Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- E-commerce (3)
- China (2)
- Data mining (2)
- Security (2)
- Social Media (2)
-
- Agile (1)
- Analytics (1)
- Analytics Adoption (1)
- And principal component analysis (PCA) (1)
- Apple (1)
- Application Software (1)
- Area Under Curve (1)
- Assessment (1)
- Association rule (1)
- Bitcoin (1)
- Business Benefits (1)
- Business Education (1)
- Business Process Re-engineering (1)
- Business value creation (1)
- CEO turnover (1)
- Classifier (1)
- Cloud Computing (1)
- College students (1)
- Commercial-Off-The-Shelf (1)
- Consumer (1)
- Contents (1)
- Continuance motivation (1)
- Correspondence Analysis (1)
- Country Personality (1)
- Cross-validation (1)
Articles 1 - 30 of 38
Full-Text Articles in Business
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
Fitting Consumer Needs To Perceived Product Value: The Example Of Apple Versus Samsung Products, Yi-Chia Wu, Arturo Z. Vasquez-Parraga
Fitting Consumer Needs To Perceived Product Value: The Example Of Apple Versus Samsung Products, Yi-Chia Wu, Arturo Z. Vasquez-Parraga
Atlantic Marketing Journal
This study explores the fitting of consumer needs to product perceived value using the example of two lines of competitive products in the area of communication electronics, Apple products versus Samsung products. Five types of needs regarding digital communication and three types of related product value are evaluated for these two brands in order to know if product value differences have a distinctive effect on consumer needs. The results show that Apple users are more satisfied with their needs being fulfilled by Apple products than Samsung users getting satisfied with Samsung products. Moreover, Apple users emphasize the emotional value of …
Cueing The Customer Using Nudges And Negative Option Marketing, Clarence W. Vonbergen, Courtney Kernek, Martin S. Bressler, Lawrence S. Silver
Cueing The Customer Using Nudges And Negative Option Marketing, Clarence W. Vonbergen, Courtney Kernek, Martin S. Bressler, Lawrence S. Silver
Atlantic Marketing Journal
Abstract
Nudges—subtle, covert, and often unobtrusive interventions that take advantage of individuals’ mental shortcuts and biases—frequently change the context of people’s choices and in so doing influence individual and societal behavior. They have become fashionable in recent years, and the ability of such phenomena to bring about significant change for relatively little cost has captured the imagination of governments and businesses. One simple yet potent nudge empowered by the status-quo bias that has received increased attention involves default rules which specify the condition imposed on persons when they fail to make a decision or choice. Marketers have used default options …
Internet Diffusion And Adoption In Cuba, Randi L. Priluck
Internet Diffusion And Adoption In Cuba, Randi L. Priluck
Atlantic Marketing Journal
The purpose of this paper is to examine Internet adoption at a time of increasing change for the Cuban marketplace. As the Cuban economy begins to open to new business formats one key driver of economic will be access to communications networks. This paper explores the penetration of Internet connectivity in Cuba as relations with the United States thaw. The theories of diffusion of innovations, cultural dimensions of adoption and market and political realities are employed to better understand the pace of Internet adoption as the Cuban economy continues to develop.
College Students Use Social Networking Sites For Sharing With Friends, But Guess Who Else Is Looking?, Elizabeth C. Alexander, Fred Mader, Deanna Mader
College Students Use Social Networking Sites For Sharing With Friends, But Guess Who Else Is Looking?, Elizabeth C. Alexander, Fred Mader, Deanna Mader
Atlantic Marketing Journal
Abstract - Jobvite, a recruiting platform for the social web, reports from their annual 2012 survey of recruiters that 92% of U.S. companies are using social networking sites (SNS) for hiring purposes (Jobvit, 2012). Career Builder reported in 2009 that 45% of employers were using SNS to screen and research applicants (CareerBuilder, 2009). It is important that faculty and support staff working to place students, and the students themselves, understand the developments and practices in the use of social networking sites for job search and recruiting and the best methods, as well as detriments when marketing themselves. This study examines …
Using Focus Groups And Correspondence Analysis To Explore The Relationship Between Millennials’ Online Behavior And Their Opinions Of Online Reviews, James E. Stoddard, Michael Dotson, Neel Das
Using Focus Groups And Correspondence Analysis To Explore The Relationship Between Millennials’ Online Behavior And Their Opinions Of Online Reviews, James E. Stoddard, Michael Dotson, Neel Das
Atlantic Marketing Journal
This paper explores the relationship between millennials’ online behavior and their opinions of online reviews via the use of focus groups and correspondence analysis. The proposition was that millennials’ online behavior (including search behavior) is likely to have an effect on how they view online reviews. The correspondence analysis results suggest that millennials who spend more time online peruse a greater number of products. Further, relationships were found between millennials’ time online and factors influencing review trustworthiness as well as millennials’ time online and factors affecting review memorability. It is noteworthy to suggest that focus group analysis can be enhanced …
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
Journal of International Technology and Information Management
Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
Journal of International Technology and Information Management
This research studies attitude and readiness of STEM majoring and success with
the data from a survey with a total of 501 viable responses, with respect to STEM
(science, technology, engineering, and mathematics) related majors that are
essential and fundamental to skills relevant to big data business analytics.
Recruiting and keeping students in STEM areas have attracted a large body of
attention in pedagogical studies. An effective way of achieving such a goal is to
show them how rewarding and self-fulfilling STEM careers can be toward
perspective students. One example of the abundance of STEM careers is the rapid
growth …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Journal of International Technology and Information Management
The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …
Virtual Goods Markets And Economy In China: A Historic Account, Mann (Michael) Zhang
Virtual Goods Markets And Economy In China: A Historic Account, Mann (Michael) Zhang
Markets, Globalization & Development Review
Rapidly expanding virtual goods markets and virtual economy are thriving worldwide in general, and in China in particular. This paper reviews the growth of virtual goods markets in China and builds a historical narrative of the rapidly changing (or dynamic) and persistently unchanged (or relatively static) aspects of reality in China that condition virtuality and virtual goods markets. The review and historical analysis provide a perspective of a larger place – a total reality – where the virtuality and virtual goods markets exist, along with the physical aspects, and suggest that virtual goods marketers need to pay more attention to …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Journal of International Technology and Information Management
Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
Journal of International Technology and Information Management
Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Journal of International Technology and Information Management
Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …
Impact Of Country Personality On Attitude Toward Foreign Products : Self-Congruity As A Mediator, Murat Aktan, Paul W. Chao
Impact Of Country Personality On Attitude Toward Foreign Products : Self-Congruity As A Mediator, Murat Aktan, Paul W. Chao
Atlantic Marketing Journal
This research examines the direct effect of country personality (CP) on consumer product attitude and indirect effect through consumer self-congruity between CP and his/her own self-concept on product attitude in an emerging country- Turkey. We propose an integrated structural equation model to examine the relationships. Measurement scales for CP, self-congruity and attitude are developed whose validities and reliabilities are confirmed by exploratory (EFA) and confirmatory (CFA) factor analyses with data collected from a sample of consumers in Turkey on two countries: USA and China.
The results reveal that four out of the original six dimensions of CP remain after a …
E-Wom Intentions Towards Social Media Messages, Soyoung Kim, Briana Martinez, Clair Sinclair Mcclure, Soo Hyun Kim
E-Wom Intentions Towards Social Media Messages, Soyoung Kim, Briana Martinez, Clair Sinclair Mcclure, Soo Hyun Kim
Atlantic Marketing Journal
This study investigated the influence of a consumer’s online shopping motivation, attitude, and electronic word of mouth (eWOM) intention towards two social media messages while accounting for social media involvement. Using a fictitious brand and social media messages, data were collected through a snowballing technique by distributing a structured questionnaire on social media sites. It was found that a positive attitude toward task messages was influenced by both utilitarian and hedonic shopping motivations while attitude toward socioemotional messages were influenced solely by hedonic. Also, eWOM intention for both messages was influenced by attitude. Social media involvement had no moderating effect …
Engagement And The Moderating Role Of Presence Within A Video Game Experience, Stef G. Nicovich, Silvia L. Martin
Engagement And The Moderating Role Of Presence Within A Video Game Experience, Stef G. Nicovich, Silvia L. Martin
Atlantic Marketing Journal
Abstract
This study looks to explore the role presence plays in the link between narrative comprehension and engagement. To explore these relationships we will first present an overview of presence research to date, followed by an exploration of narrative engagement with an emphasis on narrative comprehension. We then test these relationships within the context of a video game experience and present results and implications for researchers.
In order to test these relationships we devised an experiment using a popular computer game. The above research questions were tested by running a moderated regression where the degree of narrative comprehension was regressed …
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Butler Journal of Undergraduate Research
The object is to investigate the relationship between consumers’ sense of security of a store and their purchasing intention from the store. This was investigated by evaluating how perceptions of security vary among pure play websites with no social presence on the one hand and with social presence on the other; and click and mortar websites with no social presence on the one hand, and social presence on the other. It was also investigated by evaluating how social presence might mitigate the risk of security perceived by consumers. The research method included a scenario given to each participant which requires …
Property Or Currency? The Tax Dilemma Behind Bitcoin, Scott A. Wiseman
Property Or Currency? The Tax Dilemma Behind Bitcoin, Scott A. Wiseman
Utah Law Review
At Bitcoin’s peak in November 2013, there were 93,000 global transactions made in a single day. These users purchased everyday items such as personal services, food, and real estate. This alone suggests that Bitcoin is not primarily used as a long-term investment tool, but rather is used as a currency and a vehicle for global transactions. Congress and the IRS should regulate it accordingly. Representative Stockman’s Virtual Currency Reform Act offered an attempt to negate the IRS decision and officially classify Bitcoin and other virtual currencies as currency instead of property. A tax reclassification would alleviate typical users’ many inconveniences …
E-Government Initiatives Case Study: New Models For Success, Douglass P. Smith
E-Government Initiatives Case Study: New Models For Success, Douglass P. Smith
International Journal of Applied Management and Technology
This case study examines the efforts of a mid-tier, cabinet-level state agency to transform its constituency services to be more effective using information technology. The agency, based in a rural Midwestern state, faced increased scrutiny to raise accuracy, lower wait times, decrease expenditures, increase constituency satisfaction, and expand services to the state. To meet these challenges, the agency conducted a series of meetings to determine best possible opportunities for change and decided that technology solutions, which supported their business vision of the future, would be the foundation for that change. Redesigning core organizational processes—using several technologies such as e-commerce, content …
Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen
Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen
Journal of International Technology and Information Management
Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …
Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu
Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu
Journal of International Technology and Information Management
We designed and built a roommate matching website, exclusively for students, which allow students to have a central point in which they can meet credible roommate candidates, search for verified housing, and easily reach out to these individuals to further their relationship, and eventually share living space. Our website aims to allow a user to search for compatible roommates not just by living habits, but by tying in the personality of candidates in reference to their own personality type. This type of personality matching in conjunction with a standard behavioral survey is the basis of the algorithm used for roommate …
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Journal of International Technology and Information Management
To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.
Choice Of Agile Methodologies In Software Development: A Vendor Perspective, Sriram Rajagopalan, Saji K. Mathew
Choice Of Agile Methodologies In Software Development: A Vendor Perspective, Sriram Rajagopalan, Saji K. Mathew
Journal of International Technology and Information Management
The purpose of this research was to develop understanding about how vendor firms make choice about agile methodologies in software projects and their fit. Two analytical frameworks were developed from extant literature and the findings were compared with real world decisions. Framework 1 showed that the choice of XP for one project was not supported by the guidelines given by the framework. The choices of SCRUM for other two projects, were partially supported. Analysis using the framework 2 showed that except one XP project, all others had sufficient project management support, limited scope for adaptability and had prominence for rules.
Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya
Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya
Journal of International Technology and Information Management
Enterprise Systems (ES) is increasingly becoming the choice of IT platform for most large organizations in the world. As a result, the potential of such systems to create more business value is of key interest to both industry and academia. The aim of this study is to identify the key means of business value creation that Enterprise Systems can enable. The contribution of this paper is that it identifies and proposes four key means by which Enterprise Systems can create business value: (a) Operational Efficiency (b) Mergers and Acquisitions, (c) Innovation (in product and process), (d) Strategic Decision Making. This …
It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig
It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig
Journal of International Technology and Information Management
The issues, opportunities and challenges of effectively managing and governing an organization’s Information Technology (IT) demands, investments and resources has become a major concern of the Board and executive management in enterprises on a global basis. A rapidly growing number of organizations have become increasingly dependent on a broad array of technologies to manage and grow their businesses. IT is an integral part of most organizations today and will certainly become more critical in the future. This paper proposes a comprehensive and integrated IT governance framework and roadmap which identifies the appropriate current and emerging best practices methodologies for each …