Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

E-Commerce

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Technology and Innovation

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode Oct 2016

Implications Of Social Media Use On Instruction And Student Learning: An Exploratory Study, Mayur S. Desai, Lucy Ojode

Southwestern Business Administration Teaching Conference

In this paper we explore the use of social media on the content delivery aspects of instruction and potential impacts on student learning. It is our conjecture that impacts of social media use might depend on factors such as the interface of particular medium and learning style, teaching style and instructor skill, and the demographics of students and their instructors. We propose a framework that links instructor to students through social media. That is, social media becomes a channel though which learning occurs. Classifying multimedia technology as tools and social media as interactive Web 2.0 Internet-based applications, we employ …


Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson Oct 2016

Cloud-Based Learning Tools: Supporting The Invisible Learner (Silent Sufferers) With Socioeconomic Challenges, Lynita A. Robinson Emba, Jimmy Johnson

Southwestern Business Administration Teaching Conference

Today's students are learning at unprecedented speeds. There are a pockets of learners who may be isolated/silent sufferers who face tremendous socioeconomic challenges while seeking higher education. Providing cloud-based technology solutions to strengthen support services and family learning engagement through a series of student family portals will provide the support needed to make student learning opportunities family-based projects or community-based projects successful in graduation completion rates and job placement opportunities.


The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy Oct 2016

The Relationship Of E-Commerce Readiness To Technology Acceptance: The Case Of Barbados, Jude E. Edwards, Leila A. Halawi, Richard Mccarthy

Leila A. Halawi

This is an exploratory study that examines the relationship between selected components of ecommerce readiness and dimensions of Davis’ (1989) Technology Acceptance Model. Building upon the notion that there exists some linkage between ecommerce readiness and technology Acceptance, this study seeks to examine these linkages in e-businesses within Barbados. Three relationships are proposed – a relationship between technology acceptance and the existing e-Readiness infrastructure, a relationship between technology acceptance and current telecommunications access, and a relationship between technology acceptance and education. The results of this study demonstrated that there are strong relationships between e-commerce readiness components and various technology acceptance …


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik Aug 2016

The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik

Eliza Mik

Online businesses influence consumer behaviour by means of a wide range of technologies that determine what information is displayed as well as how and when it is displayed. This creates an unprecedented power imbalance between the transacting parties, raising questions not only about the permissible levels of procedural exploitation in contract law, together with the adequacy of existing consumer protections but also about the impact of technology on consumer autonomy. There is, however, no single technology that threatens the latter. It is the combined, mutually-enforcing effect of multiple technologies that influence consumer choices at different stages in the transacting process, …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


Changing The Industry, Spotify, Seth A. Carver May 2016

Changing The Industry, Spotify, Seth A. Carver

Chancellor’s Honors Program Projects

No abstract provided.


The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik Apr 2016

The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik

Research Collection Yong Pung How School Of Law

Online businesses influence consumer behaviour by means of a wide range of technologies that determine what information is displayed as well as how and when it is displayed. This creates an unprecedented power imbalance between the transacting parties, raising questions not only about the permissible levels of procedural exploitation in contract law, together with the adequacy of existing consumer protections but also about the impact of technology on consumer autonomy. There is, however, no single technology that threatens the latter. It is the combined, mutually-enforcing effect of multiple technologies that influence consumer choices at different stages in the transacting process, …


Property Or Currency? The Tax Dilemma Behind Bitcoin, Scott A. Wiseman Jan 2016

Property Or Currency? The Tax Dilemma Behind Bitcoin, Scott A. Wiseman

Utah Law Review

At Bitcoin’s peak in November 2013, there were 93,000 global transactions made in a single day. These users purchased everyday items such as personal services, food, and real estate. This alone suggests that Bitcoin is not primarily used as a long-term investment tool, but rather is used as a currency and a vehicle for global transactions. Congress and the IRS should regulate it accordingly. Representative Stockman’s Virtual Currency Reform Act offered an attempt to negate the IRS decision and officially classify Bitcoin and other virtual currencies as currency instead of property. A tax reclassification would alleviate typical users’ many inconveniences …


The Challenge Of Blocking Malvertising, Catherine Dwyer, Susanne O'Callaghan, Chinmay Juneja, Preston Rollins, Harpreet Wasan, Ameet Kanguri Jan 2016

The Challenge Of Blocking Malvertising, Catherine Dwyer, Susanne O'Callaghan, Chinmay Juneja, Preston Rollins, Harpreet Wasan, Ameet Kanguri

Student and Faculty Research Days

This poster invited Research Days attendees to learn more about malvertising--the practice of hiding malicious code within online advertisements--and the challenges of detecting and preventing it.


Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen Jan 2016

Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen

Journal of International Technology and Information Management

Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …


Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu Jan 2016

Usability Test Of Personality Type Within A Roommate Matching Website: A Case Study, Mrinalini Shekhawat, Shilpa Deshmukh, Gabriel Monroy, Anupriya Tiwari, Xiaoyun He, Heechang Shin, Yuan Hong, Haibing Lu

Journal of International Technology and Information Management

We designed and built a roommate matching website, exclusively for students, which allow students to have a central point in which they can meet credible roommate candidates, search for verified housing, and easily reach out to these individuals to further their relationship, and eventually share living space. Our website aims to allow a user to search for compatible roommates not just by living habits, but by tying in the personality of candidates in reference to their own personality type. This type of personality matching in conjunction with a standard behavioral survey is the basis of the algorithm used for roommate …


Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu Jan 2016

Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu

Journal of International Technology and Information Management

To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.


Choice Of Agile Methodologies In Software Development: A Vendor Perspective, Sriram Rajagopalan, Saji K. Mathew Jan 2016

Choice Of Agile Methodologies In Software Development: A Vendor Perspective, Sriram Rajagopalan, Saji K. Mathew

Journal of International Technology and Information Management

The purpose of this research was to develop understanding about how vendor firms make choice about agile methodologies in software projects and their fit. Two analytical frameworks were developed from extant literature and the findings were compared with real world decisions. Framework 1 showed that the choice of XP for one project was not supported by the guidelines given by the framework. The choices of SCRUM for other two projects, were partially supported. Analysis using the framework 2 showed that except one XP project, all others had sufficient project management support, limited scope for adaptability and had prominence for rules.


Battle Of The Beds: The Economic Impact Of Airbnb On The Hotel Industry In Chicago And San Francisco, Katherine Goree Jan 2016

Battle Of The Beds: The Economic Impact Of Airbnb On The Hotel Industry In Chicago And San Francisco, Katherine Goree

Scripps Senior Theses

The sharing economy is the private redistribution of goods via peer-to-peer sharing. Since internet use has saturated the U.S., the sharing economy has become widely internet-based. Airbnb, a website and app that facilitates the short-term rental of space to stay in another person’s home, has become a major component of the sharing economy.

This study includes an empirical analysis of the hotel occupancy rates in two major markets, San Francisco and Chicago, and how they have or have not changed, from the 2008 launch of Airbnb through the end of 2014. The study hypothesizes that Airbnb has had a statistically …


Customer Roles In Self-Service Technology Encounters In A Tourism Context, Petranka Kelly, Jennifer Lawlor, Michael Mulvey Jan 2016

Customer Roles In Self-Service Technology Encounters In A Tourism Context, Petranka Kelly, Jennifer Lawlor, Michael Mulvey

Articles

This paper reports on a study which explored the customer perspective on their roles in SST encounters in a tourism context, through the theoretical lens of service-dominant logic. The study employed short qualitative interviews with airline passengers at an international airport. The findings suggest that customers can assume six roles in an SST encounter which can be viewed as either positive or negative in terms of value creation. Therefore, a key contribution of this paper is the development of a role-experience continuum which depicts the variations in customer experiences of value creation in a tourism context.


Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya Jan 2016

Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya

Journal of International Technology and Information Management

Enterprise Systems (ES) is increasingly becoming the choice of IT platform for most large organizations in the world. As a result, the potential of such systems to create more business value is of key interest to both industry and academia. The aim of this study is to identify the key means of business value creation that Enterprise Systems can enable. The contribution of this paper is that it identifies and proposes four key means by which Enterprise Systems can create business value: (a) Operational Efficiency (b) Mergers and Acquisitions, (c) Innovation (in product and process), (d) Strategic Decision Making. This …


It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig Jan 2016

It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig

Journal of International Technology and Information Management

The issues, opportunities and challenges of effectively managing and governing an organization’s Information Technology (IT) demands, investments and resources has become a major concern of the Board and executive management in enterprises on a global basis. A rapidly growing number of organizations have become increasingly dependent on a broad array of technologies to manage and grow their businesses. IT is an integral part of most organizations today and will certainly become more critical in the future. This paper proposes a comprehensive and integrated IT governance framework and roadmap which identifies the appropriate current and emerging best practices methodologies for each …


Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro Jan 2016

Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro

Journal of International Technology and Information Management

Learning quality enhancement with Web 2.0 tools needs good implementation framework and lessons from best practice. However, there is not much research on what constitutes best practice in the implementation of Web 2.0 in learning activities. This research seeks to fill this gap by seeking the views of students and lecturers on increased adoption of Web 2.0 social tools in learning activities. The research reports on the quantitative and qualitative study carried out in UK. This research reveals that improved learning experience with the use of Web 2.0 tools in higher education is positively related to perceived usefulness, perceived ease …