Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu Jan 2016

Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu

Journal of International Technology and Information Management

We designed and built a roommate matching website, exclusively for students, which allow students to have a central point in which they can meet credible roommate candidates, search for verified housing, and easily reach out to these individuals to further their relationship, and eventually share living space. Our website aims to allow a user to search for compatible roommates not just by living habits, but by tying in the personality of candidates in reference to their own personality type. This type of personality matching in conjunction with a standard behavioral survey is the basis of the algorithm used for roommate …


Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro Jan 2016

Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro

Journal of International Technology and Information Management

Learning quality enhancement with Web 2.0 tools needs good implementation framework and lessons from best practice. However, there is not much research on what constitutes best practice in the implementation of Web 2.0 in learning activities. This research seeks to fill this gap by seeking the views of students and lecturers on increased adoption of Web 2.0 social tools in learning activities. The research reports on the quantitative and qualitative study carried out in UK. This research reveals that improved learning experience with the use of Web 2.0 tools in higher education is positively related to perceived usefulness, perceived ease …


Online Trust Cues: Perceptions And Application, Antonina A. Bauman Jan 2016

Online Trust Cues: Perceptions And Application, Antonina A. Bauman

Journal of International Technology and Information Management

This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …