Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (16)
- Singapore Management University (15)
- Association of Arab Universities (6)
- University of Nebraska - Lincoln (5)
- University of Arkansas, Fayetteville (4)
-
- Kennesaw State University (3)
- Universidad de La Salle (3)
- California Polytechnic State University, San Luis Obispo (2)
- City University of New York (CUNY) (2)
- Florida International University (2)
- Old Dominion University (2)
- The University of Akron (2)
- University of Central Florida (2)
- Air Force Institute of Technology (1)
- Butler University (1)
- Clemson University (1)
- DePaul University (1)
- Karbala International Journal of Modern Science (1)
- Tashkent State Technical University (1)
- Technological University Dublin (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of Louisville (1)
- University of San Diego (1)
- Western Michigan University (1)
- William & Mary (1)
- Keyword
-
- Blockchain (3)
- Cybersecurity (3)
- Database (3)
- Machine learning (3)
- ToC (3)
-
- Academic Libraries (2)
- Classification (2)
- Computer science (2)
- Computer vision (2)
- Critical Success Factors (2)
- Data mining (2)
- Digital Transformation (2)
- Digitization (2)
- Image segmentation (2)
- Industry 4.0 (2)
- Innovation (2)
- IoT (2)
- Storage (2)
- Trust (2)
- 2.5 D (1)
- ADMM (1)
- AGC (1)
- Acquisition (1)
- Ad hoc video search (1)
- Adoption (1)
- Agroindustria (1)
- Algorithm (1)
- Algorithms (1)
- Allergic Reactions (1)
- Almacenamiento de energia (1)
- Publication
-
- Journal of International Technology and Information Management (16)
- Research Collection School Of Computing and Information Systems (15)
- Future Computing and Informatics Journal (6)
- Library Philosophy and Practice (e-journal) (5)
- Graduate Theses and Dissertations (3)
-
- Electronic Theses and Dissertations, 2020-2023 (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- FIU Electronic Theses and Dissertations (2)
- Ingeniería en Automatización (2)
- Publications and Research (2)
- Symposium of Student Scholars (2)
- Williams Honors College, Honors Research Projects (2)
- All Theses (1)
- Articles (1)
- CDM Annual Reports (1)
- Chemical Technology, Control and Management (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Digital Initiatives Symposium (1)
- Dissertations (1)
- Electronic Theses and Dissertations (1)
- Honors Scholar Theses (1)
- Industrial and Manufacturing Engineering (1)
- Ingeniería Eléctrica (1)
- Karbala International Journal of Modern Science (1)
- Master of Science in Computer Science Theses (1)
- Master's Theses (1)
- Scholarship and Professional Work - Business (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- Undergraduate Honors Theses (1)
- Publication Type
Articles 61 - 77 of 77
Full-Text Articles in Computer Engineering
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin
Engineering Management & Systems Engineering Faculty Publications
In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li
Engineering Management & Systems Engineering Faculty Publications
Generative adversarial networks (GANs) have become very popular in recent years. GANs have proved to be successful in different computer vision tasks including image-translation, image super-resolution etc. In this paper, we have used GAN models for ship deck segmentation. We have used 2D scanned raster images of ship decks provided by US Navy Military Sealift Command (MSC) to extract necessary information including ship walls, objects etc. Our segmentation results will be helpful to get vector and 3D image of a ship that can be later used for maintenance of the ship. We applied the trained models to engineering documents provided …
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system can …
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Journal of International Technology and Information Management
Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Conference Proceedings Of The 32nd Annual Iima Conference
Conference Proceedings Of The 32nd Annual Iima Conference
Journal of International Technology and Information Management
Conference Proceedings of the 32nd Annual IIMA Conference
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Journal of International Technology and Information Management
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and …
Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang
Distributed Cross-Community Collaboration For The Cloud-Based Energy Management Service, Yu-Wen Chen, J. Morris Chang
Publications and Research
Customers’ participation is a critical factor for inte-grating the distributed energy resources via demand response and demand-side management programs, especially when customers become prosumers. Incentives need to be delivered by the energy management service to attract prosumers to operate their distributed energy resources and electricity loads grid-friendly actively. The cloud-based energy management service enables virtual trading for customers within the same community to minimize cost and smooth the fluctuation. With the potential fast-growing number of service providers and customers, the needs exist for efficiently collaborating across multiple service providers and customers. This paper proposes the distributed cross-community collaboration (XCC) for …
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Journal of International Technology and Information Management
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless …
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Journal of International Technology and Information Management
There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …
Table Of Contents Jitim Vol 29 Issue 4
Table Of Contents Jitim Vol 29 Issue 4
Journal of International Technology and Information Management
table of contents
Table Of Contents Jitim Vol 30 Issue 1, 2021
Table Of Contents Jitim Vol 30 Issue 1, 2021
Journal of International Technology and Information Management
Table of Content
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
Journal of International Technology and Information Management
From our study, all three covid-19 vaccines have a similar proportion of adverse reaction reports in which the patient had a history of allergies. However, the proportion of life-threatening outcomes were lower for those with the Janssen vaccine (0.62% hospitalization rate for Janssen versus 2.59% for Pfizer and 0.60% death for Janssen versus 5.15% for Moderna). In terms of specific allergies, patients with *cillin or sulfa allergies had the most adverse reactions to covid-19 vaccines, however, Janssen again had the lowest percentage of reported deaths (1.39% for *cillin-related allergy deaths for Janssen versus 6.10% for Pfizer). In terms of patient …
Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch
Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch
Journal of International Technology and Information Management
Technological developments go fast and are interrelated and multi-interpretable. As consumer needs change, the technological possibilities to meet those needs are constantly evolving and new technology providers introduce new disruptive business models. This makes it difficult to predict what the world of tomorrow will look like for an organization and that makes the risks for organizations substantial. In this context, it is difficult for organizations to determine what constitutes a good strategy to adopt digital developments.
This paper describes a first step of a study with the objective to design a method for organizations to formulate a future-proof strategy in …
Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin
Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin
Journal of International Technology and Information Management
The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
Journal of International Technology and Information Management
Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative …