Open Access. Powered by Scholars. Published by Universities.®
Operations Research, Systems Engineering and Industrial Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (163)
- Operational Research (163)
- Management Information Systems (162)
- Technology and Innovation (161)
- Management Sciences and Quantitative Methods (159)
-
- Business Intelligence (157)
- E-Commerce (157)
- Social and Behavioral Sciences (96)
- Computer Engineering (95)
- Science and Technology Studies (95)
- Communication (94)
- Computer and Systems Architecture (94)
- Information Literacy (94)
- Library and Information Science (94)
- Communication Technology and New Media (93)
- Digital Communications and Networking (92)
- Social Media (92)
- Data Storage Systems (88)
- Business Administration, Management, and Operations (3)
- Business Analytics (3)
- Education (2)
- Educational Methods (2)
- Educational Technology (2)
- Computer Law (1)
- Computer Sciences (1)
- Consumer Protection Law (1)
- Educational Assessment, Evaluation, and Research (1)
- Educational Psychology (1)
- Keyword
-
- Technology (27)
- Information (25)
- Internet (18)
- IT (14)
- Systems (14)
-
- Management (10)
- ToC (10)
- Economy (9)
- Online (9)
- Web (9)
- Business (8)
- IS (7)
- Consumer (6)
- Market (5)
- Network (5)
- System (5)
- Table (5)
- Contents (4)
- Editor (4)
- International (4)
- Mobile (4)
- Programming (4)
- Project (4)
- Security (4)
- Simulation (4)
- Social media (4)
- Tanzania (4)
- Traffic (4)
- Trust (4)
- AI (3)
Articles 91 - 120 of 164
Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani
Journal of International Technology and Information Management
The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …
Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya
Identifying Four Key Means Of Business Value Creation Using Enterprise Systems: An Empirical Study, Prithvi Bhattacharya
Journal of International Technology and Information Management
Enterprise Systems (ES) is increasingly becoming the choice of IT platform for most large organizations in the world. As a result, the potential of such systems to create more business value is of key interest to both industry and academia. The aim of this study is to identify the key means of business value creation that Enterprise Systems can enable. The contribution of this paper is that it identifies and proposes four key means by which Enterprise Systems can create business value: (a) Operational Efficiency (b) Mergers and Acquisitions, (c) Innovation (in product and process), (d) Strategic Decision Making. This …
It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig
It Governance-An Integrated Framework And Roadmap: How To Plan, Deploy And Sustain For Improved Effectiveness, Gad J. Selig
Journal of International Technology and Information Management
The issues, opportunities and challenges of effectively managing and governing an organization’s Information Technology (IT) demands, investments and resources has become a major concern of the Board and executive management in enterprises on a global basis. A rapidly growing number of organizations have become increasingly dependent on a broad array of technologies to manage and grow their businesses. IT is an integral part of most organizations today and will certainly become more critical in the future. This paper proposes a comprehensive and integrated IT governance framework and roadmap which identifies the appropriate current and emerging best practices methodologies for each …
Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro
Enhancing The Use Of Web 2.0 Technologies In Higher Education: Students’ And Lectures’ Views, Razep Echeng, Abel Usoro
Journal of International Technology and Information Management
Learning quality enhancement with Web 2.0 tools needs good implementation framework and lessons from best practice. However, there is not much research on what constitutes best practice in the implementation of Web 2.0 in learning activities. This research seeks to fill this gap by seeking the views of students and lecturers on increased adoption of Web 2.0 social tools in learning activities. The research reports on the quantitative and qualitative study carried out in UK. This research reveals that improved learning experience with the use of Web 2.0 tools in higher education is positively related to perceived usefulness, perceived ease …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor
Journal of International Technology and Information Management
This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith
Journal of International Technology and Information Management
Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Online Trust Cues: Perceptions And Application, Antonina A. Bauman
Journal of International Technology and Information Management
This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Journal of International Technology and Information Management
Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.
Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl
Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl
Journal of International Technology and Information Management
The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …
Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman
Usability Investigation Of E-Business Web-Based Forms, Gerald V. Post, Albert Kagan, Betsy Page Sigman
Journal of International Technology and Information Management
Usability on Web sites is critical because almost no training is provided for users on commercial sites. Instead, Web design relies on standards and consistency across sites. Traditional usability results indicated that computer forms should follow paper-based forms. Yet, Web paradigms have evolved that are quite different from paper-based forms. Specifically, this study reveals that users commit fewer errors and prefer simple forms limited to a single concept per screen. This conclusion significantly alters the recommendations for designing business forms.
Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom
Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom
Journal of International Technology and Information Management
Knowledge libraries hold the promise of widespread access to information available anywhere, anytime, freeing patrons from the geographical and temporal boundaries that currently exist. The classification of materials and subsequent searching of knowledge library content is an overall problem with many complex parts. Relevant classification is important for optimal information retrieval. This is especially important for the virtual communities that exist with extended organizations. Rooted in the virtual community and digital library literature, this paper develops a theory for improving the information classification and retrieval process of knowledge libraries that support virtual communities by applying social bookmarking techniques.
Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan
Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan
Journal of International Technology and Information Management
A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …
Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih
Can Information Systems Foster Emotional Intelligence? A Design Theory-Based Approach, Richard J. Burkhard, Thomas A. Horan, Brian N. Hilton, Michael Leih
Journal of International Technology and Information Management
Researchers in Information Systems (IS) have conducted extensive research into various kinds of collaboration systems over the last twenty-five years. A parallel stream of inquiry in psychology and management has developed research in organizational Emotional Intelligence, which contributes to the effectiveness of group interactions by increasing cooperation and reducing conflict. Collaboration systems present a special opportunity to introduce soft management functions such as Emotional Intelligence because they are designed as an intelligent channel of interaction between group members. This research used an Information Systems Design Theory approach to guide the integration of Emotional Intelligence functions into collaboration systems. Two artifact …
Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski
Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski
Journal of International Technology and Information Management
A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Journal of International Technology and Information Management
The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
Journal of International Technology and Information Management
Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …
Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma
Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma
Journal of International Technology and Information Management
Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …
In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen
In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen
Journal of International Technology and Information Management
Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Journal of International Technology and Information Management
This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
Journal of International Technology and Information Management
The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …
Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff
Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff
Journal of International Technology and Information Management
This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.