Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 178

Full-Text Articles in Management Information Systems

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga Dec 2023

The Evaluation Of Successful Implementation Of Human Resource Information In Private Organization, Sancoko Sancoko, Armeyta Widya Oryza, Niko Grataradirga

Jurnal Administrasi Bisnis Terapan (JABT)

This study intend to evaluate the use of the Human Resources Information System (HRIS) in private organization. User satisfaction is one of the conditions for the successful implementation of information systems. To evaluate this system information, the author uses the conceptual Delone and Mclean information system success model(ISSM). This study employs a quantitative methodology and a survey method. The research sample consists of employees in private organizations engaged in software engineering. To analyze, SPSS is employed by the author in two stages: first validity-reliability examination, second multiple regression tests. The result demonstrated that quality system has a significant affect on …


Social Engineering Cyber Threats, Young B. Choi, Josh Rubin Dec 2023

Social Engineering Cyber Threats, Young B. Choi, Josh Rubin

Journal of Global Awareness

The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the …


Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua Nov 2023

Analysis Of Us Airline Stocks Performance Using Latent Dirichlet Allocation (Lda), Amina Issoufou Anaroua

Beyond: Undergraduate Research Journal

Various events, such as changes in the interest rate or the hijacking of a commercial aircraft, can lead to significant shifts in airline stock performance. This study aimed to measure the impact of aviation-related news announcements on the stock performance of US airlines, focusing on different topics. The dataset included aviation news covering airlines, airports, regulations, safety, accidents, manufacturers, MRO, incidents, aviation training, general aviation, and others obtained from Aviation Voice. To uncover patterns that could explain the movements of US airline stocks, a natural language processing technique called Latent Dirichlet Allocation (LDA) was employed. The process involved text mining …


Asesmen Transformasi Digital Galeri Nasional Indonesia, Desy Novita Sari, Luki Wijayanti Oct 2023

Asesmen Transformasi Digital Galeri Nasional Indonesia, Desy Novita Sari, Luki Wijayanti

Jurnal Ilmu Informasi, Perpustakaan dan Kearsipan

Digital transformation assessment has not received full attention and is still rarely carried out by art galleries/museums in Indonesia. Digital transformation research on library and information science (LIS) that covers GLAM's concept focuses more on libraries, archives, and museums, while art galleries are scarce, especially in Indonesia. This study aims to conduct a digital transformation assessment of art galleries, especially the National Gallery of Indonesia (Galnas). The research uses a quantitative method by applying a digital transformation framework questionnaire that had tested at 400 cultural institutions in Italy (including art galleries). This research measures the Digital Readiness Index (DRI) on …


Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom Oct 2023

Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom

The African Journal of Information Systems

Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …


Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton Oct 2023

Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton

Journal of Cybersecurity Education, Research and Practice

Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.


What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson Oct 2023

What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson

Journal of Cybersecurity Education, Research and Practice

Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …


Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola Feb 2023

Privacy And Security Information Awareness And Disclosure Of Private Information By Users Of Online Social Media In The Ibadan Metropolis, Nigeria, Funmilola Olubunmi Omotayo, Joy Oluwabukola Olayiwola

The African Journal of Information Systems

The purpose of this paper is to investigate information privacy and security awareness among online social media (OSM) users in the Ibadan metropolis, Nigeria. Building upon the social exchange theory, some factors that could influence the disclosure of private information on social media were identified. Findings from the analysis of data of 255 respondents revealed that most were aware of information privacy and security measures available on OSM, and the risks associated with the disclosure of private information on OSM. Privacy and security awareness, the perception of benefits associated with the use of OSM, the perception of risks associated with …


National Digital Infrastructure And India’S Healthcare Sector: Physician’S Perspectives, Rajesh Chandwani, Saneesh Edacherian, Mukesh Sud Feb 2023

National Digital Infrastructure And India’S Healthcare Sector: Physician’S Perspectives, Rajesh Chandwani, Saneesh Edacherian, Mukesh Sud

The Qualitative Report

Patient-centric digital infrastructure can potentially enhance the efficiency of healthcare systems. However, even in developed nations, evidence suggests low adoption rates for such infrastructure and lack of support from clinicians is considered as one of the most critical hindering factors. In this study, we examine physicians' perceptions of the proposed large-scale information technology initiative in India that aims to transform the health sector and provide universal health coverage to all residents of India. We employed the information ecology lens to understand the broader changes in the healthcare system that could result from the initiative. We use focus group discussion and …


Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi Jan 2023

Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi

International Journal for Business Education

The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …


Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi Jan 2023

Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi

Journal of International Technology and Information Management

The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson Jan 2023

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari Jan 2023

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray Jan 2023

Digital Collectibles: Exploring Non-Fungible Tokens (Nfts) Through Twitter Messages, Peter Haried, James Murray

Journal of International Technology and Information Management

The growing popularity of non-fungible tokens (NFTs) has created a new digital collectibles asset class and market. NFTs are unique digital tokens built on blockchain technology that can represent anything from art, property rights, certificates of authentication to sports collectibles. The use of blockchain provides the framework for digital ownership and brings the notion of scarcity to the digital NFT asset class. With the emerging NFT market and growing consumer base little work has investigated the factors behind NFT interest and participation. Using a dataset of 26,444 tweets on NBA Top Shot, one of the largest and most popular NFT …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky Jan 2023

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms Nov 2022

Modelling Online Advertising Design Quality Influences On Millennial Consumer Attitudes In South Africa, Rodney G. Duffett Dr, Natassha V. Miller Ms

The African Journal of Information Systems

Millennials’ advanced knowledge and exposure to product experiences, and irrelevant placement of online advertising has led to an increase of online advertising avoidance. However, effective online advertising design may assist in establishing more positive sentiments towards digital forms of marketing communication. The study used the visual rhetoric theory as the theoretical basis to examine millennial consumer attitudes. The main research aims were to propose an online advertising design quality model, and to ascertain the influence of online advertising design quality on millennial consumer attitudes. The study employed a quantitative research design via an empirical online survey. Online advertising design quality …


Outcomes Of Enterprise Resource Planning System On Organizational Productivity, Tambei Chiawah, William G. Dzekashu, Walter R. Mccollum, Evelyn E. Fomuso Jul 2022

Outcomes Of Enterprise Resource Planning System On Organizational Productivity, Tambei Chiawah, William G. Dzekashu, Walter R. Mccollum, Evelyn E. Fomuso

International Journal of Applied Management and Technology

Leaders within local government organizations do not understand how to achieve expected and desired benefits from the implementation of enterprise resource planning (ERP) systems. The lack of alignment between social and technical elements in ERP implementation continues to depress organizational productivity. The prime objective of our quantitative correlational study was to examine whether social and technical elements increase use and productivity in ERP implementation. Sociotechnical systems theory provided the theoretical basis for our study. We examined six dimensional variables relating to ERP implementation. Our key findings indicated positive significant relationships between ERP and information sharing, between ERP system quality and …


The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai Jul 2022

The Acceptance And Use Of Online Learning By Law Students In A South African University: An Application Of The Utaut2 Model, Jameson Goto, Anzanilufuno Munyai

The African Journal of Information Systems

COVID-19 forced many universities to shift from traditional face-to-face or blended learning, to full online learning. The sudden shift was not easy for both students and lecturers, who had to adapt to the new learning mode. This study aimed to evaluate the acceptance and use of online learning of university students in the law faculty at a South African university during the COVID-19 pandemic. The study employs the extended unified theory of acceptance and use of technology (UTAUT2) model particularised to the online learning context in a country with a developing economy. An online survey was administered to the student …


Examination Of The Implication Of Information Processing On The Library Users Learning Comprehension/Satisfaction., Obia Gopeh Inyang, Juliana Agwunobi Apr 2022

Examination Of The Implication Of Information Processing On The Library Users Learning Comprehension/Satisfaction., Obia Gopeh Inyang, Juliana Agwunobi

Communications of the IIMA

The paper looked at Information Processing Theory's implications for the Library users’ learning satisfaction. The study discussed the nature of information and asserted that the dissemination of information empowers learning since the world is increasingly becoming information-based. It looked at information processing as the standard for understanding and satisfactory learning against memorization, leading to poor academic performance as it does not allow what the learner has learned to be part of him. The study also discussed that the instructor, facilitator, teacher, lecturer, and users have a role to play in processing information that improves learning. What remains essential is the …


E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis Jan 2022

E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis

Journal of International Technology and Information Management

Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi Jan 2022

Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi

Journal of International Technology and Information Management

Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …


Social Word Of Mouth Valence And Role Of Moderators: An Integrated Model Of Consumer Decision Making, Angshuman Ghosh Dr, Sanjeev Varshney Dr, Shabbirhusain R.V. Dr Jan 2022

Social Word Of Mouth Valence And Role Of Moderators: An Integrated Model Of Consumer Decision Making, Angshuman Ghosh Dr, Sanjeev Varshney Dr, Shabbirhusain R.V. Dr

Journal of International Technology and Information Management

The study aimed at coming up with an integrated model of consumer decision making that captures the impact of social media word of mouth (SWOM) on consumers’ decision influencing variables including perceived risk, its impact on attitude towards the brand, and eventually on intention to purchase. The integrated model incorporates the impact of SWOM message valence along with moderating role played by various source and receiver level characteristics on the variables mentioned above. Two experiments with between-subject factorial designs were conducted for testing the hypotheses. The first study had 128 participants divided into eight groups and their responses were collected …


How Do Aspects Of Chain Restaurants Affect The Overall Rating: Trip-Advisor Multi-Dimensional Rating System Analysis, Yuanyuan Gao, Anqi Xu Jan 2022

How Do Aspects Of Chain Restaurants Affect The Overall Rating: Trip-Advisor Multi-Dimensional Rating System Analysis, Yuanyuan Gao, Anqi Xu

Journal of International Technology and Information Management

In this study, we analyze the aspect ratings and overall ratings of chain restaurants retrieved from the TripAdvisor multi-dimensional rating system. We gain aspect ratings including food aspect rating, value aspect rating, service aspect rating, and atmosphere aspect rating and their corresponding overall restaurant rating from individual reviews and each restaurant. We build three econometric models to examine how overall rating is affected and found that the food aspect has a significant positive impact on the overall rating. Another interesting finding of our analysis is that the service aspect negatively affects the overall rating. This is explainable under the chain …


Jitim Front Cover Vol 31 1 2022 Jan 2022

Jitim Front Cover Vol 31 1 2022

Journal of International Technology and Information Management

Table of Content JITIM Vol 31. issue 1, 2022


Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian Jan 2022

Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …