Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

2019

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 50

Full-Text Articles in Technology and Innovation

Technology Acceptance Models And Theories In Library And Information Science Research, Muhamad Prabu Wibowo Nov 2019

Technology Acceptance Models And Theories In Library And Information Science Research, Muhamad Prabu Wibowo

Library Philosophy and Practice (e-journal)

There is a growing interest of studying technology implementation, acceptance, and adoption as there are a lot of new innovations regarding potential technologies that can be implemented in information institutions. This study tries to explore the application of theories and models of acceptance models in library and information science research. This study employs a systematic literature review to discuss the historical development of theories and models of technological acceptance and their potential use in the library and information science research. Models and theories of acceptance models have been continuously developed to accommodate reasons explaining users would accept and adopt new …


Corporate Innovation: Digitising Innovation Management, Suraya Sulaiman, Azim Pawanchik Nov 2019

Corporate Innovation: Digitising Innovation Management, Suraya Sulaiman, Azim Pawanchik

Asian Management Insights

Digitisation of innovation management allows organisations to spend less time managing innovation and more time on things that really matter.


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Internet Core Functions: Security Today And Future State, Jeffrey Jones Oct 2019

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley Oct 2019

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston Aug 2019

Intra-Organizational Communication, Understanding, And Process Diffusion In Logistics Service Providers, Scott J. Grawe, Peter M. Ralston

Peter Ralston

Purpose – The purpose of this paper is to investigate, using survey data, how a firm may be able to leverage innovation or processes specifically developed for one customer across its entire customer network using onsite, or implanted, employees.

Design/methodology/approach – Data collected from a survey of 309 implanted logistics service provider (LSP) representatives are analyzed using structural equation modeling.

Findings – The findings show that intra-organizational task interdependence and face-to-face communication can lead to a greater understanding of firm processes developed for specific customers and greater diffusion of these new processes to other customers. Rather than separating customers that …


Smart City Investments: A Rapid Decison Framework For Public Private Partnerships, Paul Sujith Rayi, Murali Venkatesh, Stephen Wallace, Rishie Lavendra Bothra Aug 2019

Smart City Investments: A Rapid Decison Framework For Public Private Partnerships, Paul Sujith Rayi, Murali Venkatesh, Stephen Wallace, Rishie Lavendra Bothra

School of Information Studies - Post-doc and Student Scholarship

The city of Syracuse in New York announced an ambitious smart city plan which, when fully implemented, promises to make it the most connected city in the northeastern US. Thanks to a strategic investment by the State of New York, the city is home to what is billed as the world’s first Drone Corridor for R&D. We outline a decision framework (The Syracuse Wheel) for public private partnership to help city leaders and private investors navigate the exciting implications stemming from these two strategic developments and the city’s environment to augment the priority areas of Autonomous Mobility and Connectivity. The …


Determinants Of Cloud Computing Intentions To Use: Role Of Firm’S Size, Managerial Structure And Industrial Sector, Shailja Tripathi Jul 2019

Determinants Of Cloud Computing Intentions To Use: Role Of Firm’S Size, Managerial Structure And Industrial Sector, Shailja Tripathi

Journal of International Technology and Information Management

Currently many companies are adopting cloud computing to accomplish their diverse purposes and to create an elastic and responsive environment that can rapidly respond to new business requirements. This paper attempts to investigate the factors influencing cloud computing adoption from the managerial perspective with inclusion of size of firm, organizational structure and type of industry as control variables. The model is developed with various technological, economic and cognitive factors that affect the behavioral intention to use cloud computing using technology acceptance model (TAM).Questionnaires were randomly distributed to around 1000 senior managers of various firms in India. Hierarchical multiple regression (HMR) …


Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che Jul 2019

Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che

Journal of International Technology and Information Management

In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.


Table Of Contents Jitim Vol 28 Issue 2, 2019 Jul 2019

Table Of Contents Jitim Vol 28 Issue 2, 2019

Journal of International Technology and Information Management

Table of Contents JITIM 2, 2019


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele Jul 2019

Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele

The African Journal of Information Systems

This study was set to model Green eBusiness adoption among SMTEs in Tanzania, right from sourcing, operations, and to end-of-life-management. The study employed the use of Structural Equation Modeling (SEM) to analyze quantitative data collected from 240 respondents selected from 80 SMTEs in Dar es Salaam, Kilimanjaro, Arusha, and Zanzibar, who were in operations for at least three years. Although there were twelve hypotheses formulated, only seven hypotheses (with constructs Self-Efficacy, Effort Expectancy, Facilitating Conditions, Coercive Pressures, Intention to Use both to commitment and to Green eBusiness, and Commitment towards Green eBusiness adoption) were revealed significant. Others (with constructs Performance …


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jun 2019

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani Jun 2019

Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani

Journal of Cybersecurity Education, Research and Practice

A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


Asymmetric Effects Of Cultural Institutes On Trade And Foreign Direct Investment, Donald Lien, Melody Lo, David Bojanic May 2019

Asymmetric Effects Of Cultural Institutes On Trade And Foreign Direct Investment, Donald Lien, Melody Lo, David Bojanic

Business and Information Technology Faculty Research & Creative Works

The Purpose of a Cultural Institute is to Improve International Relations with Other Countries by Promoting Language Familiarity and Cultural Awareness. in Addition, Cultural Institutes Can Provide Additional Business Opportunities that Lead to Positive Economic Side Effects Such as Increases in Trade and Foreign Direct Investment (FDI). in This Study, Gravity Models Were Used to Analyse the Data for the Goethe Institut (Germany), the Cervantes Institute (Spain) and the Confucius Institute (China) to Identify Any Stylised International Patterns of the Documented Economic Effects. the Study Finds Significant Positive Effects on Bilateral Trade and FDI Outflows for All Three Programmes, Along …


Ai Gets Real At Singapore's Changi Airport (Part 1), Steve Lee, Steven M. Miller May 2019

Ai Gets Real At Singapore's Changi Airport (Part 1), Steve Lee, Steven M. Miller

Asian Management Insights

Ranked as the best airport for seven consecutive years, Singapore’s Changi Airport is lauded the world over for the efficient, safe, pleasurable and seamless service it offers the millions of passengers that pass through its facilities annually. Much of Changi Airport’s success can be attributed to the organisation’s customer-oriented business focus and deeply embedded culture of service excellence, combined with a host of advanced technologies operating invisibly in the background. The framework for this technology enablement is Changi Airport Group’s (CAG’s) SMART Airport Vision—an enterprise-wide approach to connective technologies that leverages sensors, data fusion, data analytics, and artificial intelligence (AI), …


The Impact Of The Web And Social Media On The Performance Of Nonprofit Organizations, Namchul Shin May 2019

The Impact Of The Web And Social Media On The Performance Of Nonprofit Organizations, Namchul Shin

Journal of International Technology and Information Management

This research empirically analyzes the impact of both the Web and social media on the performance of nonprofit organizations by using 100 nonprofit organizations ranked by web traction measures, including Facebook Likes and Twitter Followers. Our findings from ANOVA and non-parametric tests demonstrate that nonprofit organizations with higher web traction have greater contributions and grants than others with lower web traction. These findings suggest that the use of the Web coupled with social media promotes better, interactive (two-way) communications with the public, as well as fundraising and that nonprofit organizations that attract more supporters on the Web and social media …


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …


Distilling Managerial Insights And Lessons From Ai Projects At Singapore's Changi Airport (Part 2), Steve Lee, Steven M. Miller May 2019

Distilling Managerial Insights And Lessons From Ai Projects At Singapore's Changi Airport (Part 2), Steve Lee, Steven M. Miller

Asian Management Insights

Since 2017, Changi Airport group (CAG) has initiated a host of pilot projects that use connective and intelligent technologies to enable its move towards digital transformation and SMART Airport Vision. This has resulted in a first wave of deployment of AI and Machine Learning-enabled applications across various functions that can better sense, analyse, predict, and interact with people.


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


Mobile Money And Socioeconomic Development: A Cross-Country Investigation In Sub-Saharan Africa, Wenxiu Vince Nan May 2019

Mobile Money And Socioeconomic Development: A Cross-Country Investigation In Sub-Saharan Africa, Wenxiu Vince Nan

Journal of International Technology and Information Management

Over the past decade, mobile money, as a disruptive financial services innovation, has been widely adopted in Sub-Saharan Africa where the majority of population was financially excluded. Despite the transformative role of mobile money, the macro-level socioeconomic implications have been weakly examined so far. To fill the research gap, this paper explores the theoretical and empirical links between mobile money and socioeconomic development. Drawing on the theory of technology affordances and the emerging mobile money literature, this paper argues that mobile money, when adopted on a massive scale, has the potential to lead to socioeconomic development at the societal level. …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …