Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Social media (2)
- Adoption (1)
- Apps (1)
- Breaches (1)
- Cloud computing (1)
-
- Communication (1)
- Continuance (1)
- Continuance intention (1)
- Convergence (1)
- Expert predictions (1)
- Exploits (1)
- Gender gap (1)
- History of technology (1)
- Internet (1)
- Israel (1)
- MHealth (1)
- Mobile devices (1)
- Mobile-Money (1)
- Network Security (1)
- Privacy (1)
- Privacy Policies (1)
- Risks (1)
- Security. (1)
- Smartphones (1)
- Social technologies (1)
- TAM (1)
- Tanzania (1)
- Threats (1)
- Vulnerabilities (1)
- Web 2.0 (1)
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Journal of International Technology and Information Management
Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
Journal of International Technology and Information Management
There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Journal of International Technology and Information Management
Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …
Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari
Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari
Journal of International Technology and Information Management
This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …