Refereed Journal Publications

(** denotes current or former graduate student co-author)

  1. Scheibe, K.P., Mukandwal, P.S., and Grawe, S.J. (2022). “The Effect of Transactive Memory Systems on Supply Chain Network Collaboration,” International Journal of Physical Distribution & Logistics Management, Volume 52, Issue 9/10, pp. 791-812.
  2. Park, Y.W., Blackhurst, J., **Paul, C., & Scheibe, K.P. (2021). “An Analysis of the Ripple Effect for Disruptions Occurring in Circular Flows of a Supply Chain Network,” International Journal of Production Research, Volume 60, Issue 15, pp. 4693-4711.
  3. **Paul, C., Hosack, B., & Scheibe, K.P. (2020). “A Brief History of the Midwest Association for Information Systems: 2005-2020,” Journal of the Midwest Association for Information Systems, Volume 2020, Issue 1, pp. 45-55.
  4. Scheibe, K.P., Nilakanta, S., Ragsdale, C.T., and Younie, B. (2019). “An Evidence-based Management Framework for Business Analytics,” Journal of Business Analytics, Volume 2, Issue 1, pp. 47-62.
  5. Zhao, K., Scheibe, K.P., Blackhurst, J., and Kumar, A. (2019). “Supply Chain Network Robustness against Disruptions: Topological Analysis, Measurement, and Optimization,” IEEE Transactions on Engineering Management, Volume 66, Issue 1, pp. 127-139.
  6. George, J.F., Scheibe, K.P., Townsend, A.M., and Mennecke, B. (2018). “The Amorphous Nature of Agile: No One Size Fits All,” Journal of Systems and Information Technology, Volume 20, Issue 2, pp. 241-260.
  7. Davazdahemami, B., **Luse, A., Scheibe, K.P., and Townsend, A.M. (2018). “Training, Self-Efficacy, and Performance; a Replication Study,” AIS Transactions on Replication Research, Volume 4, Article 3.
  8. Blackhurst, J., Rungtusanatham, M.J., Scheibe, K.P., **Ambulkar, S. (2018). “Supply chain vulnerability assessment: A network based visualization and clustering analysis approach,” Journal of Purchasing and Supply Management, Volume 24, Issue 1, pp. 21-30.
  9. Scheibe, K.P. and Blackhurst, J. (2017). “Supply Chain Disruption Propagation: A Systemic Risk and Normal Accident Theory Perspective,” International Journal of Production Research, Volume 56, Issue 1-2, pp. 43-59.
  10. Scheibe, K.P. and **Gupta, M. (2017). “The Effect of Socialization via Computer-Mediated Communication on the Relationship between Organizational Culture and Organizational Creativity,” Communications of the Association for Information Systems, Volume 40, Article 13.
  11. Jiang, Z, Scheibe, K.P., Nilakanta, S., and Qu, X. (2017). “The Economics of Public Beta Testing,” Decision Sciences Journal, Volume 48, Issue 1, pp. 150-175.
  12. Martens, B.J., Scheibe, K.P., and Bergey, P.K. (2012). “Supply chains in sub-Saharan Africa: A decision support system for small-scale seed entrepreneurs,” Decision Sciences Journal, Volume 43, Issue 5, pp. 737-759.
  13. Morrow, P.C., McElroy, J.C., and Scheibe, K.P. (2012). “Influencing Organizational Commitment through Office Redesign,” Journal of Vocational Behavior, Volume 81, Issue 1, pp. 99-111.
  14. Morrow, P.C., McElroy, J.C., and Scheibe, K.P. (2011). “Work unit incivility, job satisfaction, and total quality management among transportation employees,” Transportation Research, Part E, Volume 47, Issue 6, pp. 1210-1220.
  15. **Luse, A., Scheibe, K.P., and Townsend, A.M. (2009). “Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls,” Journal of Information Systems Security, Volume 5, Issue 2, pp. 26-41.
  16. Scheibe, K.P. and Ragsdale, C.T. (2009). “A Model for the Capacitated, Hop-Constrained, Per-Packet Wireless Mesh Network Design Problem,” European Journal of Operational Research, Volume 197, Issue 2, pp. 773-784.
  17. Scheibe, K.P., McElroy, J.C., and Morrow, P.C. (2009). “Object Language and Impression Management:  How to use technology and other objects to improve the IT employee image,” Communications of the ACM, Volume 53, Issue 4, pp. 129-131.
  18. Scheibe, K.P., Rees, L.P., and Rakes, T.R. (2009). “Addressing Universal-Broadband-Service Implications with Wireless Mesh Networks,” Telecommunication Systems, Volume 41, Number 1, pp. 51-64.
  19. Ragsdale, C.T., Scheibe, K.P., and Trick M.A. (2008). “Fashioning Fair Foursomes for the Fairways (Using a Spreadsheet-based DSS as the Driver),” Decision Support Systems, Volume 45, Issue 4, pp. 997-1006.
  20. **Luse, A., Townsend, A.M., and Scheibe, K.P. (2008). “Software Implementation of Hardware-Based Encryption for Secure Content Delivery,” Journal of Information Warfare, Volume 7, Issue 2, pp. 11-23.
  21. Nilakanta, S., Scheibe, K.P., and Rai, A. (2008). “Dimensional Issues in Agricultural Data Warehouse Designs,” Computers and Electronics in Agriculture, Volume 60, Issue 2, pp. 263-278.
  22. Blackhurst, J., Scheibe, K.P., and Johnson, D.J. (2008). “Supplier Risk Assessment and Monitoring for the Automotive Industry,” International Journal of Physical Distribution and Logistics Management, Volume 38, Issue 2, pp. 143-165.
  23. **Luse, A., Scheibe, K.P., and Townsend, A.M. (2008). “A Component-based Framework for Visualization of Intrusion Detection Events,” Information Systems Security, Volume 17, Issue 2, pp. 95-107.
  24. Scheibe, K.P., Mennecke, B.E., and **Luse, A. (2007). “The Role of Effective Modeling in the Development of Self-Efficacy: The Case of the Transparent Engine,” Decision Sciences Journal of Innovative Education, Volume 5, Issue 1, pp. 21-42.
  25. McElroy, J.C., Scheibe, K.P., and Morrow, P.C. (2007). “Technology as Object Language:  Revisiting Office Design,” Computers in Human Behavior, Volume 23, Issue 5, pp. 2429-2454.
  26. Scheibe, K.P., Carstensen, L.W., Rakes, T.R., and Rees, L.P. (2006). “Going the Last Mile: a Spatial Decision Support System for Wireless Broadband Communications,” Decision Support Systems, Volume 42, Issue 2, pp. 557-570.
  27. Scheibe, K.P., Mennecke, B.M., and Zobel, C. (2006). “Creating Offshore Ready IT Professionals: The Need for a Global Perspective and Strong Collaborative Skills,” Journal of Labor Research, Summer, Volume 27, Issue 3, pp. 275-290.
  28. Nilakanta, S. and Scheibe, K.P. (2005). “The Digital Persona and Trust Bank: A Privacy Management Framework,” Journal of Information Privacy and Security, Volume 1, Issue 4, pp. 3-21.