. Holloway IV

Pet care small businesses risk failure if they do not successfully adopt technologies that can make pet ownership easier and more affordable for their customers. Pet care providers and investors will gain insight into opportunities for technology to make pet ownership easier and more affordable and accessible. The literature reviewed was published between 2012 and 2017. This study is significant because the pet care services industry is rapidly growing, but often lacks the technologies to attract pet owners.

Download the entire Capstone research project

Online Travel Information Services' Impact on Travel Agency Distribution System (1996)

Douglas Pugsley

The merging of two powerful trends—exponential growth in the number of online households and dramatic improvement in the quality and reliability of online travel information—is resulting in drastic changes to the business environment for the travel and tourism industry. Communications technology tools such as e-mail, commercial online service providers, and the Internet are recognized as essential for remaining competitive in this new environment. This project analyzes the response of five representative travel agencies in the Portland, Oregon, metropolitan area to the online information issue. Additionally, an experiment is conducted comparing the process of booking five domestic trips by the traditional travel agency method and by new online travel sources. A review of several major online travel service providers is included. Sources from America OnLine, CompuServe, and the Internet feature Eaasy Sabre, Worldshopper, United Connection, American AAcess, TraveloCity, and major airline websites.

Open Data at a Municipal Government Level, Best Practices in the Implementation of (2017)

Jesse Thomas, Community Development Business Manager, City of Bend

As government open data models are increasingly adopted, many fail to bring efficiency, accountability, and transparency. The intent of this paper is to extract best practices from other research to help local municipalities implement their own open data models. Three best practices were found when implementing open data models, including a need to create policies and manage data, formatting data for multiple purposes, and to engage the public in understanding and fixing gaps in data.

Open Source Project Management: Applying Established Project Management Principles and Practices at the Mozilla Organization (2014)

Jeff Van Horn, programmer analyst, University of Oregon, Information Services

The purpose of this annotated bibliography is to identify established project management principles that can be applied to the unique characteristics and challenges of the open source software (OSS) development environment of Mozilla.

Download the entire Capstone research project

Operational, Performance, and Extensibility Characteristics of SOA, ESB, and Microservices Architectures, Evaluating the (2017)

William D. Kurth

SOA represents a newer software architecture that has spawned even newer technologies such as ESB and Microservices. This annotated bibliography examines the operational characteristics of each of these approaches regarding extensibility, performance, scalability, maintainability, and flexibility. It also considers the costs, both in runtime operations as well as for the development, maintainability, and reuse of each. Conclusions on the relative and absolute merits of each technology can be drawn from the selected literature.

Download the entire Capstone research project

Optimizing Recovery of Critical Systems through Replication to the Cloud (2018)

Barry J. Gillin, system application engineer, Oregon Health & Science University

This annotated bibliography addresses the business requirements for disaster recovery planning in order to avoid the loss of critical data and provide business continuance with a focus on replicating critical data using cloud technology. The references included enable IT managers to make and justify informed decisions prior to implementing a disaster recovery plan. The references related to recovery methods and cloud technology were published between 2010 and 2018.

Download the entire Capstone research project

Organizational Behavior Theory on Trust and the Applicability to Virtual Organizations, A Study of Selected

Wendy Curry

The virtual organization is emerging as the most recent business model. Trust is a critical contributing factor to its success. A review of selected literature from 1985 to 1999 on organizational trust theory identifies factors that foster and maintain trust with traditional organizations. These factors are compared to the business model of virtual organizations. Findings are presented as steps that a virtual organization can take towards achieving and maintaining trust.

Organizational Cultural Factors That Impact Knowledge Sharing, Identification of (2009)

Michael J. Campbell, program manager, Search, Scripps Networks Digital

The purpose of this literature review is to identify organizational cultural factors that impact knowledge sharing. In organizations able to cultivate a knowledge-sharing work environment, employees share ideas as a natural part of the job function, rather than something they are forced to do. The selected literature reveals six key social factors that impact knowledge sharing including trust, autonomy, power politics, care, competence leverage, and collaboration; and two key motivational factors including incentives and motivation.

Organizational Knowledge Creation in the Japanese Multinational Corporation: What U.S. Managers Can Learn from Nonaka (2010)

Timothy J. Duncan, former senior director, business planning and analysis, Fujitsu

This literature review examines the application of Ikujiro Nonaka’s perspective on organizational knowledge creation in the Japanese Multinational Corporation (MNC). Focus is on the SECI model and the concept of ba. Literature published between 1994 and 2009 is synthesized to develop four guidelines for U.S. managers who work in Japanese MNCs, including the need to understand the Japanese view of tacit knowledge conversion and the important role of middle managers in translating top management vision.

Organizational Learning as a Prerequisite to Environmental Sustainability: An Analysis of Attributes at Two Selected Companies (2000)

Audra Ruyle

Environmental sustainability is an emerging management concept. Businesses that have the attributes of learning organizations are more likely to deal successfully with the fundamental changes required to manage in an environmentally-sustainable way. Through a content analysis of selected literature published from 1990–2000, this study develops an annotated list of the most prevalent learning organization attributes at Patagonia and Tom's of Maine, two companies that have adopted environmental sustainability as part of their management strategy.

Outsourcing in Government Agencies: Factors to Consider Related to Information Technology Initiatives

Brandon Gill, senior user technology specialist, City of Phoenix

This annotated bibliography explores positive and negative factors to consider when outsourcing information technology staff and services in a government agency. Topics include types of outsourcing, potential hidden costs and cost control, and monitoring outsourced IT staff. Keys to successful outsourcing initiatives include evaluating in-house staff and services prior to outsourcing, careful creation and management of the outsource contract, building a trusting vendor relationship, and managing customer satisfaction, including expectations and complaints.

Outsourcing Remote Online Network Management: A Review of Transitionary Critical Success Factors (1995)

Farshad Monfared

A migration from internal online network management to external remote online network management demands adjustment on the part of both the computer industry as a whole and individual management teams. This project examines the evolutionary process which has resulted in low cost, high quality remote management of online networks.

Outsourcing within Public Health and Human Services Organizations: Results of a Survey, Selected Benefits and Challenges of (1996)

Karen Hix

Changes in legislation, industry privatization, rapidly changing technology, high demand for technical workers, and the need for flexibility in the workforce have managers of public health and human service organizations looking toward outsourcing as an option for addressing business requirements. A review of existing references from 1994 to 1999 and a survey of managers of public health and human service organizations identify selected benefits and challenges of outsourcing within this industry. Conclusions are presented as recommendations for managers of public health and human service organizations to help guide decisions about outsourcing.


Palette Optimization Through the Use of a Uniform Color Model (1996)

Toma Gosselin

The current trend in software design is toward color-rich user interfaces, including icons, textured backgrounds, and animation. The graphical nature of the Internet both demonstrates and supports this evolution. However, most computers used in business, as well as the majority of home computers, do not support true color capabilities. This project consists of the design and implementation of a software utility that allows for true color imaging on integrated (palette-based) systems. Utilizing a non-traditional approach, this software analyzes the color composition of a source image and generates the optimal palette to display the new image. Rather than using a mathematical algorithm to segment the color space, a uniform color model clusters visually similar colors.

Paperless System for Small and Medium-Sized Businesses (SMBs), Implementing a (2016)

Chad Chao, information technology manager, Townsend Farms, Inc.

Paperless systems offer organizations many benefits including increased employee efficiency, productivity, and information security. However, there are numerous organizations, particularly small and medium-sized businesses (SMBs), which are still operating under a paper-centric environment. For these SMBs, paperless systems could mean streamlining daily workflow while reducing overall costs. This annotated bibliography is comprised of literature published from 2007–2015 to help executives, managers, and users identify the benefits of and best practices in implementing a paperless system.

Download the entire Capstone research project

Patient Portals: An Internet-Based Tool Supporting Patient Information Needs and Providing a Competitive Advantage for Healthcare Organizations (2004)

Eric Schnebly, R.Ph., manager of pharmacy services, Legacy Mount Hood Medical Center

According to O'Connor (2003), patient portals help patients make informed decisions about healthcare, thus improving both patients' and providers' satisfaction with the decision-making process. In this study, literature published between 1996 and 2004 is examined to determine elements of a patient portal and strategies that contribute to competitive advantage in the healthcare industry. A discussion is presented for CIOs and CMIOs to demonstrate the potential role of a patient portal within an IT strategic plan.

Perceived Critical Success Factors and Effective Technology Implementation In K-12 Educational Environments (1996)

Bernadette Trabue Crider

This paper defines effective technology implementation in public and private schools, examines critical success factors (mission-critical activities to ensure success) from the perspective of those charged with implementing technology, and examines the degree school systems direct resources toward factors they rated critical. Recommendations for how school systems and implementors should focus their efforts are made based on factor rankings, current inclusion in the process, and the research findings of other authors.

Perceptions and Use of Networking Certifications for Information Systems Managers, An Exploration of the

William Behnke

This project evaluates the significance of vendor-sponsored computer networking technical certifications to information systems (IS) managers. It seeks to determine if certifications are perceived by IS managers as indicators of the holder's technical competence and professionalism and if certifications are being used by management in employment, compensation, and promotion decisions.

Prerequisites for Successful ERP Implementation from the Project Management Perspective, A Study of

John Lian

Difficulties with implementation of Enterprise Resource Planning (ERP) software are widely documented. A review of selected literature published between January 1995 and May 2001 identifies 15 prerequisite elements that can facilitate successful ERP implementation. These elements are related to specific project management problem areas, using grounded theory coding analysis and constant comparison. Results of the analysis are presented for project mangers as a list of recommendations related to project scope, quality, time, cost, and expectations.

The author of this study is a corecipient of the 2001 AIM Director's Capstone Award.

Planning an Electronic Health Record (EHR) System Implementation: Global Lessons for South Africa, Factors to Consider when (2012)

Fatima Hendricks, practice manager, Orthohealth Center for Orthopedics & Rehabilitation

This annotated bibliography examines 30 references to develop factors for consideration when implementing electronic health records (EHR) in South Africa. Factors are derived from experiences in developed and developing countries, including case reports from Brazil, Russia, China, and India (BRIC). Sixteen contextual factors include clustering/collaboration, infrastructure/systems, trained/experienced staff, and open standards/software. Twenty-four positive experience factors include user participation and change management. Twenty-eight negative experience factors include inadequate support for resources (human, technical, financial, and training).

Download the entire Capstone research project

Planning e-Government Projects for Developing Countries: A Checklist of Accountability and Transparency Success Factors (2006)

Sonia Rees, repository/tools analyst, RBTT Bank Ltd.

Governments of developing countries attempt to provide a better quality of life to citizens through information and communication technologies (ICTs). This attempt "to enhance the access to and delivery of government services to benefit citizens" is known as e-government (Basu, 2004). This study focuses on e-government project planning, with emphasis on two factors: accountability and transparency. A checklist of success factors, derived from case studies and theoretical documents, is provided for consideration by e-government designers.

Download the entire Capstone research project

Port Security Technology for Closed Container Inspection at United States Seaports of Entry (2010)

Archibong J. Ituh, international trade specialist, Aurora Networks, Inc.

This study examines technologies currently deployed at United States seaport points of entry to enable U.S. Customs (CBP) agents to inspect all entering closed containers. Analyses of literature published between 2002 and 2009 focuses on use, effectiveness and development of selected technologies, including gamma-ray and X-ray imaging, and radiation detection, as well as research on current screening technologies. The outcome supports CBP inspectors to detect dangerous cargo and minimize disruptions to the international supply chain.

Download the entire Capstone research project

Potential for Cloud Computing to Lower Power Consumption and Reduce Carbon Emissions in the Data Center When Compared to Traditional Data Centers, The (2012)

Jason James, vice president of IT, Servigistics

This annotated bibliography reviews literature published between 2008 and 2011 to identify the potential for cloud computing to lower power consumption and reduce carbon emissions. Accounting for varied energy efficiency factors (location, virtualization, architectural design, and management systems), cloud providers implementing carbon/energy based scheduling policies can achieve energy savings in comparison to profit based scheduling policies, leading to higher profit and less carbon emissions (Garg, S., Yeo, C., Anandasivam, A., & Buyya, R. 2011).

Download the entire Capstone research project

Preventing Pirated Software Use within an Organization

Jared A. Corwin

Software piracy, or the illegal use of software, is a growing global issue. The legal and moral ramifications associated with the use of pirated materials within an organization increase the risk of criminal and civil liabilities within an Information Technology (IT) department. This study examines select literature to discover what can and should be done by an IT worker to prevent the use of pirated materials on the network for which they are responsible.

Download the entire Capstone research project.

Project Management Best Practices for Projects that Introduce Innovative Processes (2016)

Jered Scholl, implementation manager, U.S. Bank

Project management and innovation management are critical competencies for organizations that are seeking to gain a competitive advantage. This annotated bibliography surveys literature that addresses project management best practices for projects that introduce innovative processes. It provides information to project managers, program managers, and business executives regarding: (a) lessons learned on the implementation of innovation in organizations, (b) managing change in organizations through projects, and (c) challenges and best practices in managing projects with innovative deliverables.

Download the entire Capstone research project

Psychographic Characteristics of the Millennial Generation: Developing a Market Segmentation for Use in the Wine Industry (2006)

Michael Wright, senior business systems analyst, Online Business Systems

The ability of the wine industry to attract a new customer base (Thach, 2005) requires a thorough understanding of the needs and wants of that group (Kotler, 2003). Selected literature published between 1991 and 2006 is examined for three psychographic characteristics (i.e., values, attitudes, and lifestyles) of the millennial generation using a conceptual analysis method. Findings are translated into a market segmentation and preliminary target market description for use by wine sales and marketing staff.

Download the entire Capstone research project

Public Network Convergence: The Integration of Separate Voice and Data Services onto a Single Packet Network, Examination of Selected Conditions Affecting (2000)

Shannon Morris

Voice, data, and multimedia communications have increased rapidly the past several years. Maintaining separate voice and data networks is expensive. Integrated voice and data networks based on IP architecture promise drastic improvements in performance, connectivity and costs. A review of literature from June 1997 to March 2000 explores the conditions surrounding the migration of voice traffic to a data model. Conclusions are presented as list of conditions that impact implementation of a converged public network.


Quantitative Data Graphics: Best Practices for Designing Tables and Graphs Used in Not-for-Profit Evaluation Reports (2005)

Ruta Stabina, freelance information and graphics designer

Graphical presentation of quantitative data greatly improves information perception, absorption, and retention. This literature review study analyzed 16 sources published between 1990 and 2005, addressing the three most frequently used quantitative business data presentation types: tables, graphs, and charts (Tufte, 2001) and graphics design. Results are presented in four tables, providing a set of factors for consideration by not-for-profit organization program managers when creating quantitative graphical data visualizations for use in program evaluation reports.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

The Quest to Provide a Complete Personal Health Record (2019)

Jacqueline M. Muller, sr. technical project manager, Change Healthcare

This annotated bibliography examines the social, technical, and regulatory challenges of providing patients and care teams with complete personal health records. The intended audience includes executives, policy makers, and product developers within the healthcare service and technology industries. Scholarly literature published between 2015 and 2019 was referenced to identify challenges and possible solutions for integrating health and wellness data from multiple sources and devices in order to create longitudinal personal health records.

Download the entire Capstone research project


Radical Versus Evolutionary Change Management Tactics: Patterns and Pitfalls in Ten Selected Case Summaries (2000)

Tim Williams

This study evaluated 10 companies in which an existing business system was replaced by newer technology and where this replacement initiated organizational change. Case summaries were published between 1993 and 1999. Each presented a review of a company that employed either a radical or an evolutionary change management tactic. Each was examined for patterns of change management tactics and associated pitfalls. The patterns were identified and analyzed through a process of content analysis.

Ransomware: Hostage Situation

Khuram Abedin

In this digitized world, data is accessible at the fingertips 24/7 and has improved the way people live and productivity and efficiency within organizations. However, security concerns have also taken a toll on reliability and sociability. Cyberattacks such as ransomware—malware, Trojans, phishing, spam, and viruses—cause organizations millions of dollars in damages and productivity loss. This annotated bibliography explores literature on the issues of malware and how to recover from and prevent disastrous attacks.

Download the entire Capstone research project.

Rate Control Policies that Specify Bandwidth Allocated to Applications on Frame Relay Networks, A Study of

Eric Tooley

When bursty traffic causes lost data or poor performance for mission-critical applications on frame relay networks, a bandwidth management system that supports TCP rate control policies can be deployed to prioritize application traffic, based on application protocol. A review and content analysis of selected literature published between January 1995 and January 2001 identifies four types of rate control policies with predictable effects on application traffic, and suggests a seven-step procedure to implement rate control policies.

Records and Information Management Program in Line with Oregon Laws, ISO Standards and Best Practices, Developing a (2004)

James Mullen, records manager, The Oregon University System (OUS)

According to Pemberton (2004), records and information management (RIM) programs add value to organizations and reduce costs and risk. This study reviews Oregon laws, ISO standards, and best practices in selected literature (1991–2004). These are compared to policies and procedures revealed in OUS internal documents and selected interviews. Results are presented for review by OUS management, to be used in support of a well-planned and implemented RIM program, appropriately authorized and supported.

Relationship Between Knowledge Management and Organizational Culture: An Examination of Cultural Factors that Support the Flow and Management of Knowledge within an Organization, The (2002)

Antonina Holowetzki

Because knowledge management (KM) initiatives won't take hold unless they are supported by an organization's culture, cultural factors must be considered when developing KM strategies. This study examines cultural factors in the culture-knowledge relationship. Applying content analysis methods, theory-based literature and case studies published between 1998 and 2002 are reviewed to examine the relationship between organizational culture and knowledge management. The findings are synthesized into a checklist of the cultural factors that impact KM initiatives.

The author of this study is a corecipient of the 2002 AIM Director's Distinguished Capstone Award.

Relationship Between Selected Sources of Computer Anxiety Experienced by Beginning Computer Users and Approaches to Computer-based Training, The (2005)

Norm Combs, manufacturing engineering manager, Parker Hannifin

As dependence upon computers becomes more prevalent in the workplace, providing effective computer-based training to workers is vital to employee success. However, many workers suffer from various forms of computer anxiety. This study examines the relationship between the successful design of computer-based instruction and five sources of computer anxiety including age, gender, instructional method, general psychological factors, and previous exposure to computers. Four cases are compared to Kolb's Learning Cycle (Harb & Terry, 1992).

Relationship of Human Aural Perception to the Current State of Auralization in Virtual Reality Applications (1998)

Dale Goodno

The purpose of this study was to establish a broader understanding of research in the field of aural virtual reality technology. Research studies from nine selected universities were reviewed. References were limited to publication between January 1994 and June 1998. Findings are geared toward developers of aural interfaces and include: list of critical terms; table of psychological attributes of auditory perception; table of psychophysical attributes of sound localization; and two trends in the field.

Requirements Process as a Foundation for Evaluating and Selecting New Online Information Technologies, Using the (1995)

Peggy Pechan

If a quality product is one that conforms to customer requirements, then in order to meet a corporation's objectives to deliver products of high quality, we need to collect requirements and link all product decisions to those requirements. This project describes a process for collecting requirements that is extendable to both product development and product selection decisions.

Retaining IT Employees by Reframing Organizational Culture: Factors to Consider Beyond Financial Incentives (2009)

Michael A. Pritchard, senior integration engineer, Smile Reminder

Competition among employers is increasing for productive IT employees. By understanding organizational culture, managers can identify why employees leave an organization and ways to retain employees. Money and financial incentives should not be the primary source for motivating employees. Use of intrinsic motivators will have a greater affect on employee satisfaction and retention. Technical employees want a balanced mix of salary and an organizational culture that promotes challenging and meaningful work.

Risk Mitigation for SMEs Implementing ERPs (2019)

Tyler Stewart, principal, senior analyst, Gage Technology Group

ERP systems offer benefits to businesses through cost reductions, efficiencies, and building competitive advantages (Aversano, Di Brino, Guardabascio, Salerno, & Tortorella, 2015). However, research indicates ERP implementations have high failure rates (Saxena, Dempsey, & Mcdonagh, 2016; Iskanius, 2009). SMEs evaluating ERP adoption face risks different from larger enterprises (Stefanou, 2013). SMEs can make better decisions towards ERP implementations through risk management. This study presents information about ERP implementation risks for SMEs and risk mitigation approaches.

Download the entire Capstone research project

Role of Leadership in Job Requirements and Responsibilities of the CIO, The (2008)

Arron Leverman, United States Navy

A gap exists in understanding the leadership actions required of corporate chief information officers (CIO) (Gottschalk, 2007). This study examines that gap through a review of current job requirements and responsibilities of the CIO, extracted from selected literature published between 1998 and 2007. Focus is on the role of leadership in for-profit organizations, as framed by Kotter (1998). The leadership definition includes three characteristics: (1) setting a direction, (2) aligning people, and (3) motivating people.

Download the entire Capstone research project

Role of Middleware in Mobile Device Content Delivery, The (2008)

Tim Kraska

Middleware has an important role in connecting distributed mobile systems. According to Grigoras (2006), mobile middleware provides transparent access to proprietary services and resources in a cost effective way. Delivering content to mobile devices requires understanding (1) mobile architecture strategies, (2) the role of middleware, and (3) the ability to reuse existing content through adaptation. This literature review describes software and technology trends that address issues and limitations concerning mobile devices and content delivery.

Download the entire Capstone research project

Role of Software Agents in Supply Chain Risk Management Related to the Procurement Process in the Aerospace Manufacturing Industry, The (2008)

Tolulope A. Oluwole, procurement agent, The Boeing Company

Supply chain management is a critical component of business planning and assembly, and must be continuously monitored to be effective (Mehra, 2005). This paper reflects on the role of software agents for managing supply chain risks at tactical and operational levels (Mark, et al., 2000). Twenty-nine selected references published between 2000 and 2008 are analyzed to understand how software agents mitigate the effects of risks in supply chain management supporting complex distributed systems.

Download the entire Capstone research project

Role of Student Workers by Information Technology Help Desks at Institutions of Higher Education, The (2001)

Jerilyn Prescott

An electronic survey and content analysis of case profiles were performed to examine if and how student workers were employed by information technology help desks at institutions of higher education. The survey indicated that student workers were employed by help desks and had roles at all levels of support. Content analysis of 23 case profiles from the years 1994–2000 found five emergent categories concerning student workers: management, hiring, training, retaining, and roles.

Role of the Project Management Office in a Multi-Project Environment: Enhancing Governance for Increased Project Success Rates, The (2008)

Jim Misner, engineering project manager, Comcast

Research indicates that project management becomes increasingly difficult when there are multiple overlapping projects, resulting in a need for enhanced governance controls to increase success rates. A project management office (PMO), defined by Grey and Larson (2006) as a centralized unit to oversee project management, is often utilized. This literature review of references published between 2000 and 2008 provides mid-level decision makers a synthesis of ideas related to the role and value of the PMO.

Download the entire Capstone research project


Sarbanes-Oxley Act of 2002 on Computer Forensic Procedures in Public Corporations, The Impact of the (2009)

Jeremy Mullis, IT manager, Trailblazer Studios

The purpose of this literature review is to examine the impact of Sarbanes-Oxley on development of internal security policies and computer forensics strategies. Focus is on selected literature, published between 1999 and 2009, relating to public corporation computer forensics and electronic record retention. Literature reveals that corporations must be able to preserve electronic records, respond quickly to incidents, and provide correct information required by law, or risk vulnerability during an audit or investigation.

Download the entire Capstone research project

Secondary Use of Personally Identifiable Information: Exploring Privacy Practices Among P3P-enabled Websites Specific to the Choice Principle of Fair Information Practices (2003)

Thomas Dole

Technological advances offer efficient, inexpensive data storage and analytics. Insufficient transparency and choice upset the data collection balance between companies and their customers, resulting in a lack of trust. This study offers matrices and charts illustrating privacy practices, specific to the Choice principle of fair information practices, of Platform for Privacy Preferences (P3P) compliant websites. Literature review and content analysis strategies were employed to develop recommendations for building trust, thereby creating a competitive advantage.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Securing Electronic Data Exchanges for HIPAA Covered Entities to Ensure Greater Compliance with Security Rules (2011)

Sandesh Kuckian, business systems analyst, MedImpact Healthcare Systems, Inc.

HIPAA requires covered entities to follow standards for protecting the security of electronic protected health information (e-PHI). This study examines the need to develop a secure data exchange in order to maintain compliance with the goals of the HIPAA Security Rule. Literature published between 2000 and 2011 is analyzed to ensure the confidentiality, integrity, and availability of e-PHI while allowing entities to adopt new technologies to improve the quality, safety, and efficiency of patient care.

Download the entire Capstone research project

Security Concerns with Employee Wearable Technologies, Best Practices to Address (2016)

Steven Sconce, NERC compliance manager, EDF Renewable Energy

The great popularity of wearable computers offers many benefits and opportunities to businesses, but widespread use of wearables in the workplace creates serious security challenges for employers. Thus, managers of both civilian and military operations need a heightened awareness of these issues and of best practices for addressing them. This annotated bibliography, intended for employers and managers, explores relevant literature from 2010– 2016 about the nature of these security problems and best practices for addressing them.

Download the entire Capstone research project

Security of Information Assets In the Small to Medium Sized Organization, Fundamental Practices for (2004)

Roger Sample, Technology and Information Management, Portland VA Medical Center

Securing information assets is not a one-time activity, but involves a continuous risk assessment. This study identifies practices for managers in small to medium sized organizations who need to establish minimum security levels. Selected literature published from 1998 to 2003 was analyzed to identify common practices. Findings are presented in a set of 18 practices, aligned with Allen's five basic steps of Harden/Secure, Prepare, Detect, Respond and Improve (2000), and categorized as strategic or operational.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Secure BYOD Implementations, Best Practices for (2016)

Andrew L. Rice, Technologist, A-dec, Inc.

The popularity of Bring Your Own Devices (BYOD) has increased dramatically over the last decade. BYOD bestows many benefits including increased productivity, flexibility, and employee satisfaction. However, BYOD also introduces new risks to the organization that must be understood and controlled. This annotated bibliography is comprised of literature published from 2012-2016 to help IT decision makers create policies and procedures to promote secure and flexible BYOD implementations.

Security Strengths and Weaknesses of Virtualization as a Green Computing Solution (2011)

Joseph Esensten, senior information security engineer, Raytheon, Inc.

Server virtualization technologies enable the data center to consolidate resources in order to improve efficiencies and save energy. This study explores security strengths and weaknesses of this technology within the context of green IT. Selected literature published from 2005 through 2010 is examined. Common attacks, security strengths, and security weaknesses are presented. Green benefits of virtualization and eight recommended security controls are identified to maximize nine positive security features, for use by IT security professionals.

Download the entire Capstone research project

Semantic Models (Ontologies) for Use When Managing Enterprise Tacit Knowledge, An Inventory of (2010)

Philip Pridmore-Brown, vice president marketing and product services, Thetus Corporation

Semantic web technologies provide flexible tools and approaches for modeling enterprise tacit knowledge. Literature published after 2000 identifies three primary types of ontologies: (a) upper level, describing general or common concepts, (b) mid-level, extending upper level concepts to a domain space, and (c) lower level, or domain specific, that define the nuances to an organization or domain (Kiryakov, Simov, & Dimitrov 2001). Tools and ontologies are cataloged in an inventory, including advantages and disadvantages.

Download the entire Capstone research project

Service Level Agreement (SLA) Expectations for Improved Conformance among Stakeholders in a Distributed, Dynamic, Composite Software Solution, Toward Better Understanding of (2008)

Cameron J. Ough, senior engineer, Intel Corporation

Software development has evolved towards increased reuse of pre-existing components and delivery of functional capabilities through service-oriented architectures (SOA). The situation drives service owners to rely on multiple autonomous partners in the service delivery, requiring design of contractual agreements termed service level agreements (SLAs), which are established to provide business obligation guarantees. This study reviews challenges for stakeholders of SOA applications related to specification, implementation, validation, and audit of SLAs in today's distributed, composite software systems.

Download the entire Capstone research project

Service Orientation of Reference Librarians and Academic Computing Professionals, A Comparison of the

Kimberly A. Jordan

Reference librarians and academic computing professionals in higher education are finding an increasing degree of overlap in their jobs providing information services to faculty and students. In spite of this overlap, the two groups do not communicate or collaborate well. The literature suggests reference librarians have a stronger service orientation than their computing counterparts. A survey of 100 reference librarians and 100 academic computing professionals at small liberal arts colleges in the United States conducted in November, 1996, reveals very little difference in the service orientation. The results of this survey may serve as a foundation on which to build better relationships between campus information service providers.

Service-Oriented Architecture Governance, Implementing (2007)

Cefe Quesada, head of technology solutions, Russell Investment Services

Service-Oriented Architecture (SOA) adoption is growing with increasingly more technology departments in the US and Europe either deploying SOA solutions or engaging in proof of concept projects (MarketWatch, 2007). The purpose of this study is to identify the implementation phases of a SOA governance program (Windley, 2006A), including the information technology management and business goals for each phase. A roadmap is provided for technology managers preparing to implement a SOA governance program.

Download the entire Capstone research project

Should Mentor Graphics' Software Support Division Allow Customers to "Surf" the Internet into our Data Pool? (1995)

Bruce Swanson

This project explores the idea of providing software support for complex engineering software over the Internet. It addresses the question of whether Mentor Graphics' Software Support division should develop and offer a World Wide Web server so customers can obtain information by using a browser tool.

Simulation Modeling within the Systems Thinking Discipline: Evaluation Criteria for Simulation Modeling Tools (2001)

Erin Kleinke

Systems thinking involves looking at the interrelatedness among parts of a system and then synthesizing those parts into a unified whole. Simulation modeling is critical to systems thinking, as it enables the practice of making decisions and observing the impact of decisions before actual implementation. This study uses literature review to produce a set of evaluation criteria for selecting a simulation modeling tool. A pilot test of the criteria, using Hyperion Essbase, is included.

Single-Sourcing Technical Communications: Factors to Consider When Moving Technical Communications Groups from Traditional to XML-Based, Single-Source Authoring Environments (2002)

Wes Kalbfleisch

This integrative literature review of technical communications, XML, single-sourcing, and related resources describes traditional and single-source authoring environments. Using open-coding methods of content analysis, selected literature describing the two environments are analyzed and compared according to three categories: objectives, processes, and skills. Results present a comprehensive list of factors, defined as differences between the two environments, that managers of technical communications groups can use as they move from traditional to XML-based, single-source authoring environments.

Six Vendor Single Sign-On Products: The Costs and Benefits of Integration into the Portland Community College Computing Environment, An Examination of

Gary Eaton

This study examines six single sign-on products for integration into Portland Community College's heterogeneous computing environment. Products include Computer Associates' Etrust, Evidian's AccessMaster, Passlogix' v-GO, Novell's NSSO, RSA's Keon Desktop, and Oblix' NetPoint. Using conceptual analysis, this study examined vendor and independent data from documents published from November 1998 through June 2001. Results include a descriptive summary and a feature/cost product comparison table for use by those considering the adoption of this kind of product.

Small Business Computer Acquisition Model: A Case Study (1995)

Charles Soderstrom

If information systems are capable of providing a competitive edge to small businesses and influencing the operation and success of the venture, then the construction of the information system is of vital concern. This project investigates and documents the acquisition of computer systems for small business owners and suggests that current methods of acquisition are obsolete or at least haphazard.

Smartphone Financial Transactions: Security Risks and Control Options (2014)

Andy Keys, software engineering manager, Bank of America

The purpose of this annotated bibliography is to identify and describe (a) the latest security risks faced by consumers when using smartphones to conduct financial transactions, and (b) the existing options to mitigate or avoid these risks.

Download the entire Capstone research project

Social Computing Related to Worker Productivity, Factors in (2007)

Brig Otis

Proliferation in social computing technologies has created a need to examine the technology selection process with focus on the relationship to worker productivity. A review of literature published between 1998 and 2007 is conducted. Content analysis identifies factors in the literature addressing social computing, defined by the Social Computing Group (2005) and worker productivity, defined by Nasar (1993). The outcome is a Q&A guide for information managers to use when selecting social computing technologies.

Social Media as a Crime Fighting Tool, Law Enforcement Use of (2017)

Kevin Jones

The increased popularity of social media websites within the last decade has opened a new avenue for law enforcement to access intelligence from criminals who utilize these sites. Law enforcement agencies need to recognize the collection possibilities and understand the various ways that investigators can access this content to progress cases. This annotated bibliography, intended for law enforcement managers, presents best practices and tools in the use of social media as a crime fighting tool.

Social Media in Disasters, Best Practices for Fire Departments in the Application of (2016)

Mitchell H Lee, Information Technology Manager, South King Fire & Rescue

This study explores how first responders can use social media to improve communication and situational-awareness during a disaster. This research is intended for fire departments seeking to implement social media into emergency management communications and strategies. The importance of the annotated bibliography is to inform the intended audience of the best practices in the use of social media in crisis situations. The materials used in this research document were published between 2007 and 2016.

Software Application Testing for Year 2000 Readiness and Recommended Test Dates, A Study of

Dave Bublitz

The purpose of this paper is to explore a portion of the Year 2000 Readiness problem, specifically, the testing of software and appropriate dates to be used. Research includes a literature review of selected books and Internet sites. The result is a list of seven dates to be used to determine the date processing readiness of an application. This research suggests that proper testing procedures will help to minimize problems by eliminating incorrect software calculations.

Software-Defined Networks (SDN): What Systems Integrators Need to Know (2014)

Joshua D. Burman, senior systems engineer, Right! Systems, Inc.

The purpose of this annotated bibliography is to define the SDN approach in a way that can be understood by networking professionals, including pre-sales consultants, so that they are better able to explain this approach to potential SDN customers.

Download the entire Capstone research project

Software Design Patterns, Advice to Managers on the Use of

Richard Temple

While object-oriented software construction offers many potential benefits, the concepts and best techniques of the programming style remain elusive to many information technology (IT) professionals. This conceptual analysis study reviewed documents published from 1995 to 2001 in order to demonstrate to IT managers how to best use design patterns. Results indicate that design patterns can greatly help software designers incorporate object-oriented techniques by simplifying complex software solutions, enabling higher quality designs and more maintainable software.

Software Design Tool Used for Computer Chip Design in a Large, Multinational Company, Assessment of the Usability of a

Hem Singh

There are a number of software design tools used in MYCHIP Corporation for designing computer chips. This project attempts to assess the usability of one of the design tools by identifying the critical factors that affect usability and obtaining user feedback on the impact of each of the critical factors on their productivity when using the tool.

Software Development, Applying Lean Thinking Principles to

Ray Tatum, program manager, Hewlett-Packard

Lean thinking principles, based on the Japanese concept muda, have been successfully applied in manufacturing and product development organizations since the 1940s. The software development community can realize similar benefits, with potential to eliminate wasted efforts inherent in the serial and structured traditional software development process. This study defines the seven basic principles of lean thinking (Poppendieck and Poppendieck, 2003), examines how they relate to the software development process, and suggests techniques for their application.

Download the entire Capstone research project

Software Licensing Policy and Practice in Portland, Oregon, A Survey of

Charles Bammerlin

New computer hardware and software technologies have advanced beyond the ability of the legal system to keep pace, both in the United States and internationally. This project examines the policies and policy implementations that organizations in Portland, Oregon, use to limit software copyright infringement, legally imposed monetary sanctions, and adverse publicity.

Sorting Out Card Sorting: Comparing Methods for Information Architects, Usability Engineers and Other Practitioners (2005)

Steve Hannah, associate director, Instructional Technology Center, University of Minnesota, Crookston

This study examines open and closed card sorting methods used by information architects and usability engineers. A hybrid data analysis strategy, combining conceptual analysis (Palmquist, et. al., 2005) and constant comparative method (Glaser and Strauss, 1967) is employed to review 14 references. Characteristics of card sorting methods and their properties are organized into 12 emergent categories. Results are presented in a hypertext table, designed to be extended by others and supported with explanations of each category.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Staffing a School District Information Technology Department with K-12 Students (1995)

Gary Hartman

School districts are under pressure to provide students with training and knowledge of information technology and information resources at a time when school districts have inadequate financial resources to fully fund a technology rich environment. This project documents whether or not students are capable of staffing an information technology department and related policy issues.

Staffing Strategies For Higher Education Information Technology: A Study of Four Approaches (2000)

Karen King

Within the context of a general IT workforce shortage, this study explores staffing strategies used in Oregon higher education through review of IT workforce literature, EDUCAUSE data, salary information, and July 2000 survey responses. In a state with the fastest growing demand for IT workers, this study finds that of four approaches (recruiting/retention, students/interns, outsourcing, and contracting) Oregon institutions rely most on recruiting and retention, though the lack of competitive salaries continues to be problematic.

This author of this study is the recipient of the 2000 AIM Director's Capstone Award.

Strategic Information System Planning (SISP) Methods and Alignment to Strategic Management Planning Concepts, Key Stages of

Brian Fergerson, manager, ERP and Virtualization Services, Columbia Forest Products

This annotated bibliography identifies and explores stages within five selected strategic information systems planning (SISP) methodologies. Stages are compared to produce an extrapolated set of key stages for use by information technology managers and business managers to support business strategies and contribute to business value. Conclusions describe reasons for the need for SISP, strategic management planning (SMP) foundational concepts, the need for SISP/SMP strategic alignment, and key factors for SISP implementation and alignment success.

Download the entire Capstone research project

Strategic Project Management: Aligning Strategic Business Objectives with Project Management Strategy (2008)

Jennifer DyReyes, project manager, ADP, Inc.

This literature review examines the theory of "strategic project management" as a concept that aligns organizational strategic intent and project management goals. Twenty-eight sources published between 1998 and 2008 are analyzed to understand how strategic project management enables the alignment of business objectives with project strategy in support of overall competitive advantage. The role of project portfolio management and the cultivation and management of organizational competencies, capabilities and project leadership (resource-based view) are also examined.

Download the entire Capstone research project

Strategies and Barriers in Implementing Emergency Response on Social Media for the Washington Air National Guard

Donald Smith, Knowledge Management, Washington Air National Guard

This study explores the barriers and best practices for consideration by the Washington Air National Guard for the implementation of a social media program for use before, during and after crises within the state of Washington. This research is also intended for similar organizations who wish to implement social media into their crisis response plans. The annotated bibliography provides content on barriers to consider and social media best practices used by other crisis response organizations.

Download the entire Capstone research project

Strategies for Success: A Comparison of Critical Success Factors in Transitioning To PC-Based/Client-Server Applications Development (1995)

Shelly Stalnaker

Moving from a mainframe, procedurally-oriented development environment to a client-server development environment requires a major adjustment on the part of both the development staff and the customer. This project analyzes the different approaches and methodologies used by application development teams in the transition to client-server applications development and evaluates the results both in terms of the teams' success in implementing new applications and in building a foundation for subsequent development and enhanced efforts.

Supply Chain Technology for Global OMNI Channel Retailers, Addressing Gaps in (2017)

Lawrence Duane Casey

This annotated bibliography examines literature published between 2010 and 2017 that addresses technology gaps in supply chains for global OMNI channel retailers for cross channel engagements to help drive profits and better serve the consumer. It provides information to cross functional business leaders about: (a) business strategy descriptions for OMNI channel retailers, (b) supply chain challenges for OMNI channel retailers, (c) and best practices for integrated technology for OMNI channel supply chains.

Sustainability in Green Marketing Consumer Goods., A Study of the Role of (2002)

Ted Ross Stock

The emerging field of sustainability is impacting the practice of green marketing consumer goods. A review of selected literature published between 1987 and 2002 identified 16 factors in green marketing consumer goods that relate to sustainability, as described by The Natural Step System Conditions. The results are presented for green marketing professionals in a table of factors and recommendations related to the four elements of Kotler’s marketing mix: product, price, place, and promotion.

Sustainability in the Data Center of Small to Medium-Sized Organizations, Factors that Influence (2007)

Dennis Zeidlhack, director, technical and information systems, CompView, Inc.

Selected literature published between 1992 and 2007 is examined to provide information to technology managers of small to medium-sized organizations for making decisions that influence sustainability in the data center. The concept of sustainability applies to use of practices that benefit the environment and business. Efficiencies can save money, increase capacity, and lead to higher productivity and profitability (Hitchcock & Willard, 2006). Three tables list factors for opportunities related to purchase, use, and disposal of electronic equipment.

Download the entire Capstone research project


Technical Architecture Prerequisites and Selection Criteria for an Enterprise Information Portal (2001)

Maya Konaka

In order to evaluate enterprise information portal (EIP) software, organizations need effective EIP evaluation criteria. A review and content analysis of selected literature published between July 1999 and September 2001 identifies the technical architecture prerequisites for an EIP product necessary for full realization of operational goals in four core functional areas: (1) Content management/aggregation, (2) Index/search, (3) Personalization and (4) Data/application integration. Results are presented as a guideline for evaluating an EIP for implementation in an organization.

Techniques and Technologies to Support the Transfer of Tacit Knowledge Among Co-located Teams (2014)

Laura Duffey, business analyst, Oracle

The purpose of this annotated bibliography is to describe techniques and technologies that promote tacit knowledge sharing among workers within co-located teams in multinational corporations.

Download the entire Capstone research project

Telehealth: An Overview of Benefits and Barriers in Patient Care Delivery (2001)

Ann Alexander

The growth of telehealth is fueled by the advancement in data communication technologies, the Internet, and continuing cost pressures in healthcare. A review of selected literature from January 1996 to July 2001 of the larger area of telehealth identifies benefits and barriers of telehealth use in patient care delivery. Conclusions and recommendations are presented for healthcare providers and IT professionals to help build awareness of telehealth issues and guide decisions prior to telehealth project implementation.

Telework Productivity and Effectiveness: Factors that Influence Results-Oriented Job Assessments (2011)

Allison Davis, senior business analyst/project manager, Intel Corporation

The study provides a set of factors that pertain to the essential requirements that employees and managers working in large multinational corporations must consider for job performance assessments of teleworkers. This review identifies the use of a goal-oriented system and technization that create trust relationships and empower employees to achieve a quality outcome. These elements consider the benefits and drawbacks of relevant social and technology factors that influence productivity and effectiveness for results-oriented job assessments.

Download the entire Capstone research project

Testers in an Agile Software Development Life Cycle within B2B Companies, The Role of (2013)

Dwayne Thomas, statistical data quality assurance analyst, Rentrak Corporation

High software quality is a very important outcome of software development practices for business customers (Mairiza, Zowghi, & Nurmuliani, 2010). This annotated bibliography is developed for software testers who want to improve the quality of software and customer satisfaction in the agile development cycle. Selected references published between 2006 to 2013 are reviewed to examine software quality requirements, appropriate amounts of software tester readiness, test planning, verification of business test cases, and additional testing activities.

Thinking in Systems: Improving Organizational Effectiveness and Culture (2015)

Tammi Burkhardt, reporting analyst, Oregon Health Science University Foundation

Systems thinking and its application have been studied in various environments, but it is not always clear how the elements of systems thinking can positively impact operational effectiveness and create a more cohesive organizational culture. Furthermore, it is imperative for organizations to understand the skill set and behaviors that leaders need to acquire and maintain to promote successful change management. This annotated bibliography features literature published between 2006 and 2015 to help individuals in management positions understand, implement, and cultivate the elements of a systems thinking approach to improve operational effectiveness, build a more cohesive organizational culture, and promote successful change management.

Three Message Broker Systems for Enterprise Application Integration, An Evaluation of (2000)

John Brock

This study evaluates three message broker systems for enterprise application integration. Message brokers include ActiveWorks©, ActiveEnterprise© and BusinessWare©. Evaluation research is used to determine the relative merit of eight attributes including adapters, administration, transformation, platform support, scalability, extensibility, security, and messaging. Data, both vendor and independent, was published between 1996 and 2000. Outcomes include a descriptive summary and a rated evaluation of attributes. Outcomes are designed to be generalized to criteria unique to many companies.

Three Personalized Search Tools in Relation to Information Search: iGoogle™, Leap Tag™, and Yahoo!® MyWeb, Analysis of (2007)

Joel Tachau, senior information architect, Avenue A | Razorfish

Personalized search is becoming mainstream with the rollout of iGoogle™. While only beginning to impact consumers, these search tools require search experts to retool and rethink how they optimize websites. Three personalized search tools are analyzed to illustrate common features related to the information search stage of the consumer buying process (Kotler & Keller, 2006, p. 191). Conclusions provide a summary of potential SEO (search engine optimization) tactics and five key considerations.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Toolset for Evaluating the Role of Corporate Culture in Three Selected Business Process Innovation Approaches, Developing and Demonstrating a (2003)

Michael Wetter

Business process innovation is a central means by which organizations increase efficiency and quality, make effective use of information technology, and establish competitive advantage. Approaches to process innovation that address corporate culture may achieve performance objectives more effectively and reliably than approaches that focus exclusively on technical and structural matters. Grounded theory is used to develop and demonstrate an analytical toolset that evaluates how three process innovation approaches address corporate culture, defined by Schein (2000).

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Tools that Take the Users’ Perspective into Consideration in the Design of Business Applications that Support Strategic Goals, IA Review of (1999)

Laura Rooke

The full utilization of strategic software applications' is dependent upon the users’ acceptance of the application. To identify aids to help applications designers understand the users’ perspective, the researcher conducted a review of literature published between 1984 and 1999. Literature was analyzed for techniques common to several types of businesses. Findings are presented as a list of techniques for use by applications designers to apply in understanding and incorporating the users’ perspective.

Traditional ERP and Lean Manufacturing Production Control Methods with a View of Flow Manufacturing Software as an Alternative, An Examination of (2002)

James F. Kent

With the explosive growth of e-business and intensive global competitive pressure, manufacturing companies are examining production control methods that combine the planning capabilities of enterprise resource planning (ERP) with the shop floor execution attributes of lean manufacturing. A review of selected literature published between 1987 and 2001 examines the use of these traditional methods. This data is compared to newly introduced flow manufacturing software products to provide information for professionals considering hybrid production control methods.

The author of this study is a corecipient of the 2002 AIM Director's Distinguished Capstone Award.

Training and Employee Development to Increase Public Sector Employee Retention, Best Practices in (2016)

Scott M. Jurgensen, District Chief, Brevard County Fire Rescue

Public and private sector employers suffer from employee turnover. A challenge employers face is how to retain quality employees while remaining fiscally responsible. Providing employee development and training can create a quality workforce while positively impacting retention. Organizations that commit to employee development can see a positive return on investment through reduced attrition and increased productivity. This annotated bibliography presents literature on best practices in training and development to increase public sector employee retention.

Trust and Member Inclusion as Communication Factors to Foster Collaboration in Globally Distributed Teams (2014)

Nicol L. Davidson, senior field engineer I, Raytheon Intelligence and Information Systems

The purpose of this annotated bibliography is to explore two key communication factors that could effectively create and foster collaboration in globally distributed teams: (a) trust and (b) inclusion.

Download the entire Capstone research project

Two Conditions that Impact the Narrowband Frequency Development of Law Enforcement Wireless Communications Systems, A Study of (2000)

Steve Noel

Law enforcement agencies have been directed by the Federal Communications Commission to migrate wireless communications system development to narrowband channel operation. This study examines two conditions impacting the development of law enforcement wireless communications systems: interoperability and project management. Data for this study was collected from industry and government literature published from January 1989 to August 2000. Results are presented for law enforcement officials to aid in integration of wireless communications systems with core missions.


Unique Characteristics and Related Project Management Challenges of Global Virtual Teams (2006)

Randy Timmerman, project director, Medidata Solutions Inc.

As companies continue to expand globally, virtual teams utilizing information and communication technology are formed to accomplish company goals. Success in these teams requires increased knowledge of the unique characteristics and related management challenges. Selected literature published since 1996 is examined, to produce a reference guide for project managers. Six global virtual team characteristics are identified: geographic dispersal; structural flexibility; technology-based communications; cultural diversity; high task interdependence; and lack of shared work experience.

Download the entire Capstone research project

Unique ePortfolio System Features: Benefits to Students, Faculty and Educational Institutions, Identification of (2005)

Mark McKell, document production manager, IMS Global Learning Consortium, Inc.

Electronic portfolios (ePortfolios) have become an important tool for student-centered learning in higher education. Literature published between 2002 and 2004 is analyzed using content analysis, to identify a set of unique system feature descriptions for campus technology directors. Features are framed as benefits to key constituencies, including students, faculty, and the educational institution (Jafari, 2004). This outcome is intended to prepare technology directors for future ePortfolio implementation within the larger campus information system.

Download the entire Capstone research project

Unstructured Data through Data Governance, Mitigating the Risks of Insider Threat on (2016)

Michael C. Egli, Varonis Systems

This paper examines the growing risk of insider threat on unstructured data (Gartner Research, 2015). This review of selected literature identifies the risks and challenges in managing unstructured data, and presents best practices for risk mitigation, security and audit controls, compliance implications, and technical processes. With implementation of these practices, it is feasible that organizations can reduce the probability and impact of an insider breach on their unstructured data.

Download the entire Capstone research project

UMLS Vocabularies and their use within the Electronic Health Record, A Study of Selected (2007)

Bonnie Altus, senior systems analyst, Clinical IT Group, Samaritan Health Services

This study examines eight UMLS controlled vocabularies and reviews them to determine how they may be used to support communication within the EHR. This study is important because no controlled vocabulary fully meets the needs of healthcare (Abdelhak, et al., 2001). Content analysis reveals that items generally included in the EHR are observations, laboratory tests, diagnostic imaging reports, treatments, therapies, drugs, patient information, legal permissions, and allergies. A descriptive profile of each vocabulary is included.

Download the entire Capstone research project

Using Smart Cards and the World Wide Web for Accessing Computer-based Patient Records: An Overview and Profile of Benefits from Two Emerging Technologies Developed by Medical Information Management Systems, Inc. and Microsoft Corporation (1999)

Deborah Bahlman

Timely access of health records is critical in today’s U.S. healthcare industry. New technologies provide quick access to these records. A selected review of literature, from 1995–1999, published by researchers and development companies, provides an overview of the technologies and a profile of benefits related to efficiency, effectiveness, and competitive advantage. The benefit profile provides a tool for U.S. healthcare executives who are planning to implement new strategies for accessing computer-based patient records.

Using Telehealth to Expand and Strengthen the Patient Centered Care Model for Veterans (2014)

Dan Koperski, information technology specialist, Pathways

The purpose of this annotated bibliography is to suggest ways in which the VA could expand and strengthen patient centered care to rural and urban patient populations through better utilization of the Telehealth program delivery options.

Download the entire Capstone research project

Utilizing Web 2.0 Collaborative Learning Tools to Enhance Computer-Supported Collaborative Learning (CSCL) and Improve the Online Learning Experience (2012)

Eric J. Herr, web services manager, VTM Group

This annotated bibliography demonstrates that Web 2.0 tools (wikis and blogs) support a paradigm shift in asynchronous online education from instructor-driven to learner-driven knowledge sharing. Designers of computer-supported collaborative learning (CSCL) environments must work with instructors to build learning management systems in which students participate in the learning process. Consistent and positive interaction between learners and instructors motivates performance through a sense of community, social interaction and recognition, and is a strong predictor of success.

Download the entire Capstone research project


Value of the IT Division in Merger and Acquisition Process, The (2011)

Michael Blandford, IT mergers and acquisitions program manager, Intel Corporation

CIOs are often required to develop and implement merger and acquisition strategies to produce revenue and growth (Battey, 2000). Literature published between 1986 and 2011 is examined to identify the growing role of IT in the merger and acquisition process as a means of decreasing risk and project costs, and increasing corporate synergies and project success. The goal is to demonstrate the value of IT as part of the early core deal-making team.

The Value of Transitioning to a Cloud-based Phone Platform for an SME (2019)

Christopher Schwartz, information technology manager, Cayuse Shared Services, LLC

This study assists in understanding the value of transitioning to a cloud-based phone solution for an SME. The target audience is SME leaders and their IT stakeholders seeking innovative technology solutions rather than on-premise PBX telephony systems. The sources are limited to publications between 2009 and 2019, focusing on cloud-based environments and UCaaS systems. The study is significant in addressing the value of a CBP over a PBX solution that can support an SME.

Download the entire Capstone research project

Vanilla ERP Systems: Factors to Consider in Strategy, Business Alignment, and Customization, Implementing (2011)

Janice Yick, field manager, BC Hydro

This annotated bibliography examines 30 references to identify factors to consider when implementing a vanilla enterprise resource planning (ERP) system. Literature published since 1998 reveals that there is a high cost in maintaining customized ERP systems, thus companies are deliberately implementing vanilla ERP software. Factors include the need to address strategic and cost implications, organizational adaptation to ERP functionality, deploying strategies to minimize customizations, change management, cross-functional implementation teams, coordination mechanisms, and clear performance measurements.

Voting Systems in the United States: An Examination of Histories, Degree of Use and Performance Characteristics (2002)

Lori Ruttledge

Elections in the United States are conducted with widely varied voting systems. The purpose of this study is to better understand each system and to suggest potential changes. A review and content analysis of selected literature published between March 1982 and April 2002 identifies 11 specific voting methods and examines their history, degree of use, and performance characteristics. An annotated taxonomy of systems is presented for use by election officials and the general voting public.

The author of this study is a co-recipient of the 2002 AIM Director's Distinguished Capstone Award.


WAN Capable Replication Technologies for Disaster Recovery Planning in Mid-Sized Organizations: A Guide for IS Managers, Selecting (2006)

Jacob Klearman, network administrator, WestStar Bank

Large scale disasters highlight the need to protect and quickly restore mission critical data. A conceptual analysis of articles published from 1999 to 2006 forms the basis for a decision support tool, designed for IS managers of medium sized enterprises, who need to understand asynchronous WAN replication options. The tool, to be used during business continuity planning, explores the pros, cons, functionality and cost of replication technologies including: file, snapshot, CDP, Block and Byte replication.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Download the entire Capstone research project

Wayfinding in a Hospital Setting, Best Practices for (2017)

Jerrod Potter, Clinical Informaticist, Salem Health

Wayfinding within healthcare facilities has been a task for designers for many decades, but with a low priority. In recent years, the discipline has become recognized as a viable option for hospital executives and administrators as a means to cost-savings. The implementation of signage consisting of symbols and pictograms leads to better patient outcomes and increased staff satisfaction. This annotated bibliography provides best practices for implementing wayfinding in a hospital setting.

Ways in which the North American PCS Network is Prepared to Support Mobile Digital Devices, A Study of the

Russell Mickler

Mobile digital devices are rapidly being deployed by major United States organizations in effort to keep pace with emerging wireless technologies. This study identifies how the North American wireless PCS (personal communications system) network supports mobile computing in terms of three criteria: business infrastructure, application development, and security. Data for this study was collected from industry literature dated January 1996 to May 2000. Results are presented as factors affecting implementation, based on the three criteria.

Web 2.0 Technologies and How They Increase Participation and Transparency in Government, A Review of (2010)

Brad Crawford, IT director, City of Sherwood

Web 2.0 has revolutionized the way individuals communicate, participate, and engage information. Governments have been slow to adopt Web 2.0 technologies, while at the same time are criticized for a lack of participation and transparency. Literature from 1999 to 2010 is reviewed to provide examples of how technologies such as blogs, mashups, social networking, and wikis can be used to create citizen-focused services that support better decision making, access to collective intelligence, and improved citizen orientation.

Download the entire Capstone research project

Web-based Customer Support Systems: A Model for Development, Evaluation and Usability Testing (1996)

Shaun Simpson

Many companies are establishing sites on the World Wide Web. In their speed to enter the Internet arena, companies often fail to test and evaluate web-based systems. Without proper testing and evaluation, a website may not serve customers or accomplish company goals. Current methods of website design are examined. A model is presented for effective, development, evaluation, and testing of web-based customer support systems. An examination of development of a website is used to illustrate the model. Customers at this website are surveyed to improve the model and suggest areas for possible future studies.

Web-based Instruction: A Research Review on Color, Typography, Layout, and Screen Density, Designing (2002)

Michael Geraci

The visual design of web-based instruction has been positively correlated to enhanced student performance. This study presents recommendations gathered from 30 selected references published between 1992 and 2002 that address the use of color, typography, layout, and screen density to improve the visual design of online instructional materials. An annotated bibliography of 12 key resources and seven matrices that organize final recommendations, can be used by instructors to guide the effective design of web-based instruction.

The author of this study is a corecipient of the 2002 AIM Director's Distinguished Capstone Award.

Web-based Tools Used to Support the Developing Field of Online Therapy, An Inventory of

Pamela Merkel, managing member of LLC, Bayside Virtual Treatment Center

This study provides a descriptive inventory of web-based tools used in the online delivery of psychotherapeutic services. Growth in the field of online therapy means greater opportunity for the professional therapist in offering online psychotherapy services. Tools, in order of popularity, include websites, e-mail, Internet relay chat, instant messaging, forum and bulletin boards, video conferencing and webcams, virtual reality software, and text messaging. Tools are used to treat anxiety disorder, mood disorder, and personality disorder.

Download the entire Capstone research project

Web Conferencing and Enterprise Information Portal Functions in Support of the Four Modes of Knowledge Conversion (2005)

Christine Jarrell, research coordinator, CNET Networks

The purpose of this study is to explore ways that web conferencing and enterprise information portals, two collaborative technologies, support the four modes of knowledge conversion described by Takeuchi and Nonaka (2004). Modes include socialization, externalization, internalization, and combination. Content analysis is conducted on selected literature published between January 2004 and December 2004. Outcomes are intended for use in organizations seeking to improve knowledge sharing, with the goal to leverage information into knowledge.

Website Information Architecture, Criteria for Creating (2002)

Mike Fiegenbaum

A review of 20 selected resources published between January 1991 and December 2001 identifies criteria that can be used as a guideline for designing information architecture for a website. Criteria address: 1) organization, 2) navigation, 3) user needs, and 4) enterprise process. Website managers and designers can use these criteria, presented in the form of a checklist, to examine information beyond technical requirements that includes the needs and interests of site users.

Website Usability Testing, The Importance of (2012)

Julie Rinder, senior writer, Fiserv

This scholarly annotated bibliography examines literature that investigates website usability testing. Thirty-one references consisting of peer-reviewed articles, conference proceedings, and books are reviewed. Ten usability testing categories are identified across selected testing methods including: content relevance, ease of use and decision making, graphics, interactivity between the site and the user, interface design, links, navigation/menus, page layout/text formatting, search tools, and technical performance. Most frequently listed categories address (a) navigation, (b) search features, and (c) content.

Download the entire Capstone research project

When Private Entities Use Video Surveillance in Public Space: Personal Benefits vs. Privacy Infringements (2006)

Michael Lasher, chief operations officer, Umatilla-Morrow Education Service District

This study examines the most common video surveillance applications currently used by private entities in public spaces. Through literature review and content analysis (Leedy and Ormrod, 2005) the paper examines: monitoring, facial recognition, inclusion of video in larger databases, tracking, and security applications (Davis, 2005). Purported benefits of these technologies are aligned with potential privacy intrusions. A personal decision tool provides readers with a process to evaluate their own feelings about video surveillance and privacy.

Download the entire Capstone research project

Wireless Local Area Network Security: A Study of Available Controls for HIPAA Compliance (2003)

Gary Mayer, technology architect, The Regence Group

Security controls that comply with HIPAA security and privacy rules are available to mitigate the risks of Wireless Local Area Networks (WLAN). Controls are classified according to effectiveness in meeting HIPAA requirements. Content analysis on selected literature published from 2002 to 2004 was done to identify threats, vulnerabilities, and controls that affect the security and privacy of information transmitted on WLAN systems. Effective controls are discussed and a recommendation is made to enable HIPAA compliance.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Wireless Local Area Network Security Protocols: Compliance with the IEEE 802.lli Standard (2005)

Bob Reilly, manager of network technology, Federated Systems Group

As government regulations become more stringent, corporate responsibility to ensure data privacy increases. This study analyzes selected literature published between 1997 and 2005 to provide an analysis of wireless local area network security protocols based on compliance with criteria in the IEEE 802.lli standard. Capabilities, vulnerabilities, and components are compared to help IT executives form corporate security policy. Three protocols examined are Wired Equivalent Privacy, Wi-Fi Protected Access and Extensible Authentication Protocol-Transport Layer Security.

The author of this study is a recipient of the AIM Director's Distinguished Capstone Award.

Workflow through the Application of Process Analysis and Mapping Methodologies, A Study of

Jim Munson

This study provides a basic definition of workflow and its relation to business process re-engineering and electronic documents. A literature review of academic and business publications limited to material published since 1995 provided the basis of the study. The study presents an outline for performing a workflow project using work process analysis through examination and mapping. The application of the workflow project outline is demonstrated through the presentation of an example project.

Workplace Toxic Online Disinhibition: Causes and Effects (2015)

Shawn Piper, mobile designer 3, eBay Mobile

Although the prevalence of information and communication has enabled collaboration within geographically distributed organizations, the prevalence of toxic online disinhibition within these new technologies also poses novel intrapersonal problems to front line managers and people leaders. This annotated bibliography consists of peer reviewed literature published between 2005 and 2015. Literature has been selected and reviewed with the intent of exploring the causes and repercussions of toxic online disinhibition in the workplace.


Year 2000: The "Millennium Bug" (1996)

Rebecca Langdon

The Year 2000 date problem presents unique challenges to many large organizations as it affects nearly every aspect of the enterprise. Formal project management will play a key role in the successful implementation of plans to support the correct processing of date fields after the turn of the century. Based on a survey of 32 organizations, this research examines their project management methodology for repairing systems in preparation of the Year 2000. A project management model is presented to identify tasks and resources necessary to accomplish one module, mainframe applications, of a comprehensive Year 2000 project.