Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Communication Technology and New Media

Articles 1 - 28 of 28

Full-Text Articles in Technology and Innovation

Retirement Reboot: A Website Redesign, Christina Gillen Dec 2016

Retirement Reboot: A Website Redesign, Christina Gillen

Honors Projects

A website could be created with the latest technology, but after a few years it will still need to be updated. This is what happened to Swanton Health Care and Retirement Center’s website. This project is designed to remedy the problem by creating an entirely new website with updated content, images, and interactive features to bring Swanton Health Care’s online presence back to life.


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


The Study Of Traditional And Non-Traditional Marketing Communications: Target Marketing In The Events Sector., Gordon Geraghty, Ann T. Conway Jun 2016

The Study Of Traditional And Non-Traditional Marketing Communications: Target Marketing In The Events Sector., Gordon Geraghty, Ann T. Conway

Conference papers

There is a vast array of information on marketing but there is little literature on event marketing, specifically target marketing for events. The event sector is one that is constantly changing; the need to reinvent, innovate and self-disrupt is part and parcel for a sector that seeks to constantly entertain and turn a profit, so too is the marketing sector.

The research was carried out using face-to-face in-depth interviews and 1 focus group, all of which were audio recorded with the consent of the participants. The sample comprises of event and marketing professionals. The analysis focused on research’s objectives and …


Argumentation In Large, Complex Practices, Mark Aakhus, Paul Ziek, Punit Dadlani May 2016

Argumentation In Large, Complex Practices, Mark Aakhus, Paul Ziek, Punit Dadlani

OSSA Conference Archive

Differences arise in macro-activities, such as the production of energy, food, and healthcare, where the management of these differences happens in polylogues as many actors pursue scores of positions on a variety of issues in numerous venues. Polylogues are essential to the large-scale practices that organize macro-activities but present significant challenges for argumentation theory and research. Key to the challenge is conceptualizing the variety of argumentative roles that go beyond the classic normative definition of protagonist and antagonist. A macroscope is devised for identifying argumentative roles in the communicative work of organizations, and the communicative work of the network of …


How Android App Developers Manage Power Consumption? An Empirical Study By Mining Power Management Commits, Lingfeng Bao, David Lo, Xin Xia, Xinyu Wang, Cong Tian May 2016

How Android App Developers Manage Power Consumption? An Empirical Study By Mining Power Management Commits, Lingfeng Bao, David Lo, Xin Xia, Xinyu Wang, Cong Tian

Research Collection School Of Computing and Information Systems

As Android platform becomes more and more popular, a large amount of Android applications have been developed. When developers design and implement Android applications, power consumption management is an important factor to consider since it affects the usability of the applications. Thus, it is important to help developers adopt proper strategies to manage power consumption. Interestingly, today, there is a large number of Android application repositories made publicly available in sites such as GitHub. These repositories can be mined to help crystalize common power management activities that developers do. These in turn can be used to help other developers to …


Wet Grain Delivery Advice: A Previously Impossible Extension Challenge Solved Through App Technology, Joseph S. Dvorak, Sam Mcneill, Clint Hardy Apr 2016

Wet Grain Delivery Advice: A Previously Impossible Extension Challenge Solved Through App Technology, Joseph S. Dvorak, Sam Mcneill, Clint Hardy

Biosystems and Agricultural Engineering Faculty Publications

The delivery of wet grain during harvest is a complex and constantly changing problem about which Extension professionals have been unable to offer more than general advice. By capitalizing on important characteristics of mobile devices, a new app enables producers to fully benefit from detailed information universities have generated on grain drying and costs associated with delivery of grain to different locales. Development of such an app demonstrates the power of apps and mobile devices in allowing Extension to deliver previously unattainable services to its clientele.


Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu Jan 2016

Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu

Journal of International Technology and Information Management

To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.


Women's Professional Sports: A Case Study On Practices That Could Increase Their Profitability, Danielle H. Mcardle Jan 2016

Women's Professional Sports: A Case Study On Practices That Could Increase Their Profitability, Danielle H. Mcardle

Honors Undergraduate Theses

Women’s professional sports leagues have often been considered a risky business endeavor. Critics cite low attendance, lack of sponsorships, lack of media rights deals, and numerous other reasons for why women’s professional sports leagues are not profitable. In analyzing the current landscape of women’s professional sport leagues, this paper uses a case study approach to develop a strategy that will highlight lessons learned from past women’s professional sports leagues, current professional sports leagues, sponsorship agreements, fans, social, digital, and mobile marketing strategies, and management practices to show how the business of women’s sports could be made into a more profitable …


Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith Jan 2016

Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith

Journal of International Technology and Information Management

Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …


Yik Yak Posts: A Discourse Analysis, Snehal Ravindra Shirke Jan 2016

Yik Yak Posts: A Discourse Analysis, Snehal Ravindra Shirke

Masters Theses

"Anonymity and geolocation create a unique environment for users to communicate with each other. Discourse analysis was conducted to study the posts made on Yik Yak, an anonymous social networking mobile application to understand the communication patterns on an anonymous platform and the posts about taboo topics. The posts were analyzed specifically for patterns on taboo topics and how students interact on the anonymous platform on a particular campus (Missouri S&T campus). Student research assistants coded the collected posts into the pre-defined taboo categories namely sexual activity, non-sexual bodily functions, sexual orientation, mental/emotional health, and "other" taboo topics. I found …


Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor Jan 2016

Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor

Journal of International Technology and Information Management

This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.


Online Trust Cues: Perceptions And Application, Antonina A. Bauman Jan 2016

Online Trust Cues: Perceptions And Application, Antonina A. Bauman

Journal of International Technology and Information Management

This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …


Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa Jan 2016

Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa

Journal of International Technology and Information Management

This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani Jan 2016

The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani

Journal of International Technology and Information Management

The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.