Do Online Consumers Value Corporate Social Responsibility More In Times Of Uncertainty?: Evidence From Online Auctions Conducted During The Onset Of The Covid-19 Pandemic,
2023
University of Louisville
Do Online Consumers Value Corporate Social Responsibility More In Times Of Uncertainty?: Evidence From Online Auctions Conducted During The Onset Of The Covid-19 Pandemic, Andrew S. Manikas, James R. Kroes, E. Shaunn Mattingly, Garrett A. Mcbrayer
IT and Supply Chain Management Faculty Publications and Presentations
The relationships between Corporate Social Responsibility (CSR) and consumer behaviors have been widely explored in the literature. From the consumer standpoint, it has been shown that individuals largely want to be socially responsible actors and that, more than ever, they consider the CSR aspects of products or services when contemplating purchasing decisions. We utilize data from 23,247 online auctions conducted before and during the COVID-19 pandemic to analyze in what way consumer preferences might be influenced by how the CSR characteristics of products are touted in their descriptions. We find that a greater CSR emphasis is positively associated with an …
Understanding The Role Of Social Media Marketing And Technology Adoption Model In Shaping Customer Adoption Of Digital Banking,
2023
Universitas Indonesia
Understanding The Role Of Social Media Marketing And Technology Adoption Model In Shaping Customer Adoption Of Digital Banking, Jonathan Bagus Pradhana Basoeki, Anna Amalyah Agus
The South East Asian Journal of Management
Research Aims: The present research aims to investigate factors that significantly influence customers’ behavioural intention to use digital banking products. Following prior work on social media marketing and the influence of conglomerate group benefits, in addition to providing a comprehensive understanding, the research incorporates three established theories: the Theory of Planned Behaviour, the Technology Acceptance Model, and the Unified Theory of Acceptance and Use of Technology.
Design/Methodology/Approach: The sample consists of current Allo Bank users. Data collection involved convenience sampling and a self-administered online questionnaire filled out by 262 respondents in Jakarta, Indonesia. The data analysis technique used was SEM …
Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis,
2023
Adeleke University, Ede, Osun State, Nigeria
Navigating The Ethical And Legal Terrains Of Ai Tool Deployment: A Comparative Legal Analysis, Roland Akindele, Stella Jesuloluwa Adewuyi
Communications of the IIMA
The pervasive influence of technology has revolutionised numerous sectors across the globe, underscoring the need for a comprehensive evaluation of the tools that technology has engendered. Artificial Intelligence (AI), as a prominent technological tool, has exceeded expectations and proven immensely beneficial to humanity. Consequently, it is imperative to scrutinise the ethical and regulatory frameworks governing its application. This paper employs a doctrinal methodology to analyse the regulatory landscape and ethical guidelines surrounding AI technology in Nigeria and some selected jurisdictions. The findings highlight the necessity of establishing a robust governance system to govern the utilisation of this transformative technology. In …
The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector,
2023
HU University of Applied Sciences
The Influence Of Hybrid Working In The Context Of Agile Software Development Within The Dutch Financial Sector, Joris Zomerdijk, Benny De Waal
Communications of the IIMA
The COVID-19 pandemic has accelerated remote working and working at the office. This hybrid working is an indispensable part of today's life even within Agile Software Development (ASD) teams. Before COVID-19 ASD teams were working closely together in an Agile way at the office. The Agile Manifesto describes 12 principles to make agile working successful. These principles are about working closely together, face-to-face contact and continuously responding to changes. To what extent does hybrid working influence these agile principles that have been indispensable in today's software development since its creation in 2001? Based on a quantitative study within 22 Dutch …
A Framework For Building Cognitive Knowledge Management Systems,
2023
University of Dallas
A Framework For Building Cognitive Knowledge Management Systems, Samir Jarjoui, Renita Murimi
Communications of the IIMA
Knowledge Management Systems (KMSs) are a critical component of economic development and growth. The accumulation and effective utilization of knowledge capabilities allow firms to create value and improve competitiveness. However, recent technological advances in KMSs have outpaced research in this area, which continues to be siloed and characterized by a lack of cohesive frameworks and a limited focus on cognitive learning. This paper provides a conceptual framework for the development of cognitive KMSs. The proposed framework comprises of strategy, people, processes, learning, and technology that are designed to improve knowledge management and organizational memory.
Enterprise Architecture In Healthcare Networks: A Systematic Literature Review,
2023
HAN University of Applied Sciences
Enterprise Architecture In Healthcare Networks: A Systematic Literature Review, Arjen Maris, Stijn Hoppenbrouwers, Jos Van Hillegersberg
Communications of the IIMA
Healthcare organizations collaborate, share knowledge, and need to be accountable to each other. Therefore, healthcare organizations manage a dynamic information system landscape. Enterprise Architecture (EA) is a management tool for aligning these landscapes to the primary information needs that healthcare organizations have. EA is of value in some environments, but it seems to be not well suited to the dynamics of healthcare. Despite the publication of several systematic literature reviews on EA in healthcare, a systematic literature study comparing EA applicability at various levels of cooperation (intra, inter, and network collaboration) is lacking. Therefore, we posed the following research question: …
Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals,
2023
Central Connecticut State University
Electronic Clinical Quality Measures Of Health Information Technology And Hospital Performance: Evidence Of U.S. Hospitals, C. Christopher Lee, Hyoun Sook Lim, Decorti Rodgers-Tonge, Lisa Frank
Communications of the IIMA
Electronic clinical quality measures (eCQMs) are an integral part of health information technology (HIT). This study explores the effect of eCQM implementation on hospital performance. The study proposes hospital profitability, efficiency, and quality to measure hospital performance. Based on the literature, this research hypothesizes that implementing eCQMs would positively impact hospital profitability, efficiency, and quality. The sample data are drawn from the 2017 American Hospital Association (AHA) U.S. Hospital Survey datasets (N = 6282), the 2017 AHA U.S. Hospital I.T. Survey dataset (N = 3451), and the 2017 Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) datasets (N = …
Towards A Domain – Specific Comparative Analysis Of Data Mining Tools,
2023
Quinnipiac University
Towards A Domain – Specific Comparative Analysis Of Data Mining Tools, May Oo, Daniel Lozovikas, Ramesh Subramanian
Communications of the IIMA
Advancement in technology has brought in widespread adoption and utilization of data mining tools. Successful implementation of data mining requires a careful assessment of the various data mining tools. Although several works have compared data mining tools based on usability, opensource, integrated data mining tools for statistical analysis, big/small scale, and data visualization, none of them has suggested the tools for various industry-sectors. This paper attempts to provide a comparative study of various data mining tools based on popularity and usage among various industry-sectors such as business, education, and healthcare. The factors used in the comparison are performance and scalability, …
Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments,
2023
Quinnipiac University
Examining The Relevance Of Indian Logical Traditions And Present-Day Ai Developments, Ramesh Subramanian
Communications of the IIMA
This paper is an essay on the differences between “formal” Western logic and Indian logical traditions and how the latter impacts present-day AI developments. Upon the colonization of India, Western philosophers often dismissed Indian logical constructs as being underdeveloped or clumsy. Others, however, saw such denigration as emanating from Western racial prejudice rather than objectivity. This debate has persisted. I discuss the salient aspects of this debate, and then focus on the inductive aspects of Indian logic. This is especially relevant to the present, when there is an explosion of artificial intelligence based applications. I discuss the salient features of …
Forecasting Gasoline Price With Time Series Models,
2023
Fairfield University
Forecasting Gasoline Price With Time Series Models, Xin James He
Communications of the IIMA
This research forecasts the gasoline price in U.S. and analyzes its managerial implications by means of both univariate and multivariate time series forecasting models. Gasoline price forecast is among the most difficulty time series variables during its importance to the economy and extremely volatile nature. The average regular gasoline price in U.S. reached $5.06 per gallon in the month of June 2022, as opposed to $3.41 at the beginning of 2022, a 48% increase. While gasoline prices had been rising over the first half of 2022 due to supply chain disruptions as a result of global Covid 19 lockdowns and …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations,
2023
University of Arizona
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience,
2023
Universiti Teknologi MARA (UiTM)
Assessing Employees’ Cybersecurity Attitude Based On Working And Cybersecurity Threat Experience, Norshima Humaidi, Melissa Shahrom
The African Journal of Information Systems
Many cybersecurity problems are caused by human error, which is a worry in the commercial sector. Due to their attitude towards cybersecurity, many employees in the firm do not work in a way that safeguards data. This study seeks to examine employees' cybersecurity attitudes with a focus on their work experience and exposure to cybersecurity threats. Data were gathered through a survey conducted in targeted business firms located in the Klang Valley area, Malaysia. Utilizing ANOVA and two-sample tests, the study analysed 245 data samples to evaluate the hypotheses. The results show significant distinctions in employees' cybersecurity attitudes in relation …
Does Engaging Commercial Customers In A Shared Social Mission Improve Impact Sourcing Service Provider (Issp) Success? A Critically Appraised Topic,
2023
University of Maryland Global Campus
Does Engaging Commercial Customers In A Shared Social Mission Improve Impact Sourcing Service Provider (Issp) Success? A Critically Appraised Topic, Michael F. Corbett
Engaged Management ReView
This topic paper examines whether engaging commercial customers through a shared social mission improves the success of social enterprises. It is based on an examination of a subset of the information technology and business process outsourcing (ITO/BPO) industries, known as impact sourcing service providers (ISSPs). ISSPs are social enterprises – B2R Technologies and Digital Divide Data are two examples – that provide call center, transaction processing, data entry, and other technology-enabled services for commercial customers from remote locations around the globe. What is unique about ISSPs is that they do this with a social mission of creating jobs and economic …
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?,
2023
West Virginia University
Building The Operational Technology (Ot) Cybersecurity Workforce: What Are Employers Looking For?, Christopher A. Ramezan, Paul M. Coffy, Jared Lemons
Journal of Cybersecurity Education, Research and Practice
A trained workforce is needed to protect operational technology (OT) and industrial control systems (ICS) within national critical infrastructure and critical industries. However, what knowledge, skills, and credentials are employers looking for in OT cybersecurity professionals? To best train the next generation of OT cybersecurity professionals, an understanding of current OT cybersecurity position requirements is needed. Thus, this work analyzes 100 OT cybersecurity positions to provide insights on key prerequisite requirements such as prior professional experience, education, industry certifications, security clearances, programming expertise, soft verbal and written communication skills, knowledge of OT frameworks, standards, and network communication protocols, and position …
Infrastructure As Code For Cybersecurity Training,
2023
Faculty of Engineering of the University of Porto
Infrastructure As Code For Cybersecurity Training, Rui Pinto, Rolando Martins, Carlos Novo
Journal of Cybersecurity Education, Research and Practice
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. These attacks tend to become increasingly specialized, meaning cybersecurity professionals must ensure proficiency in specific areas. Naturally, recommendations include creating advanced practical training scenarios considering realistic situations to help trainees gain detailed knowledge. However, the caveats of high-cost infrastructure and difficulties in the deployment process of this kind of system, primarily due to the manual process of pre-configuring software needed for the …
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community,
2023
James Madison University
Leading K-12 Community Responsiveness To Cyber Threats Via Education Of School Community, Michele Kielty, A. Renee Staton
Journal of Cybersecurity Education, Research and Practice
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for K-12 systems and provides concrete tools for school leaders to employ in order to provide preventive education to their school communities.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development,
2023
Virginia Polytechnic Institute and State University
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation,
2023
Kennesaw State University
What You See Is Not What You Know: Studying Deception In Deepfake Video Manipulation, Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, Chuck Robertson
Journal of Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability to distinguish deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Measuring Circularity: The Gordian Knot Of The 21st Century,
2023
HU University of Applied Sciences
Measuring Circularity: The Gordian Knot Of The 21st Century, Arjen Wierikx, Pascal Ravesteijn, Néomie Raassens, Alex Alblas
Communications of the IIMA
Organizations are currently facing substantial challenges regarding becoming circular by 2050 – also referred to as Circular Economy (CE). Subsequently, increasing complexity on all organizational levels creates uncertainty about respective organizational and technological capabilities and adequate strategies to develop these capabilities. Organizations are struggling in picking up the CE ambitions and answering the what’s in it for me question. Scholars are developing models and frameworks to enable organizations to measure CE performance. Over 125 assessment methods are available for micro level assessment – measuring up to 365 different metrics. Moreover, extant literature is available presenting barriers and opportunities for CE …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions,
2023
Old Dominion University
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
