Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

California State University, San Bernardino

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Business

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang Dec 2017

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor Dec 2017

Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor

Journal of International Technology and Information Management

The Bureau of Labor Statistics projected the demand for information technology (IT) human resources to increase by 13.26 percent between 2014 and 2024. In this survey research, the IT professionals estimated a growth of 34.16 percent in IT human resources over a period of five years from the year 2016. The goal of this survey study was to try to understand the discrepancy in the estimates for IT human Resources requirements by developing a theory-driven model to evaluate the impact of growth in IT outsourcing/offshoring, cloud-computing, end-users-computing, IT applications, and usage of commercial-off-the-shelf/ERP on the need for IT human resources.


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech Oct 2017

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


The Chief Information Security Officer: An Exploratory Study, Erastus Karanja, Mark A. Rosso Jun 2017

The Chief Information Security Officer: An Exploratory Study, Erastus Karanja, Mark A. Rosso

Journal of International Technology and Information Management

The proliferation and embeddedness of Information Technology (IT) resources into many organizations’ business processes continues unabated. The security of these IT resources is essential to operational and strategic business continuity. However, as the large number of recent security breaches at various organizations illustrate, there is more that needs to be done in securing IT resources. Firms, through organizational structures, usually delegate the management and control of IT security activities and policies to the Chief Information Security Officer (CISO). Nevertheless, there seem to be a number of firms without a CISO and for the ones that do, there is little consensus …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew Jun 2017

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Backpedaling Nugget Smugglers: A Facebook And News Article Thematic Analysis Of Chick-Fil-A Vs. Gay Marriage, Stacy M. Wiedmaier Jun 2017

Backpedaling Nugget Smugglers: A Facebook And News Article Thematic Analysis Of Chick-Fil-A Vs. Gay Marriage, Stacy M. Wiedmaier

Electronic Theses, Projects, and Dissertations

This study utilizes William Benoit’s Image Repair Theory to frame the dominant crisis communication strategies that fast food chain Chick-fil-A (CFA) employed before, during and after their CEO mixed his personal opinion on social issues with corporate policy in June 2012. The thematic analysis draws from three distinct data sets that include 3,900 Facebook comments posted by the general public on CFA’s social media page, 32 individual Atlanta Journal-Constitution news articles that address the debate and CFA’s public response to the crisis titled “Who We Are.” This thesis aims to identify both the dominant themes in Facebook posts and the …


2016 "Meeting Of The Minds" Research Symposium Abstracts May 2017

2016 "Meeting Of The Minds" Research Symposium Abstracts

OSR Journal of Student Research

No abstract provided.


Artificial Islands In The South China Sea, Aaron Holmes May 2017

Artificial Islands In The South China Sea, Aaron Holmes

OSR Journal of Student Research

The purpose of this study was to understand the value and implications of artificial islands constructed by the People's Republic of China (PRC) in the South China Sea. Qualitative analysis was used with the available literature, sources, and treaties of the topics concerned. The paper concludes that the PRC gains many benefits primarily within the realm of energy security and explores what effects they may


Foxconn: Not Entirely An Ocean Away, Shana Fee May 2017

Foxconn: Not Entirely An Ocean Away, Shana Fee

OSR Journal of Student Research

No abstract provided.


The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom May 2017

The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom

OSR Journal of Student Research

This paper considers the transformation of Greek myth over time, how character’s attributes change over time, and ultimately how contemporary poets employ these myths. The myth of focus in the paper is that of Helen of Troy and the depiction of her character throughout the many years and variations of the myth. Her character is then considered in the contemporary feminist poetry of Carol Tufts and Margaret Atwood.


Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition Feb 2017

Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition

OSR Journal of Student Research

No abstract provided.


Strategizing For Corporate Social Responsibility: Wells Fargo Case, Ines Montes-Stewart Feb 2017

Strategizing For Corporate Social Responsibility: Wells Fargo Case, Ines Montes-Stewart

OSR Journal of Student Research

This study evaluates Wells Fargo Corporation’s Corporate Social Responsibility strategy. It employs a qualitative methodology using the instrumental case study approach, within which the broad research question is raised: How does the Wells Fargo Corporation strategize for, and implement, corporate social responsibility? Our findings revealed that Wells Fargo has a solid, well-integrated CSR strategy deeply engrained within its culture, skillfully aligned with its capabilities and resources, and that this plan has been executed expertly within the corporation. We will communicate our findings to their leadership team in hopes they continue expansion of their CSR strategies and recommend they consider seeking …


Focus On Non-Functionals! The Effect Of Focussing On Non- Functional Requirements On The Maturity Of The Requirements Engineering Process, David Vermeulen, Mark De Weger, Pascal Ravesteyn Feb 2017

Focus On Non-Functionals! The Effect Of Focussing On Non- Functional Requirements On The Maturity Of The Requirements Engineering Process, David Vermeulen, Mark De Weger, Pascal Ravesteyn

Communications of the IIMA

When developing IT systems it is important to know the requirements of the system. Requirements can be classified into different categories. In this study we look at functional and non-functional requirements. Respectively these describe the behaviour of the system (functional requirements) and the criteria under which the system works (the non-functional requirements). Furthermore this paper contributes to the understanding of the relation between the focus on non-functional requirements and the maturity of the requirements engineering process. The research question this paper addresses is: "How does the focus on non-functional requirements influence the maturity of the requirements engineering process?” The method …


Cultural Impacts On Cognitive Dissonance And Ewom/Enwom, Kungpo Tao, Yan Jin Feb 2017

Cultural Impacts On Cognitive Dissonance And Ewom/Enwom, Kungpo Tao, Yan Jin

Communications of the IIMA

The purpose of this study is to contrast individualist culture (e.g., United States) with collectivist culture (e.g., China) in regards to the Internet-involved customer purchase process (IICPP), specifically the customer’s involvement before purchase, the cognitive dissonance after purchase and the post-purchase behavior in terms of the online world of mouth (eWOM) and online negative word of mouth (eNWOM). This study also explores the influences of culture on product attributes that are associated in IICPP. Based on the related literature, this study applies the existing concepts to the Internet context. The study adopts 40 cases of online customer reviewers regarding their …


A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek Feb 2017

A Normative Model For Assessing Sme It Effectiveness, Michael Curry, Byron Marshall, Peter Kawalek

Communications of the IIMA

Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably effective IT systems remains a significant challenge. This paper presents a light weight IT effectiveness model for small businesses to assess their IT and formulate strategies for improvement. Employing an action research approach we investigate a mixed method analysis of 120 survey responses from small family businesses and user participation in 10 semi-structured interviews. We then conduct critical reflection to identify refinements which are validated using 72 survey responses from university students. The results present compelling evidence that employees’ normative patterns (norms) are a significant driver …


Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin Feb 2017

Strategic Analysis Of The Role Of Information Technology In Higher Education – A Kpi-Centric Model, Linda C. Gordon, Erin Gratz, David S. Kung, Harold Dyck, Frank Lin

Communications of the IIMA

The KPI-centric Strategic Model regarding the Role of Information Technology developed in this research is based on specific details from the University of La Verne’s participation in the 2014 Educause Center for Analysis and Research (ECAR) Study of Undergraduate Students and Information Technology as a benchmarking participant. It also draws on the experience and directions of other institutions such as California State University, University of California. As one of the participating 213 institutions, the University of La Verne’s undergraduate student responses generally mirror the majority view of students enrolled in all institutions of higher education in the United States surveyed …


An Integrated Perspective Of Multitasking And Multiple Team Membership, Shoshana Altschuller, Raquel Benbunan-Fich Feb 2017

An Integrated Perspective Of Multitasking And Multiple Team Membership, Shoshana Altschuller, Raquel Benbunan-Fich

Communications of the IIMA

Workers in today’s business environments are confronted with heavy workloads that reflect not only their regular job expectations but also their involvement in multiple teams at the same time. The majority of the current literature has studied these two topics (multitasking and multiple-team membership) independently. The goal of this paper is to integrate both conceptual outlooks by examining relevant works in both streams of research and merging them into an integrated framework. By analyzing new data collected from focus groups, and taking an individual worker’s perspective, the results of this study suggest that participating in multiple teams simultaneously, fragments workers …


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz Jan 2017

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …


It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan Jan 2017

It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan

Journal of International Technology and Information Management

TThe purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the nature of tools employed, measurement processes, and the implementation methodology, using case studies. Analysis of the available academic and non-academic literature sources showed measurement issues being the most dominant and ironically the most neglected domain in ITG implementations. We view ITG measurement tools and it subsequent deployment through the two theoretical ITG models namely the Integrated IT Governance model, and the Structures, Processes, …


Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson Jan 2017

Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson

Journal of International Technology and Information Management

Purpose: The purpose of this paper is to review the acceptance and future use of blockchain technology. Given the rapid technological changes, this paper focuses on a managerial overview and framework of how the blockchain, including its implementations such as Bitcoin have advanced and how blockchain can be utilized in large-scale, enterprise environments. The paper begins with a technological overview that covers the history of the technology, as well as describing the computational, cryptographic theory that serves as the basis for its notable security features. This paper also covers several key application areas such as finance, accounting, and marketplaces where …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …