Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Business

Stakeholder Involvement In Upscaling Of Soil Fertility Research Output In Tharaka-Nithi County, Kenya, Serah W. Kimaru-Muchai Dec 2021

Stakeholder Involvement In Upscaling Of Soil Fertility Research Output In Tharaka-Nithi County, Kenya, Serah W. Kimaru-Muchai

Journal of Global Awareness

Food insecurity in Sub-Saharan Africa has prompted a lot of research in the development of soil fertility technologies; however, few of the recommendations from soil fertility management research have been put into use by the target end-users. The objective of the study was to investigate information exchange pathways used by researchers in upscaling of soil fertility in Maara and Mbeere South Sub-counties in Kenya. Structured questionnaires were used to collect information from 22 researchers and 240 farmers. Data was analyzed using descriptive statistics like frequency, mean, and percentages, while Chi-square, Kendal's correlation coefficient was used to test the magnitude of …


A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil Jan 2021

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil

Engineering Management & Systems Engineering Faculty Publications

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl Apr 2020

Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl

Engineering Management & Systems Engineering Projects for D. Eng. Degree

The scope of this doctoral project is the non-traditional application of Drum-Buffer-Rope (DBR) from the area of Theory of Constraints (ToC) in mitigating disruption in distribution facilities during phased upgrades caused by information constraint. The relevance of this project is that industrial equipment upgrades pose a significant risk of disrupting the operation of automated distribution facilities. It is partly due to a very high expected availability rate, as well as tight coupling with other upstream and downstream elements of the larger supply chain network. As a consequence of disruption in this scenario, losses incurred not only within the facility being …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Jan 2013

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Neutrosophic Emergencies And Incidences, Florentin Smarandache, Stefan Vladutescu Jan 2013

Neutrosophic Emergencies And Incidences, Florentin Smarandache, Stefan Vladutescu

Branch Mathematics and Statistics Faculty and Staff Publications

No abstract provided.


Effective Virtual Teams For New Product Development, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha Jun 2012

Effective Virtual Teams For New Product Development, Nader Ale Ebrahim, Shamsuddin Ahmed, Salwa Hanim Abdul Rashid, Zahari Taha

Nader Ale Ebrahim

At present, the existing literature shows that the factors which influence the effectiveness of virtual teams for new product development are still ambiguous. To address this problem, a research design was developed, which includes detailed literature review, preliminary model and field survey. From literature review, the factors which influence the effectiveness of virtual teams are identified and these factors are modified using a field survey. The relationship between knowledge workers (people), process and technology in virtual teams is explored in this study. The results of the study suggest that technology and process are tightly correlated and need to be considered …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih Jan 2009

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih

Journal of International Technology and Information Management

Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


Information View Of Organization, Bob Travica Jan 2005

Information View Of Organization, Bob Travica

Journal of International Technology and Information Management

This article proposes an information view of organization that brings the information systems field closer to organization theory. Although voluminous bodies of literature have been developed within each of these disciplines and links between them do exist, their mutual informing is still insufficient. The proposed view of organization is intended to help convey results of information systems research to organizational scholars, while broadening theoretical horizons of the former. This article discusses the premises, conceptual framework, examples, and preliminary evidence of the information view of organization.


The Impacts Of Conflicts On Requirements Uncertainty And Project Performance, Houn-Gee Chen, James J. Jiang, Jun-Cheng Chen, J T. Shim Jan 2004

The Impacts Of Conflicts On Requirements Uncertainty And Project Performance, Houn-Gee Chen, James J. Jiang, Jun-Cheng Chen, J T. Shim

Journal of International Technology and Information Management

Conflict is a pervasive phenomenon that permeates information systems development and implementation. The literature has indicated that conflicts, due to their association with negative emotion, will negatively influence IS project development, even after controlling for the effects of conflict management and resolution; however, the negative emotional characteristic of conflict alone has a limited explanatory power of IS project success. The purpose of this study is to provide additional insight, by including requirement uncertainty as the mediator variable, of the impacts of conflicts on project performance. Surveys were sent to Taiwan’s top 1600 companies and the results support the hypotheses. The …


The Demand For Information Technology Knowledge And Skills: An Exploratory Investigation, Stuart D. Galup, Ronald Dattero, Jim J. Quan Jan 2004

The Demand For Information Technology Knowledge And Skills: An Exploratory Investigation, Stuart D. Galup, Ronald Dattero, Jim J. Quan

Journal of International Technology and Information Management

Organizations are always in search of appropriate information technology knowledge and skills to carry out normal business operations. Such demand is directly impacted by the overall economic conditions. During stressful economic times, managers, facing tough budgetary pressure, are forced to examine more thoroughly what knowledge and skills are needed to survive. This paper investigates the desired information technology knowledge and skills that employers are searching for in these turbulent times. We examine the content of job advertisements for information technology professionals placed in an online job placement website over a 2 year period, 2001-2002.


Information Systems Service Quality Measurement: The Evolution Of The Servqual Instrument, Dwayne Whitten Jan 2004

Information Systems Service Quality Measurement: The Evolution Of The Servqual Instrument, Dwayne Whitten

Journal of International Technology and Information Management

Due to the increasing service component of information technology, service quality measurement has become increasingly important as IS practitioners attempt to increase service quality to customers. The measurement of service quality in IS evolved from the research done in the marketing literature. The SERVQUAL instrument has evolved to become the most commonly used measurement instrument in both IS and marketing. Although commonly used, the SERVQUAL instrument is not without criticism. This paper describes the SERVQUAL instrument, its criticisms and support, and finally the SERVPERF instrument, a variation of the SERVQUAL instrument which is an attempt at improving upon the SERVQUAL …


Review Of The Opnet It Guru Software, Jeng-Chung Victor Chen Jan 2004

Review Of The Opnet It Guru Software, Jeng-Chung Victor Chen

Journal of International Technology and Information Management

The OPNET IT GURU has been in existence for years and designed to be used for the industry and the academics. The simulation software is now in version 10.0 and equipped with abundant features such as: modeling network topology and traffic, application impact assessment, and server capacity planning. The features of modeling network topology and traffic are ideal for network engineers to experiment different kinds of scenarios before implementation of any networks, which in turn could cost the organizations less on the IT budget. The application impact assessment is useful when measuring the end-to-end time of the deployed or to-be-deployed …


Web-Services – The Next Evolutionary Stage Of E-Business, Santosh S. Venkatraman Jan 2004

Web-Services – The Next Evolutionary Stage Of E-Business, Santosh S. Venkatraman

Journal of International Technology and Information Management

Web-Services are a set of new technologies that promise to take “service-oriented” distributed computing to a whole new level, and eventually take e-business to the next evolutionary stage. Web-Services, in a nutshell, let organizations bridge communication gaps among their information systems, and build new software applications by “stitching” together existing ones. It is capable of integrating applications written in different programming languages, developed by different vendors, and running on different servers with dissimilar operating systems. Web- Services would enable companies to seamlessly connect their information systems and business processes with those of their partners and customers – thus ushering in …


Xml: Gateway For Data Mobility And Universal Connectivity, Emmanuel Uzoma Opara Jan 2004

Xml: Gateway For Data Mobility And Universal Connectivity, Emmanuel Uzoma Opara

Journal of International Technology and Information Management

Extensible Markup Language (XML) started as an effort to simplify the standard Generalized Markup Language (SGML), which was the International Organization for Standardization’s (ISO) standard for defining data vocabularies. This study investigates XML technology as a substitute to SGML that would be Web friendly, and easy to learn and use while supporting a variety of applications for faster and more efficient data mobility on the Web. It describes several compelling reasons why XML is a useful technology for representing structured data mobility. XML is a markup language used for data structure in a textual form. A specific goal of XML …