Search results
1 – 10 of 14Katherine LaMonaca, Mayur Desai, John P. May, Evan Lyon and Frederick L. Altice
Little is known about the health status of prisoners in low-income countries. In Haiti, prisons typically lack adequate medical care, clean water and food, though some prisoners…
Abstract
Purpose
Little is known about the health status of prisoners in low-income countries. In Haiti, prisons typically lack adequate medical care, clean water and food, though some prisoners receive additional food from visitors. The purpose of this paper is to characterize the physical and mental health of Haitian prisoners in three select prisons and examine the effects of having visitors and length of detention on health status. The authors hypothesized that prisoners with more visitors and shorter detention times would have better overall health status.
Design/methodology/approach
The authors conducted a cross-sectional study of 290 male inmates in three regional prisons in Haiti. Data were collected on prisoners’ sociodemographic characteristics, number of visitors, length of detention, body mass index (BMI), self-reported physical and mental health status, and food insecurity.
Findings
Overall, prisoners at all three prisons had poor health outcomes. Prisoners with more visitors were significantly less likely to be underweight and more likely to have a higher BMI, better self-reported physical function and lower levels of food insecurity. The length of incarceration was negatively associated with physical function and self-rated health, but positively associated with BMI. These results suggest that prisoners who do not receive supplemental food from visitors are at increased risk for food insecurity and poor nutritional and physical health status.
Originality/value
These findings demonstrate the importance of supplemental food from visitors in stabilizing prisoner health in Haiti and emphasize the need for the provision of adequate nutrition to all prisoners. This study also suggests that policies that reduce incarceration times could improve health status among prisoners.
Details
Keywords
Mayur S. Desai and Ronald A. Johnson
– The purpose of this paper is to propose a framework that serves as a guide to develop a curriculum and instructional strategy that is systems oriented and student-centric.
Abstract
Purpose
The purpose of this paper is to propose a framework that serves as a guide to develop a curriculum and instructional strategy that is systems oriented and student-centric.
Design/methodology/approach
The framework is based on the theories in the field of education by prominent researchers. The framework is divided into four sub-systems, input, process, output, and feedback. While the input, process, and output sections discuss basic elements critical in students’ learning, the feedback section suggests how the learning environment can be controlled and corrected based on student learning outcomes.
Findings
The paper presents a framework for the student to graduate transformation process in institutions of higher education based on fundamental premise that this process is an ecosystem consisting of several interlinked and interacting sub-systems. A key driver of the transformation process should be a feasible set of expected competencies that the global market place for talent expects of college graduates. These market-valued competencies can be used to define the success of the curriculum, course design, and instructional techniques and determine the sufficiency of the resource allocation by the institution of higher education to specific academic and supporting programs.
Originality/value
The framework that is based on integration of well-grounded theories in the field of education. Thus it adds value to the development of curriculum that is needed by the education institutions to excel and compete in the global and dynamic academic environment.
Details
Keywords
Mayur S. Desai and Thomas J. von der Embse
The paper addresses the contemporary and very important area of electronic information (EI) management – the ethical dimension and implications. Specifically, this paper aims to…
Abstract
Purpose
The paper addresses the contemporary and very important area of electronic information (EI) management – the ethical dimension and implications. Specifically, this paper aims to analyze EI activities and management practices, the ethical dilemmas and implications; to relate effectiveness in EI ethics activities in the context of organizational ethics policy and practice, and to suggest a framework for handling ethical dilemmas in managing the major EI activities.
Design/methodology/approach
A survey of mid‐ and first‐level managers in six industries was conducted. Subjects were asked to describe organization practices in 11 areas of ethics policy application. Respondent firms were compared according to high and low numbers of ethical safeguards: an ethics code, a credo or values statement, written ethics policies – general and specific, ethics training and development, ready access to ethics guidelines at all levels, and a cohesive, supportive ethical culture.
Findings
EI ethics need to be addressed in the context of the organization's policies and practices. This extends to specific EI activities as well, where the ramifications of misbehavior – or upright behavior – are magnified.
Practical implications
The organization that invests in ethics safeguards provides the needed supports and reaps substantial returns in employee morale, performance and ultimately, the bottom line – profits. In this area of EI management, the atmosphere of trust that results lightens the burden for all involved.
Originality/value
This research has a value that is relevant to the current issues related to the privacy and security of information.
Details
Keywords
Thomas J. von der Embse, Mayur S. Desai and Seema Desai
Assesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the…
Abstract
Assesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the principal factors that determined the level of consonance between stated ethical policies and values, and their actual practice. Supports and extends previous observations that simply having ethical codes and policies does not guarantee ethical practices throughout the organization. To become a genuinely ethical organization – an important success factor in today's environment – a comprehensive approach and investment in ethical safeguards is needed and should be regarded as a dimension of decision making alongside quality standards, performance, profitability and other strategic considerations.
Details
Keywords
Mayur S. Desai, Thomas C. Richards and Kiran J. Desai
The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the…
Abstract
The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the guarantees of privacy when using e‐commerce and the Internet. Some companies collect marketing information on consumers’ Internet habits without their knowledge or consent. This study looks at stated policies appearing on the Web sites of a number of major e‐commerce companies regarding Internet privacy. This was accomplished by the examination of information related to current Internet policies posted on these firms’ Web sites. Also examined was whether these policies have been changed over a three‐year time period. Five policy categories were examined over this three‐year period using a consistent rating scale. These categories were privacy, returns, shipping, warranty, and security.
Details
Keywords
Mayur S. Desai, Kiran J. Desai and Lucy Ojode
This paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The…
Abstract
This paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The paper develops a global information technology model by drawing from consulting experience and the relevant literature. The bases for the model are – a firm's environment, level of technological diffusion within a firm, and prospective technology applications based on the existing inventory of IT applications that support the firm's operations. The paper provides a description of the model dimensions and furnishes an illustrative mapping on an Indian firm and an American firm's operations.
Details
Keywords
Mayur S. Desai, Kiran J. Desai and Lonnie D. Phelps
The present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies and…
Abstract
Purpose
The present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies and whether the communication of these policies to the customer has significantly changed during a ten year period.
Design/methodology/approach
The study defines published policies of how a company operates with respect to different factors. The policies examined are privacy, security, shipping, returns, and warranty. Each of the policies described above were then rated as per the rating scale defined by the authors. The 525 e‐commerce sites studied were divided into service and product sites, respectively. The e‐commerce sites were also separated into 28 industry groups. The data were also collected on some of the other factors that were important in this study.
Findings
E‐commerce companies do not fully inform their customers. The results showed no significant relationships between the policy ratings and any of the other factors taken into account.
Research limitations/implications
The net incomes collected were the companies' entire income, not exclusively from online sales. The present study used an unbalanced sample size consisting of more product sites than service sites.
Practical implications
People doing business over internet with e‐commerce companies need to read the privacy policy carefully and should be aware of how their information will be used by the e‐commerce companies.
Originality/value
The study provides valuable information about e‐commerce companies in communicating their customer service policies and very little changes have taken place in the last ten year period.
Details
Keywords
Dmitriy V. Chulkov and Mayur S. Desai
This paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures.
Abstract
Purpose
This paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures.
Design/methodology/approach
This paper examines three published case studies, and discusses whether managerial actions are in accordance with the predictions of bandit process studies.
Findings
Bandits are a class of decision‐making problems that involve choosing one action from a set. In terms of project management, the firm selects from several alternative IT projects, each with its own distribution of risks and rewards. The firm investigates technologies one by one, and keeps only the best‐performing technology. The bandit perspective implies that managers choosing a risky IT project with high potential reward before safer ones are behaving optimally. It is in the firm's interest to resolve the uncertainty about the innovative project first. In case of failure, the firm can later choose safer technology. A high proportion of risky projects adopted leads to a high number of project failures.
Practical implications
The bandit approach supports studies that advocate evaluating decision makers on the optimality of their decision process, rather than specific outcomes.
Originality/value
This paper demonstrates how insights from the bandit problem are relevant to studies of IT project failures. Whilst choosing high‐risk, high‐reward projects may be in a firm's interest, some observed project failures are optimal choices that do not work out.
Details
Keywords
Mayur S. Desai, Thomas C. Richards and Thomas von der Embse
The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from…
Abstract
The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosing a firewall architecture, a company must have the right mind set regarding the threat. The purpose of this paper is to provide an introduction to firewall concepts and help develop this mind set.
Details
Keywords
Dmitriy V. Chulkov and Mayur S. Desai
The purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems…
Abstract
Purpose
The purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems (MIS) projects.
Design/methodology/approach
The paper compares the implications of psychological and economic escalation theories with lessons from the real option theory as applied to MIS projects. Then, it examines published case studies, and discuss when project continuation enhances and reduces value for the manager and the firm.
Findings
Escalation of commitment is continuation of an investment project after receiving negative signals. Escalation was identified as a significant problem in MIS projects often explained by the desire of the manager to avoid recognizing mistakes and to protect reputation. The opposite problem of premature termination of certain investment projects was also identified. This study argues that accurate application of real option theory is critical to distinguish between escalation and premature termination. Under the real option theory, an investment project is analogous to a financial option, in that there is an opportunity to continue the project, but no obligation. Continuation has value when there is uncertainty and new information about the project may be revealed. Failure to account for the real options in a project is value‐reducing as it may lead to mistakes in premature termination of projects when projects with real option value are labeled as cases of irrational escalation.
Practical implications
The paper details the implications of real option theory to evaluating project continuation in the MIS setting.
Originality/value
This paper applies insights from real option theory to studies of escalation in MIS. Continuing a project may be seen as escalation when it actually has value for the firm, as new information received by continuing the project reduces uncertainty.
Details