Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 68

Full-Text Articles in Business

Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


A Tribute On The 25 Th Anniversary To The International Information Management Association (Iima) And Its Co-Founders: C. E. Tapie Rohm Jr., Patrick J. Mcinturff Jr. And Walter T. Stewart Jr., Warren Adis, Joseph O. Chan, Xin James He, Tanya Goette, Frank Lin, Emmanuel Uzoma Opara, Trevor Rohm, Gerhard Steinke, Jake Zhu Jan 2014

A Tribute On The 25 Th Anniversary To The International Information Management Association (Iima) And Its Co-Founders: C. E. Tapie Rohm Jr., Patrick J. Mcinturff Jr. And Walter T. Stewart Jr., Warren Adis, Joseph O. Chan, Xin James He, Tanya Goette, Frank Lin, Emmanuel Uzoma Opara, Trevor Rohm, Gerhard Steinke, Jake Zhu

Journal of International Technology and Information Management

IIMA is a special place for all of us. For twenty-five years, it has served as a forum for all of us to gather together to engage in intellectual conversations, to disseminate knowledge, and to renew our profession. Over the many years, IIMA has helped many us with our tenure and promotion, and has made our manuscripts available worldwide through our publication outlets, the three IIMA journals and the seasonal conference proceedings. Also for many of us, IIMA is not only a forum for academics, but also a place for friendship, family and fun. Many of us have become life-long …


Technology Adoption: Issues And Challenges In Information Technology Adoption In Emerging Economies, Samuel A. Ejiaku Jan 2014

Technology Adoption: Issues And Challenges In Information Technology Adoption In Emerging Economies, Samuel A. Ejiaku

Journal of International Technology and Information Management

Recognizing the need, effect and importance of Information Technology (IT) in any society, this study explored some of the challenges in the transfer and adoption of IT in developing countries. In Advanced countries, IT has generally revolutionized all facets of life, including technology, business, education and the global economy. Developing countries have not fully participated in this global revolution. This paper discusses some of the challenges that developing countries and donor countries encounter in the transfer and adoption of IT in developing countries. Some of these challenges include government policies, infrastructure, training, and culture of the recipient countries. The study …


The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon Jan 2014

The Study Of Competitive Priorities And Information Technology Selection: Exploring Buyer And Supplier Performance, Thawatchai Jitpaiboon

Journal of International Technology and Information Management

Competitive priorities are the critical operational dimensions a process or supply chain must possess to satisfy its internal or external customers. The concept of competitive priorities is very important to organizations because it helps them set up achievable goals and it has long been known to be associated with organizational performance. This research introduces an alternative theory to explain the mechanism by which the buying firms and suppliers adopt different competitive priorities as they enter into buyer-supplier relationships and to explore further how technology choices influence the competitive priority adaptation. Using empirical data collected from the Society of Manufacturing Engineer’s …


Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long Jan 2014

Using Document Indexers For Faceted Search In Dataspaces, Hsun-Ming Lee, Jaymeen Shah, Ju Long

Journal of International Technology and Information Management

Efficient information retrieval is essential to enrich user experience when searching for documents in dataspaces. With the continued growth in the volume and complexity of documents, the efficient information retrieval for searches has become increasingly challenging. To improve users’ search experience, faceted search combines direct keyword search methods with faceted browsing using a predefined set of categories (facets). This paper studies a faceted search approach that integrates dynamic facets generation with search. To further enhance the faceted search, alternative indexers based on pre-defined ontology for data repositories within dataspaces are evaluated in terms of execution time and data size. Experimental …


Seniors And Information Technology: A Mis-Fit?, Mark E. Mcmurtrey, James P. Downey, Steven M. Zeltmann, Ronald E. Mcgaughey Jan 2012

Seniors And Information Technology: A Mis-Fit?, Mark E. Mcmurtrey, James P. Downey, Steven M. Zeltmann, Ronald E. Mcgaughey

Journal of International Technology and Information Management

The “digital divide” between the haves and have-nots in society continues to draw attention in traditional media outlets as well as academic research. Those yearning to join the computer revolution comprise several groups defined by wealth, ethnicity, country (even regions of countries), and age. While there has been research into the digital divide in all of these areas, the focus of this paper is Information Technology (IT) use by the elderly, or our senior citizens. Our interest in this group stems from the dynamic interaction of two forces: 1) senior populations are growing in percentage and sheer number both in …


Teaching Web Information Retrieval And Network Communications Undergraduate Courses In It Curriculum, Song Xing, Xiannong Meng, Wei Wang Jan 2012

Teaching Web Information Retrieval And Network Communications Undergraduate Courses In It Curriculum, Song Xing, Xiannong Meng, Wei Wang

Journal of International Technology and Information Management

This paper provided the results of an investigation on the teaching of computer networks courses and web information retrieval courses in undergraduate Information Technology (IT) curriculum. The paper consists of two parts. First part of the paper surveys the undergraduate courses in two curriculum areas, computer networks and web information retrieval. The content of the survey includes the topics covered, the textbooks used, and major projects in these courses. The second part of the paper describes the authors’ experiences in teaching such courses to undergraduate students in various discipline areas including computer science majors, IT majors, and non-technical majors.


Successful Introduction Of Cloud Computing Into Your Organization: A Six-Step Conceptual Model, Hossein Bidgoli Jan 2011

Successful Introduction Of Cloud Computing Into Your Organization: A Six-Step Conceptual Model, Hossein Bidgoli

Journal of International Technology and Information Management

Cloud computing is the fastest area of application within the information systems field. The adoption of cloud computing by businesses, government agencies, and academic institutions is on the rise. Cloud computing platforms could reduce cost, offer scale, and increase information systems responsiveness for those companies that are adopting it properly. However, still many decision makers do not really know what exactly cloud computing is, its unique capabilities, and how it may increase the efficiency and effectiveness of IT services. Also cloud computing may mean different things to different people. This paper first examines different applications within the cloud computing domain …


The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai Jan 2011

The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai

Journal of International Technology and Information Management

This research article presents a past, present and future meta analysis of information systems offshoring (ISO) research over the 2000-2010 time period. ISO has emerged as a significant sourcing strategy adopted by many organizations to manage, support and deliver their information system needs. Across the selected academic articles our findings compare research methodologies applied, client vs. vendor perspectives studied and ISO topic areas investigated. Interesting results emerge in the range and evolution of ISO research. As a result of our analysis, our findings clearly indicate areas of need for future ISO researchers to consider when conducting future ISO research.


Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao Jan 2010

Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao

Journal of International Technology and Information Management

No abstract provided.


It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry Jan 2010

It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry

Journal of International Technology and Information Management

In an increasingly fast-paced business context, agility is crucial to firm performance. Competitive agility, the ability of a firm to rapidly sense and respond to changes in its environment, is especially important during industry turbulence. This research examines whether investment in Information Technology (IT) enhances firms’ competitive agility using analysis of firm performance during industry growth and contraction. The research approach addresses the causality question faced by previous IT productivity studies by focusing on ex-ante IT investment and subsequent firm performance during periods of unanticipated industry shocks. Findings indicate that IT investment enhances competitive agility but only in industries with …


Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young Jan 2010

Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young

Journal of International Technology and Information Management

Organizations integrate information security measures through information security planning and policy development. This study aims to examine how the extent of collaborative exchange within the organization and extent of formalization of the information security function impact the effective utilization of well-established information security objectives. The security objectives of interest, described in general deterrence theory, are deterrence, detection and recovery. This study finds that organizations that exhibit higher levels of collaborative exchange and develop and implement more information security policies are more effectively utilizing the information security strategies of detection, deterrence and recovery. This study highlights the importance of the complementary …


A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka Jan 2010

A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Managing the costs, complexity, and risks of IT projects continues to be a challenge for many organizations. Project risk management is becoming an important sub-discipline of software engineering, and focuses on identifying, analyzing, and developing strategies for responding to project risk efficiently and effectively. This paper presents an IT project risk identification framework to facilitate identifying and understanding various project risks as part of an overall project risk management process. The proposed framework should be of interest to IT practitioners during the creation of the project plan and over the course of a project so that appropriate and corrective actions …


Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon Jan 2010

Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon

Journal of International Technology and Information Management

Ad-hoc extraction of information from documents can ensure the transparency of decisions made by an organization. Different Information Extraction methods have been applied to extract information from various domains. Most widely known methods use manually annotated training documents that require high development time. The automated training methods are not scalable to large application domains. We have developed a semi-automated knowledge-engineering method for building the knowledge-base with minimal efforts. Because our method reduces manual processing of the training data, the development process is very fast. We have developed a prototype application to extract information from the project-reports of the American Recovery …


Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu Jan 2010

Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu

Journal of International Technology and Information Management

The notion of sharing information has become a critical element in competitive advantage for mobile phone companies. The purpose of this particular research is to collate, compare and prioritize gender differences in the determinants of sharing information via mobile phones. The content analysis and the analytic hierarchy process methods were made use of to collect and examine relevant data. According to the findings of this research, the determinants of information sharing via mobile phones may be arranged into four fundamental categories. The categories, in order of significant, are: situational factors (including time pressures, convenience, and price discounts), the unique characteristics …


Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston Jan 2010

Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston

Journal of International Technology and Information Management

This article looks at the value of certification from the employer's perspective. It is perhaps the first study in this area that gathers data directly from employers. A survey of directors of university information technology departments is analyzed, and the results indicate limited support for certifications being valued assets of their employees. While not sufficiently strong enough to warrant generalization of the results to business in general, with this information, students and professionals should be able to better prepare themselves for finding employment and academic programs can better evaluate the appropriateness of the inclusion of certification training in their curricula.


It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb Jan 2009

It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb

Journal of International Technology and Information Management

This paper describes a study that assessed the performance implications of aligning information technology (IT) strategy to overall business strategy across a variety of health care organization (HCO) structures. We obtained survey results from senior executives of 178 hospitals to identify key configurations of IT strategic practices, business strategy and HCO structures. Using K- means cluster analysis, we identified which business strategies correlate strongly with certain IT strategy types. Our results indicate that HCOs achieve superior performance through unique combinations of business and IT strategy, suggesting that correctly aligning these strategies is a critical decision for healthcare organizations.


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih Jan 2009

Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih

Journal of International Technology and Information Management

Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Performance Impacts Of Extent Of Information Technology Usage, Adam S. Maiga, Fred A. Jacobs Jan 2009

Performance Impacts Of Extent Of Information Technology Usage, Adam S. Maiga, Fred A. Jacobs

Journal of International Technology and Information Management

The link between IT investment and firm performance is indirect due to the effect of moderating variables. Employing a sample of 589 manufacturing firms based in the U.S., building on resource- and knowledge-based theories and the marketing literature, we use structural equation modeling to investigate the relationship between firm extent of IT usage, knowledge acquisition from customers and suppliers, competitive advantage and firm financial performance. Our results indicate that firm extent of IT usage positively impacts both knowledge from both customers and suppliers, which positively affect firm competitive advantage that, in turn, positively impacts firm financial performance. Further, our results …


A Practical Information Technology Program, Bijan Mashaw Jan 2009

A Practical Information Technology Program, Bijan Mashaw

Journal of International Technology and Information Management

This paper discusses the challenges facing business in the 21 st century and the dramatic changes in the use of computers and application development process. These challenges, as well as the increase of global economy, coupled with the demand for the business technology workers indicate the need for redesigning the Information System Curriculum. The proposed framework for an Information Technology (IT) Program in this paper offers a pragmatic curriculum model to accommodate the needs and challenges of the 21st century. The framework provides a fundamental IT education for the graduates of such a curriculum, as well as allowing an area …


Project Management: Is/It Research Challenges, Debbie Tesch, Lewis R. Ireland, Julie Yu-Chih Liu Jan 2008

Project Management: Is/It Research Challenges, Debbie Tesch, Lewis R. Ireland, Julie Yu-Chih Liu

Journal of International Technology and Information Management

A major challenge in Information Systems and Information Technology is to improve the ability to conceptualize, design, develop and deliver information systems that meet customer requirements. Project management is often adopted to create solutions that work and meet customer needs. The principles of project management as defined by the Project Management Institute, can improve project success rates. Researchers in the project management need to help practitioners understanding the impact of different principles on the success of IS development. This study undertakes a survey of project management experts on the state of practice and research to examine the need for improving …


Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey Jan 2008

Seniors And Information Technology: Are We Shrinking The Digital Divide?, Mark E. Mcmurtrey, Ronald E. Mcgaughey, James R. Downey

Journal of International Technology and Information Management

The “digital divide” has been present in the field of information technology (IT) since the inception of the digital computer. Throughout the course of history, one group (or more) has had better access to computer and information technology than another faction. For example: rich versus poor, young versus old, advanced societies versus less developed countries, etc. This disparity has existed for a variety of reasons, among them political, cultural, economic and even class or socioeconomic in nature. This paper examines one particular component of this phenomenon, the “gray divide” pertaining to the use of IT by our elderly, or senior …


Linking Information Technology And Competitive Strategy: Evidence From China’S Third-Party Logistics Industry, Fujun Lai, Dahui Li, Qiang Wang Jan 2008

Linking Information Technology And Competitive Strategy: Evidence From China’S Third-Party Logistics Industry, Fujun Lai, Dahui Li, Qiang Wang

Journal of International Technology and Information Management

This study examined how information technology (IT) influences competitive strategies of third- party logistics (3PL) providers in mainland China. First, we examined the influences of IT on the firm’s IT advantage over its competitors. Second, the relationship between IT and competitive strategy was examined. The results show that IT has a significant influence on a firm’s IT advantage and its competitive strategy.


The Use Of Strategic Forces To Understand Competitive Advantages Provided By Information Technology, Gerald E. Evans, Clyde Neu Jan 2008

The Use Of Strategic Forces To Understand Competitive Advantages Provided By Information Technology, Gerald E. Evans, Clyde Neu

Journal of International Technology and Information Management

Porter’s Five Forces model of business strategy is foundational to understanding strategic forces and the role of information technology in the larger strategic framework of an organization. The authors describe how information technology changes the strength and/or influence of the competitive forces in Porter’s model. Furthermore, understanding how specific technologies potentially change specific forces within Porter’s model is the foundation of IT strategy. This theoretical framework of strategic alignment is developed through cases demonstrating how specific technologies change the strategic forces within specific industries and how organizations should take advantage of these changing forces. Empirical evidence for the validity of …


A Primary Study Of Attributes Of Innovations During The Prediffusion Stage, Frank M. Valier, Richard V. Mccarthy, Jay E. Aronson Jan 2008

A Primary Study Of Attributes Of Innovations During The Prediffusion Stage, Frank M. Valier, Richard V. Mccarthy, Jay E. Aronson

Journal of International Technology and Information Management

We provide a theoretical model for testing the adoption of information technology during the prediffusion stage (research and development and early trials) of an innovation. The model was tested using Linux based applications of Open Source Software (OSS). The results of surveying 1000 members of the Linux User Groups WorldWide (LUGWW) are presented. This study is significant because it provides empirical evidence that attributes of innovations correlate with adoption during the prediffusion stage (research and development) of an innovation. This extends diffusion of innovations research and has important implications for DOI theory and practice.