Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Engineering

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D Jun 2020

The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …


Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D Dec 2017

Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D

Department of Educational Administration: Faculty Publications

Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison Jan 2011

Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash Jan 2007

Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash

Journal of International Technology and Information Management

The paper reports the development of an e-monitoring and maintenance system based on web technology and mobile device, PDA. Rarity of experts led to the application of artificial intelligence and later, distributed artificial intelligence for condition monitoring and diagnosis of machine condition. Recently, web technology along with wireless communication is emerging as a potent tool in maintenance. It facilitates obtaining of the desired information by the relevant personnel at any time wherever he may be. The paper first describes the web and mobile architecture that formed the basis of the system and ICT tools used to communicate among the different …


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder Jan 2007

An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder

Journal of International Technology and Information Management

The C language and its derivatives have been some of the dominant higher-level languages used, and the maturity has stemmed several newer languages that, while still relatively young, possess the strength of decades of trials and experimentation with programming concepts. While C++ was a major step in the advancement from procedural to object-oriented programming (with a backbone of C), several problems existed that prompted the development of new languages. This paper focuses on one such language: D. D was designed as a potential successor to C++, supporting most features of C++’s class design and modifications intended to ease common program …


A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt Jan 2005

A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt

Journal of International Technology and Information Management

Ultra-wideband (UWB) is a promising class of high-speed wireless communications applications that is projected to significantly change local and wide area network architectures. This article describes the technology, its probable application areas, the environmental forces that are constraining and enabling commercialization, and the prospects for short-term growth for UWB services. Commercial sale and distribution of UWB products has been approved, and widespread sale is expected by 2007.


Information View Of Organization, Bob Travica Jan 2005

Information View Of Organization, Bob Travica

Journal of International Technology and Information Management

This article proposes an information view of organization that brings the information systems field closer to organization theory. Although voluminous bodies of literature have been developed within each of these disciplines and links between them do exist, their mutual informing is still insufficient. The proposed view of organization is intended to help convey results of information systems research to organizational scholars, while broadening theoretical horizons of the former. This article discusses the premises, conceptual framework, examples, and preliminary evidence of the information view of organization.


Internet Technology In 2010: The Issue Of Ipv6 Adoption In The U.S.A., Garry L. White, Jaymeen R. Shah, James R. Cook Jan 2005

Internet Technology In 2010: The Issue Of Ipv6 Adoption In The U.S.A., Garry L. White, Jaymeen R. Shah, James R. Cook

Journal of International Technology and Information Management

Computer industry literature suggests that IPv4 Internet addresses are likely to have been depleted by the year 2010, and at least Asia and Europe will be using the new IPv6 Internet addresses. Literature also suggests that the U.S.A. is lagging behind Asia and Europe with the implementation of IPv6. Empirical data supporting the fact that the U.S.A. is lagging behind is not available in the literature. This paper presents the issues regarding IPv6, reasons why Asia and Europe are implementing IPv6, and why the U.S.A. is lagging behind. Empirical data is presented to support the literature’s suggestion that the U.S.A. …


Building Data Warehouses Using The Enterprise Modeling Framework, Joseph O. Chan Jan 2004

Building Data Warehouses Using The Enterprise Modeling Framework, Joseph O. Chan

Journal of International Technology and Information Management

This paper proposes an enterprise modeling framework for the deployment of data warehouses. The framework provides the information roadmap coordinating source data and different data warehouses across the business enterprise. The paper introduces a solution to address data warehousing issues at the enterprise level while avoiding the pitfalls of creating enterprise data warehouses and universal data marts. It further proposes a change of paradigm from point solutions focus to a methodology driven by enterprise requirements to meet the challenges of the new economy. The proposed framework emphasizes the separation of the conceptual construct from the physical and operational constructs of …


Development Of An It Balanced Scorecard, Theophilus B.A. Addo, Chee W. Chow, Kamal M. Haddad Jan 2004

Development Of An It Balanced Scorecard, Theophilus B.A. Addo, Chee W. Chow, Kamal M. Haddad

Journal of International Technology and Information Management

There is a generally acknowledged dearth of metrics for effectively measuring organizational performance. This is particularly true of the IT function, whose contribution to a firm’s “bottom line” has been frequently called to question. This paper describes the development of a performance measurement tool called the Balanced Scorecard, which can be used to assess IT performance within the context of overall corporate strategy and financial performance. Data for the scorecard was obtained via a survey of senior IT executives in various organizations. The paper concludes with a set of guidelines for successfully implementing an IT Balanced Scorecard, as well as …