Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

California State University, San Bernardino

2019

Discipline
Keyword
Publication

Articles 1 - 30 of 39

Full-Text Articles in Business

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia Dec 2019

Gauging Ada Compliance In The 21st Century Business Internet: A Pilot Study, Daniel Mcdonald, Tanya Goette, Hannah Petoia

Communications of the IIMA

This paper explores issues of accessibility in Web design, including the applicability of various federal statutes such as the Americans with Disabilities Act of 1990 (ADA) and Section 508 of the Rehabilitation Act of 1973. A pilot study of six private sector websites is completed to gauge the effectiveness of current accessibility standards as interpreted from the ADA and Section 508. Evaluating these sites shows that even after 25 years, sites still have accessibility issues.


Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari Dec 2019

Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari

Communications of the IIMA

Retail industry has suffered some of the biggest data breaches in recent times. Organizations are deploying technological tools to limit data breaches. However, purely technological solution is not going to be sufficient because human-factor is often considered to be the weakest link in Information Security. In this paper, the authors investigate the behavioral aspect of information security in a retail setting. Specifically, the factors that influence compliance behaviors to information security policies (ISP) in retail stores are identified. Attitude, awareness, and sanctions are proposed as key variables that influence compliance intentions to ISP. The authors test the proposed model using …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker Sep 2019

What Do Publicly-Available Soccer Match Data Actually Tell Us?, Chester S. Labedz Jr., Robert Schumaker

Communications of the IIMA

Media analyses of soccer statistics and game play has accelerated in recent years. This is evident in visual displays of ball and player tracking, average player locations and distances they run. These media depictions aim to be attractive, entertaining and informative for viewers. But are such statistics predictive of goal scoring and match outcome? To answer this question we review the sixty-four matches of the 2014 World Cup and examine nine common match statistics, and others, to evaluate their predictive value for goal production and match outcome.


The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck Sep 2019

The Difficulty Of Transfer And Academic Engagement Of Further Education Students When Progressing To Higher Education Environments, Glenn Affleck

Communications of the IIMA

The difficulty of students transferring from Further Education Colleges and progressing to Higher Education Universities in the United Kingdom is a well-known problem. The study presented here focuses on the ability of students to begin to engage with the subject of computer programming on transferring after 2 years of study at a further education college into a 3rd year of a university programme. There is an assumption that there are environmental factors within the change that cause the problems of student engagement with their studies. The findings of this study concurs with difficulties for many students with beginning to …


Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng Sep 2019

Identifying Relationships Of Interest In Complex Environments By Using Channel Theory, Andreas Bildstein, Junkang Feng

Communications of the IIMA

Complex environments show a high degree of dynamics caused by vital interactions between objects within those environments and alterations through which the set of objects and their characteristics within those environments go over time. Within this work, we show that we can tame the level of complexity in dynamic environments by identifying relationships of interest between objects in such environments. To this end, we apply the theory of Information Flow, also known as Channel Theory, to the application area of smart manufacturing. We enhance the way how the Channel Theory has been applied so far by using an …


Residential Electricity Management And Protection System, Ejimonu Kosisochukwu Gabriel Aug 2019

Residential Electricity Management And Protection System, Ejimonu Kosisochukwu Gabriel

Journal of International Technology and Information Management

The Residential Electricity Monitoring System is an electricity meter connected to the Internet to provide real time data on the power system in your home. The REMS is designed to replace the distribution board allowing it to conduct a series of tests on the quality of the electricity supply to your home/facility and, within your home detect basic wiring faults and allow owners and service providers to identify potential problems with the electrical systems.

The electrical monitoring system finally puts proper electrical control into the hands of the home owner by providing him with the ability to control power distribution …


Determinants Of Cloud Computing Intentions To Use: Role Of Firm’S Size, Managerial Structure And Industrial Sector, Shailja Tripathi Jul 2019

Determinants Of Cloud Computing Intentions To Use: Role Of Firm’S Size, Managerial Structure And Industrial Sector, Shailja Tripathi

Journal of International Technology and Information Management

Currently many companies are adopting cloud computing to accomplish their diverse purposes and to create an elastic and responsive environment that can rapidly respond to new business requirements. This paper attempts to investigate the factors influencing cloud computing adoption from the managerial perspective with inclusion of size of firm, organizational structure and type of industry as control variables. The model is developed with various technological, economic and cognitive factors that affect the behavioral intention to use cloud computing using technology acceptance model (TAM).Questionnaires were randomly distributed to around 1000 senior managers of various firms in India. Hierarchical multiple regression (HMR) …


Table Of Contents Jitim Vol 28 Issue 2, 2019 Jul 2019

Table Of Contents Jitim Vol 28 Issue 2, 2019

Journal of International Technology and Information Management

Table of Contents JITIM 2, 2019


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che Jul 2019

Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che

Journal of International Technology and Information Management

In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


“I’Ll Use It The Way I Feel Like It” – The Influence Of User Emotions On Erp Usage, Serdar Turedi, Ceren Ekebas-Turedi Jun 2019

“I’Ll Use It The Way I Feel Like It” – The Influence Of User Emotions On Erp Usage, Serdar Turedi, Ceren Ekebas-Turedi

Journal of International Technology and Information Management

Due to the growing importance of complex information systems (IS) such as Enterprise Resource Planning (ERP), organizations spend millions of dollars to IS implementations. Implementation of ERP triggers a wide range of end user behaviors, which are strongly tied to ERP’s success and benefits. Despite the progress that has been made in understanding the acceptance and resistance towards voluntary IS usage, less is known about the role of end user behaviors in mandatory IS usage context. Drawing from coping theory and human-material agency perspective, this paper argues that users can show different behaviors in their ERP usage depending on how …


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


The Impact Of The Web And Social Media On The Performance Of Nonprofit Organizations, Namchul Shin May 2019

The Impact Of The Web And Social Media On The Performance Of Nonprofit Organizations, Namchul Shin

Journal of International Technology and Information Management

This research empirically analyzes the impact of both the Web and social media on the performance of nonprofit organizations by using 100 nonprofit organizations ranked by web traction measures, including Facebook Likes and Twitter Followers. Our findings from ANOVA and non-parametric tests demonstrate that nonprofit organizations with higher web traction have greater contributions and grants than others with lower web traction. These findings suggest that the use of the Web coupled with social media promotes better, interactive (two-way) communications with the public, as well as fundraising and that nonprofit organizations that attract more supporters on the Web and social media …


Mobile Money And Socioeconomic Development: A Cross-Country Investigation In Sub-Saharan Africa, Wenxiu Vince Nan May 2019

Mobile Money And Socioeconomic Development: A Cross-Country Investigation In Sub-Saharan Africa, Wenxiu Vince Nan

Journal of International Technology and Information Management

Over the past decade, mobile money, as a disruptive financial services innovation, has been widely adopted in Sub-Saharan Africa where the majority of population was financially excluded. Despite the transformative role of mobile money, the macro-level socioeconomic implications have been weakly examined so far. To fill the research gap, this paper explores the theoretical and empirical links between mobile money and socioeconomic development. Drawing on the theory of technology affordances and the emerging mobile money literature, this paper argues that mobile money, when adopted on a massive scale, has the potential to lead to socioeconomic development at the societal level. …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …


The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun May 2019

The Use Of Generic Scripting In Certain Application Development Projects, Vance Allen Etnyre, Jian Denny Lin, Nanfei Sun

Journal of International Technology and Information Management

This article discusses generic scripting, a useful scripting technology for developing applications. In its simplest use, generic scripting can be used as a documentation tool to replace flowcharting or pseudocode. in certain situations, generic scripting can lead directly to a working application without the need to write, compile and test a new program. Generic scripting is discussed as a tool which can be used in logical design, detailed design and implementation of a new application. An example is presented to show how generic scripting can be used by non-programmers to simplify the development of applications. This example is used to …


College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch May 2019

College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch

Journal of International Technology and Information Management

College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished using …


Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel Mar 2019

Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel

Journal of International Technology and Information Management

The skills related to the use of information and communication technologies (ICT) were examined in this study within the context of eight communities with a high degree of vulnerability and diversity. The objectives of the study were: a) to conduct a diagnosis of thirteen competencies related to the use of ICT in eight Mayan-speaking communities in the state of Yucatan, Mexico, and b) to examine such variables as gender, marital status, and the education level of their parents. in relation to the degree of ICT among these youth.

The findings indicate that there are differences in the use of technology …


Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan Feb 2019

Customer Knowledge Management In The Cloud Ecosytem, Joseph O. Chan

Communications of the IIMA

The evolution of the economy has gone through the agricultural era, followed by the industrial era focusing on the production of goods and the postindustrial era accentuated by information and services. The new economy of the 21stcentury is characterized by knowledge and relationships. Galbreath (2002) described the transition to a new economic order driven by knowledge and based on the value of relationships. Customer knowledge management (CKM) synthesizes the customer knowledge and relationships assets in the extended enterprise to create advantages for companies in a very competitive market. Technologies have changed alongside the economy. Big Data and Cloud …


Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler Feb 2019

Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler

Communications of the IIMA

Cybersecurity is a national concern for the United States, yet the cybersecurity workforce is currently understaffed. Military capability planning can be used as a framework to evaluate and establish cybersecurity workforce development models, such as the National Initiative for Cybersecurity Education (NICE) Framework. These models can be used in a way that provides the nation a methodology to enhance human resource capabilities and fill the cybersecurity workforce deficit. Furthermore, this report discusses the importance of establishing and enhancing strategic recruitment initiatives that can be utilized for building a cybersecurity pipeline.


Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye Feb 2019

Mining Useful Information From Big Data Models Through Semantic-Based Process Modelling And Analysis, Kingsley Okoye

Communications of the IIMA

Over the past few decades, most of the existing methods for analysing large growing knowledge bases, particularly Big Data, focus on building algorithms and/or technologies to help the knowledge-bases automatically or semi-automatically extend. Indeed, a vast number of such systems that construct the said large knowledge-bases continuously grow, and most often, they do not contain all of the facts about each process instance or elements that can be found within the process base. As a consequence, the resultant process models tend to be vague or missing value datasets. In view of such challenge, the work in this paper demonstrates that …


Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles Jan 2019

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles Jan 2019

Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles

Journal of International Technology and Information Management

This paper features the use of blockchain technology in the healthcare industry, with special focus on healthcare data exchange and interoperability; drug supply chain integrity and remote auditing; and clinical trials and population health research. This study uses the research method of analyzing the published case studies, academic articles, trade articles, and videos on MEDRec, Patientory, and the AmerisourceBergen/Merck alliance with SAP/CryptoWerk. The “blockchain” concept was introduced around October 2008 when a proposal for the virtual currency, bitcoin, was offered. Blockchain is a much broader concept than bitcoin and has the following key attributes: distributed database; peer-to-peer transmission; transparency with …


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


A Game-Theoretic Approach To Share The Costs Of Cooperating Healthcare Networks, Jay M. Lightfoot Jan 2019

A Game-Theoretic Approach To Share The Costs Of Cooperating Healthcare Networks, Jay M. Lightfoot

Journal of International Technology and Information Management

The growing demand for healthcare services combined with the disarray in the health insurance market in the United States has created a situation where rival health networks are aggressively competing by building duplicate health facilities and providing redundant services in localized geographic regions. Unfortunately, this strategy can reduce the quality of patient care and decrease profits (Kaissi & Charland, 2013). A solution to this problem is for health networks to cooperate and share healthcare equipment, facilities, and personnel. Toward that end, this paper presents a game-theoretic method that can share these costs in a fair, efficient, and repeatable manner.