Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (127)
- Association of Arab Universities (7)
- Southern Methodist University (6)
- Kennesaw State University (5)
- University of Central Florida (3)
-
- University of Rhode Island (3)
- Brigham Young University (2)
- Central Bank of Nigeria (2)
- Embry-Riddle Aeronautical University (2)
- University of Maryland Francis King Carey School of Law (2)
- University of South Florida (2)
- Walden University (2)
- Florida International University (1)
- Illinois Wesleyan University (1)
- Institute of Business Administration (1)
- Kansas State University Libraries (1)
- Karbala International Journal of Modern Science (1)
- Lindenwood University (1)
- Old Dominion University (1)
- Rochester Institute of Technology (1)
- Technological University Dublin (1)
- Universitas Indonesia (1)
- University of Denver (1)
- University of Georgia School of Law (1)
- University of Nebraska at Kearney (1)
- University of Nevada, Las Vegas (1)
- Vocational Training Council (1)
- Keyword
-
- ToC (10)
- Internet (6)
- Cybersecurity (5)
- Healthcare (5)
- TAM (5)
-
- Table (5)
- Technology (5)
- Classification (4)
- Contents (4)
- Data mining (4)
- Editor (4)
- Privacy (4)
- Social Media (4)
- Social media (4)
- Tanzania (4)
- AI (3)
- ARIMA (3)
- Blockchain (3)
- Information (3)
- International (3)
- Security (3)
- Trust (3)
- Adoption (2)
- Artificial intelligence (2)
- COVID-19 (2)
- Communication (2)
- Consumer (2)
- Covid-19 (2)
- Data analytics (2)
- Data collection (2)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (126)
- Future Computing and Informatics Journal (7)
- SMU Data Science Review (6)
- Human-Machine Communication (3)
- Journal of Cybersecurity Education, Research and Practice (3)
-
- Markets, Globalization & Development Review (3)
- International Journal of Applied Management and Technology (2)
- Journal of Business & Technology Law (2)
- The African Journal of Information Systems (2)
- Bullion (1)
- Business Review (1)
- Class, Race and Corporate Power (1)
- Communications of the IIMA (1)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (1)
- DU Undergraduate Research Journal Archive (1)
- Economic and Financial Review (1)
- Frameless (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- International Journal of Emerging and Disruptive Innovation in Education : VISIONARIUM (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Global Business Insights (1)
- Journal of Intellectual Property Law (1)
- Journal of Nonprofit Innovation (1)
- Kansas Library Association College and University Libraries Section Proceedings (1)
- Karbala International Journal of Modern Science (1)
- Marriott Student Review (1)
- Military Cyber Affairs (1)
- Mountain Plains Journal of Business and Technology (1)
- SIGNED: The Magazine of The Hong Kong Design Institute (1)
- Smart City (1)
Articles 151 - 178 of 178
Full-Text Articles in Computer Engineering
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Journal of International Technology and Information Management
Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Journal of International Technology and Information Management
To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Journal of International Technology and Information Management
This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
Journal of International Technology and Information Management
The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Journal of International Technology and Information Management
This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Journal of International Technology and Information Management
Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Journal of International Technology and Information Management
This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The ITB Journal
Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
UNLV Gaming Research & Review Journal
Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley
Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley
Journal of Business & Technology Law
No abstract provided.
Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman
Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman
Journal of Business & Technology Law
No abstract provided.
Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker
Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker
Journal of International Technology and Information Management
This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.
Is Tech M&A Value-Additive?, Ani Deshmukh
Is Tech M&A Value-Additive?, Ani Deshmukh
Undergraduate Economic Review
Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
The African Journal of Information Systems
In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …
Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor
Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor
Business Review
The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …
Data Generation In The Nigerian Environment: The Cbn Experience., A. A. Sere-Ejembi
Data Generation In The Nigerian Environment: The Cbn Experience., A. A. Sere-Ejembi
Bullion
The paper examines data collection activities of the statistical services division in collaboration with its Lagos liaison office as well as the zonal research units. The paper analyzes the survey methods applied by them. The task of easing data collection should be regarded as a continuous process. This is relevant even to the most developed economies with sophisticated technology for data collection and processing. Finally, with an improvement in the literacy level and overall appreciation of the role of reliable statistics in the country, it is believed that the public would embrace data generation and availability of relevant statistics will …