Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Business

Effects Of Internet Exclusion On The City Of Detroit, Alexander G. Haddad May 2022

Effects Of Internet Exclusion On The City Of Detroit, Alexander G. Haddad

Honors College Theses

Introduction

The rise of Information Technology (IT) in the past 50 years has revolutionized many areas of human life and activity. Information Technology’s most obvious areas of impact are often those where they add a great and obvious value to a particular industry, and it is extremely difficult to find some aspect of life that has not changed since its inception. Some examples include the digitization of stock trading, the automation of factories and life-saving operations, and the enhanced communication and collaboration across public education, enterprise activity, and international affairs. However, what is often overlooked and understudied are the secondary …


Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates Jan 2020

Measuring And Unpacking Affective Polarization On Twitter: The Role Of Party And Gender In The 2018 Senate Races, Kevin Mentzer, Kate Fallon, Janet Prichard, David Yates

Information Systems and Analytics Department Faculty Journal Articles

This study examines how the Twittersphere talked about candidates running for the U.S senate in the 2018 congressional elections. We classify Twitter users as Liberal or Conservative to better understand how the two groups use social media during a major national political election. Using tweet sentiment, we assess how the Twittersphere felt about in-group party versus out-group party candidates. When we further break these findings down based on the candidates’ gender, we find that male senatorial candidates were talked about more positively than female candidates. We also find that Conservatives talked more positively about female Republican candidates than they did …


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer Jan 2019

Blockchain Technology And The Current Discussion On Fraud, Linh Phan, Suhong Li, Kevin Mentzer

Information Systems and Analytics Department Faculty Journal Articles

Blockchain has received increased attention from both the academic and practitioner worlds. Numerous papers have been written on how blockchain works and its potential applications. However, few studies have focused on fraudulent activities on blockchain. The purpose of this study is to understand common issues and scams related to blockchain. A literature review was conducted to identify top security issues on blockchain. In addition, we collected tweets on blockchain fraud discussion from November 6, 2018 to December 31, 2008. The results of tweets analysis show that the most frequently mentioned words in tweets include scams, crypto/cryptocurrency, ICO, Bitcoin, Ethereum,combat/fight, Asia, …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Information Privacy: Understanding How Firms Behave Online, Gerald Kane, Kathy Schwaig, Veda Storey May 2014

Information Privacy: Understanding How Firms Behave Online, Gerald Kane, Kathy Schwaig, Veda Storey

Kathy S Schwaig

The acquisition and use of personal information by large corporations continues to be a leading issue in the age of virtual communication and collaboration. This research reviews and analyzes the privacy policies of large US companies to evaluate the substance and quality of their stated information practices. Six factors are identified that indicate the extent to which a firm is dependent upon consumer personal information, and therefore, more likely to develop high quality privacy statements. The study’s findings provide practical and theoretical implications for information privacy issues, particularly for consumers who need to decide whether to disclose their personal identifying …


Privacy, Fair Information Practices And The Fortune 500: The Virtual Reality Of Compliance, Kathy Schwaig, Gerald Kane, Veda Storey May 2014

Privacy, Fair Information Practices And The Fortune 500: The Virtual Reality Of Compliance, Kathy Schwaig, Gerald Kane, Veda Storey

Kathy S Schwaig

Corporate information privacy policies are receiving increased attention in the information privacy debate. Prior studies used Web surveys to analyze the content of online information privacy policies and to assess whether or not the policies comply with a standard known as the Fair Information Practices. One assumption of these studies is that the main role of a privacy policy is to protect the consumer by communicating a firm's information practices. This paper employs Habermas's Theory of Communicative Action to uncover the much more complex and multifaceted roles that privacy policies actually play in a social context. Overall, the study's findings …


It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord May 2014

It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord

Herbert J. Mattord

This paper presents the results of a case study pertaining to the use of information and communication media to support a range of project management tasks. A variety of electronic communication tools have evolved to support collaborative work and virtual teams. Few of these tools have focused specifically on the needs of project managers. In an effort to learn how practicing IT project managers employ these tools, data were collected at a North American Fortune 500 industrial company via interviews with IT project managers regarding their use and perceptions of electronic media within the context of their work on project …


Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb Jan 2013

Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb

G. Kent Webb

An ongoing project to investigate the use of the internet as an information source for decision support identified the decline of the California deer population as a significant issue. Using Google Alerts, an automated keyword search tool, text and numerical data were collected from a daily internet search and categorized by region and topic to allow for identification of information trends. This simple data mining approach determined that California is one of only four states that do not currently report total, finalized deer harvest (kill) data online and that it is the only state that has reduced the amount of …


Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb Jan 2013

Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb

Faculty Publications, Information Systems & Technology

An ongoing project to investigate the use of the internet as an information source for decision support identified the decline of the California deer population as a significant issue. Using Google Alerts, an automated keyword search tool, text and numerical data were collected from a daily internet search and categorized by region and topic to allow for identification of information trends. This simple data mining approach determined that California is one of only four states that do not currently report total, finalized deer harvest (kill) data online and that it is the only state that has reduced the amount of …


From Dog Licenses To Democracy: Local Government Approcahes To Eservice Delivery In Australia, Peter Shackleton, Julie Fisher, Linda Dawson Mar 2012

From Dog Licenses To Democracy: Local Government Approcahes To Eservice Delivery In Australia, Peter Shackleton, Julie Fisher, Linda Dawson

Associate Professor Linda Dawson

Municipal councils worldwide are recognizing the need and value of the Internet to deliver information and services. The move to e-Government in Australia and across the world has been prompted by factors such as government reform and the need to reduce cost, and to improve the efficiency and effectiveness of service delivery. Only recently, however, have there been more significant moves towards local e-Government in many countries. This research paper reports on the progress local governments in Victoria, Australia have made towards e-Government implementation. The paper provides a background to types of electronic information and services provided by local government …


Town Hall Egovernment: A Study Of Local Government Electronic Service Delivery, Peter Shackleton, Julie Fisher, Linda Dawson Mar 2012

Town Hall Egovernment: A Study Of Local Government Electronic Service Delivery, Peter Shackleton, Julie Fisher, Linda Dawson

Associate Professor Linda Dawson

Australian municipal councils recognize the need to use the Internet to deliver information and services. The move to eGovernment has been prompted both by local government reform and pressure from controlling State governments. Only recently, however, have there been more significant moves towards local eGovernment. This research paper reports on the progress local governments in Victoria, have made towards electronic service delivery. The paper provides a background to types of electronic information and services provided by local government and the stages of electronic maturity. The research found that although the web sites of Victorian municipal councils provide far more information …


Victorian Local Government Websites: Tracking Information Provision And E-Service Maturity, Peter Shackleton, Julie Fisher, Linda Dawson Mar 2012

Victorian Local Government Websites: Tracking Information Provision And E-Service Maturity, Peter Shackleton, Julie Fisher, Linda Dawson

Associate Professor Linda Dawson

Local and municipal governments worldwide are embracing and using the Internet to deliver services and therefore better value to their communities. Current research has identified the use made of the Internet by higher levels of government. There has been limited research, however, examining the lowest tier; local government’s approach to Internet use. This paper presents the results of a content analysis undertaken on Victorian local government Websites over four years and describes the results of usability testing also conducted on local government sites. The results identify the changes in e-service delivery over that time and the usefulness of the information …


Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert Dec 2010

Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert

William A. Herbert

The popularity of email, blogging and social networking raises important issues for employers, employees and labor unions. This article will explore contemporary workplace issues resulting from the related social phenomena of electronic exhibitionism and voyeurism. It will begin with a discussion of the international social phenomenon of individuals electronically distributing their personal thoughts, opinions, and activities to a potential worldwide audience while at the same time retaining a subjective sense of privacy. The temptation toward such exhibitionism has been substantially enhanced by the advent of Web 2.0. The article then turns to the legal implications of electronic voyeurism including employer …


Statistical Analysis Of Vodsl Technology For The Efficiency Of Listening Quality Of 640k/640k, Sarhan M. Musa, Mostafa A. El-Aasser Jan 2010

Statistical Analysis Of Vodsl Technology For The Efficiency Of Listening Quality Of 640k/640k, Sarhan M. Musa, Mostafa A. El-Aasser

Journal of International Technology and Information Management

Next-generation Internet technology will offer high performance and high capacity traffic aggregation and scalability. Voice over Digital Subscriber Line (VoDSL) technology allows service providers to offer multiple telephone lines over a single subscriber line in addition to high speed data transmission services. This article provides a baseline test for the Listening Quality (LQ) using VoDSL access technology by using Voice/Listening Quality (V/LQ) transmission with voice compression while countinously downloading files. The result will be to enable the efficiency of the LQ and its statistical analysis based on a Digital Subscriber Line (DSL) service at level 640K/640K for each American National …


Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla Dec 2009

Information Retrieval Using The Constructivist's Approach To Get The Most Out Of The Internet, Ishani Shukla

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The constructivist's theory and its application to information retrieval from the Internet was reviewed. The main aim of the study was to devise and test an approach with which the most relevant information could be easily and efficiently extracted from the Internet. The impact of a judicious choice of the keywords to retrieve information, according to the particular approach to be implemented as well as the importance of speed reading as an additional technique to improve information retrieval, was compared and critically analyzed. The study was based on information retrieval from www.google.com and www.images.google.com and focused on real-life examples and …


Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger Jan 2009

Understanding Consumers' Acceptance Of Online Purchasing, D. Amoroso, S. Hunsinger

Faculty and Research Publications

This paper examines previous Technology Acceptance Model (TAM)-related studies in order to provide an expanded model that explains consumers’ acceptance of online purchasing. Our model provides extensions to the original TAM by including constructs such as social influence and voluntariness; it also examines the impact of external variables including trust, privacy, risk, and e-loyalty. We surveyed consumers in the United States and Australia. Our findings suggest that our expanded model serves as a very good predictor of consumers’ online purchasing behaviors. The linear regression model shows a respectable amount of variance for Behavioral Intention (R2 = .627). Suggestions are provided …


Factors And Impacts Of Low Utilization Of Internet: The Case Of Arab Countries, Ali F. Emdad, Muhammed Badamas, Samar Mouakket Jan 2009

Factors And Impacts Of Low Utilization Of Internet: The Case Of Arab Countries, Ali F. Emdad, Muhammed Badamas, Samar Mouakket

Journal of International Technology and Information Management

The Arab countries are greatly behind in terms of their levels of Internet usage. The Arab countries are under pressures to adopt and promote digital transformation. Data in Arab countries are hard to get, resulting in paucity of understanding the factors that affect the use of Internet in Arab countries. This paper combines research from academic and major international organizational literature to examine and synthesize the current use of Internet in Arab Countries. The obstacles and the factors that affect the use and growth of Internet are language, government policies, culture, cost and technology. They are discussed with their impacts.


Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman Jan 2009

Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman

Journal of International Technology and Information Management

Usability on Web sites is critical because almost no training is provided for users on commercial sites. Instead, Web design relies on standards and consistency across sites. Traditional usability results indicated that computer forms should follow paper-based forms. Yet, Web paradigms have evolved that are quite different from paper-based forms. Specifically, this study reveals that users commit fewer errors and prefer simple forms limited to a single concept per screen. This conclusion significantly alters the recommendations for designing business forms.


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


The Readiness For And Current Status Of E-Government In China, Yue Zhang, Zhiyang Lin, Quan Lin, Chang-Tseh Hsieh Jan 2008

The Readiness For And Current Status Of E-Government In China, Yue Zhang, Zhiyang Lin, Quan Lin, Chang-Tseh Hsieh

Journal of International Technology and Information Management

E-government is important for China’s economic and social development. A measurement is developed and applied to assess the readiness of local Chinese governments for e-government. E-government development status of local Chinese governments is assessed through evaluation of their websites. Relationships between e-government readiness and the actual progress on e-government are discussed.


A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton Jan 2008

A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton

Articles

In June of 2007, the United States District Court for the Northern District of Ohio ruled on a motion to dismiss various claims against the Youtube video-sharing service. The claimant was Universal Tube and Rollform Equipment Corp ("Universal"), a manufacturer of pipes and tubing products. Since 1996, Universal has used the domain name utube.com - phonetically the same as Youtube's domain name, youtube.com. Youtube.com was registered in 2005 and gained almost-immediate popularity as a video-sharing website. As a result, Universal experienced excessive web traffic by Internet users looking for youtube.com and mistakenly typing utube.com into their web browsers. Universal's servers …


User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu Jun 2007

User Acceptance Of E-Commerce Technology: A Meta-Analytic Comparison Of Competing Models, Ali Yayla, Qing Hu

Qing Hu

The Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) are widely used in the information systems (IS) literature to explain and predict user technology acceptance behavior. Although these models have been utilized separately in the earlier studies, to increase the richness and predictive power of their studies, scholars have combined both theories in more recent studies. However, few studies have compared these models directly using the same empirical data. The justification for using various hybrid models is mostly anecdotal and convenient rather than based on strong theoretical arguments. Thus the question remains: when studying user technology acceptance behavior, …


Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci Jan 2007

Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci

Journal of International Technology and Information Management

The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen Jan 2007

An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen

Journal of International Technology and Information Management

The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.