Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Abstracts (1)
- And Structural Equation Modeling (1)
- Augmented reality (1)
- Awareness (1)
- Barcode scanning (1)
-
- Cloud Computing; SAM Framework; CCT-Business Alignment (1)
- Computer-mediated communication (1)
- Covid-19 (1)
- Credit card fraud detection (1)
- Cyber Cybersecurity Range Education Defense (1)
- Cyber-physical device security (1)
- Decision tree (1)
- Digital economy (1)
- Digital transformation (1)
- Discussion forums (1)
- Disruptive technology (1)
- E-payment (1)
- Employment (1)
- History of technology (1)
- ICT Diffusion (1)
- ICT adoption (1)
- ICT evolution (1)
- India (1)
- Indian Railways (1)
- Information technology law (1)
- Intention to use; Internet of things; perceived privacy risk; pro-environmental behavior; Smart home devices (1)
- International commerce (1)
- Internet of Things (IoT) (1)
- Inventory control (1)
- JITIM ToC (1)
Articles 1 - 16 of 16
Full-Text Articles in Computer Engineering
Nigeria’S Budding Digital Economy: Coping With Disruptive Technology, Olugbenga Agboola
Nigeria’S Budding Digital Economy: Coping With Disruptive Technology, Olugbenga Agboola
Economic and Financial Review
For a thriving and inclusive digital economy, African countries such as Nigeria need to build the critical foundations of the digital economy (World Bank Group, 2019). These foundations are interdependent and require public and private sector solutions.
Hey Google: Does Environmental Beliefs And Perceived Privacy Risk Influence Potential User’S Intention To Use A Smart Home System In Indonesia?, Adrian Adhe Elian, Imam Salehudin
Hey Google: Does Environmental Beliefs And Perceived Privacy Risk Influence Potential User’S Intention To Use A Smart Home System In Indonesia?, Adrian Adhe Elian, Imam Salehudin
Smart City
Automation technology has grown in a rapid pace recently. One of the technology that is growing rapidly right now is the Internet of Things or IoT. IoT consist of many devices, and one of the IoT device that are popular right now is called the smart home device. This smart home device can be use to make the house of the user be smart and can be use to save energy for efficiency for the daily life of the user, such as electricity and water that kan provide a negative impact on the environment if used extensively. This smart home …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York
Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York
DU Undergraduate Research Journal Archive
Abstracts from the DU Undergraduate Showcase.
The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine
The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine
Military Cyber Affairs
Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.
[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]
Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink
Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink
Frameless
Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.
Human-Machine Communication: Complete Volume 4
Human-Machine Communication: Complete Volume 4
Human-Machine Communication
This is the complete volume of HMC Volume 4.
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
Journal of International Technology and Information Management
Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Journal of International Technology and Information Management
While there is an identifiable trend towards protecting consumers from data breaches and data misuses related to IoT devices through new legislation, new regulations, government enforcement actions, and private lawsuits, there has been little progress towards creating similar legally enforceable standards of care for “cyber-physical device security.” This article explores this underdeveloped area of academic inquiry into cyber-physical device security within the context of product liability litigation in the United States. The two questions addressed in this article are: (1) Have there been any successful products liability court decisions in the United States that have held IoT manufacturers liable for …
Online Discussion Forum And Pre-Migration Information Seeking: An Affordance Perspective, Daniel Gulanowski, Luciara Nardon, Michael J. Hine
Online Discussion Forum And Pre-Migration Information Seeking: An Affordance Perspective, Daniel Gulanowski, Luciara Nardon, Michael J. Hine
Journal of International Technology and Information Management
Potential immigrants increasingly rely on online technologies to access needed information as they have limited access to offline sources of information at the pre-arrival stage. The purpose of this paper is to investigate the role of online discussion forums in facilitating potential immigrants’ access to relevant information about the host country labor market. This paper draws on extant literature on computer-mediated communication and a qualitative content analysis of 363 forum discussions to explore the phenomenon of increased use of online forums by prospective immigrants to Canada to access relevant labor market information. We draw on existing concepts of technology affordances …
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Journal of International Technology and Information Management
Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Journal of International Technology and Information Management
Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …
Jitim Front Cover Vol 31 1 2022
Jitim Front Cover Vol 31 1 2022
Journal of International Technology and Information Management
Table of Content JITIM Vol 31. issue 1, 2022
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Journal of International Technology and Information Management
JITIM ToC
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Journal of International Technology and Information Management
Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …