Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Business

Institution
Keyword
Publication Year
Publication

Articles 151 - 178 of 178

Full-Text Articles in Computer Engineering

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu Jan 2016

Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu

Journal of International Technology and Information Management

To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.


Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa Jan 2016

Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa

Journal of International Technology and Information Management

This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …


The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani Jan 2016

The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani

Journal of International Technology and Information Management

The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor Jan 2016

Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor

Journal of International Technology and Information Management

This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.


Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith Jan 2016

Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith

Journal of International Technology and Information Management

Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …


Online Trust Cues: Perceptions And Application, Antonina A. Bauman Jan 2016

Online Trust Cues: Perceptions And Application, Antonina A. Bauman

Journal of International Technology and Information Management

This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley Jan 2014

Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley

Journal of Business & Technology Law

No abstract provided.


Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman Jan 2014

Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman

Journal of Business & Technology Law

No abstract provided.


Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker Apr 2013

Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker

Journal of International Technology and Information Management

This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.


Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu Oct 2012

A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu

The African Journal of Information Systems

In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …


Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor Jul 2007

Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor

Business Review

The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …


Data Generation In The Nigerian Environment: The Cbn Experience., A. A. Sere-Ejembi Apr 2000

Data Generation In The Nigerian Environment: The Cbn Experience., A. A. Sere-Ejembi

Bullion

The paper examines data collection activities of the statistical services division in collaboration with its Lagos liaison office as well as the zonal research units. The paper analyzes the survey methods applied by them. The task of easing data collection should be regarded as a continuous process. This is relevant even to the most developed economies with sophisticated technology for data collection and processing. Finally, with an improvement in the literacy level and overall appreciation of the role of reliable statistics in the country, it is believed that the public would embrace data generation and availability of relevant statistics will …