Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
Articles 1 - 30 of 203
Full-Text Articles in Entire DC Network
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff
Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff
Communications of the IIMA
The rapid advances in information and communication technologies coupled with the dominant overarching Neo-liberal/capitalist ideological underpinnings of the dominant Western powers have generated a momentum towards a homogeneous global village. The impact of which has been to expand World conflict and propelled many nations towards losing their national identity and traditions. This article discusses the various impacts from IT globalization and calls for a new global communication awareness.
Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot
Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot
Communications of the IIMA
University-based education is facing direct competition from for-profit corporations over the lucrative lifetime-learning market. This is occurring primarily because universities have not adapted to advances in technology and changes in the educational needs of students. To correct this problem, a new curriculum solution is proposed. This solution is loosely based upon the model curricula generated by professional organizations. The solution utilizes personal learning plans tied to a global learning schema. The end result is a very flexible curriculum delivery model that effectively utilizes modern technology and is potentially superior to any offered by commercial education providers.
Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette
Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette
Communications of the IIMA
When individuals and businesses conduct transactions electronically over a network using mobile devices, they have participated in mobile e-commerce. The advantages and disadvantages of mobile e-commerce are presented in this paper. This is followed by a discussion of who is using mobile e-commerce and why they are using it. Information is also presented on how to be successful with mobile e-commerce.
The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak
The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak
Communications of the IIMA
Medical information has a special status among the various items of personal information. The introduction of information technology (IT) has changed the handling of medical information in ways that are both promising for improving health care as well as threatening to the individual patient's medical information privacy. The challenge to business practitioners is to manage medical information intelligently and to avoid the negative consequences of mismanaging this information, which may include customer backlash in the forms of boycotts, lawsuits, and loss of company reputation. This challenge is particularly important in the context of the U.S. National Health Information Network initiative, …
The Business Models Of E-Marketplace, Weijun Zheng
The Business Models Of E-Marketplace, Weijun Zheng
Communications of the IIMA
An electronic marketplace (EM) is an inter-organizational information intermediary that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior researches on EM design have not defined EM business model clearly. With a review of existing literatures on business model, this paper developed taxonomy of EM business models and classified existing EMs business model from a network role perspective. Further discussion of the evolution of EM business model is provided at the end.
Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer
Communications of the IIMA
This research focused on mid-term planning representing the tactical level of supply chain management among manufacturers. Mid-term planning is based on established frame contracts between suppliers and customers. Demand forecasts and early customer orders (from retailers or consumers) are the starting point for performing planning runs involving logistical functions such as procurement, production, storage, and distribution. The aim is to draw up consistent plans among supply chain partners.
Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang
Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang
Communications of the IIMA
The major purpose of this paper is to investigation the issues of teaching ERP systems in a supply chain management course. The secondary purpose of the paper is to evaluate the effectiveness of students' perception of learning ERF systems in a supply chain management course.
Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller
Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller
Communications of the IIMA
The Semantic Web is expected to be the next generation of the WWW. Ontologies and agents are major ingredients of the Semantic Web. In (Lee and Geller 2005), we have argued that some existing ontologies make use of unnatural concepts. We stated that unnatural concepts make it difficult to use an ontology and they contradict the purpose of an ontology, which includes explanatory power for the purpose of sharing information. In this paper we elaborate what makes a concept unnatural. We also analyze existing ontologies to get numeric measures of how natural their concepts are.
A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel
A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel
Communications of the IIMA
A great deal of research is focused on formation of a data warehouse. This is an important area of research as it could save many computation cycles and thus allow accurate information provided to the right people at the right time. Two considerations when forming a data warehouse are data cleansing (including entity resolution) and with schema integration (including record linkage). Uncleansed and fragmented data requires time to decipher and may lead to increased costs for an organization, so data cleansing and schema integration can save a great many (human) computation cycles and can lead to higher organizational efficiency. In …
Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago
Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago
Communications of the IIMA
While much has been studied and written about the adjustments managers must make when supervising remote workers in virtual work arrangements, little has been written about the potential change in the organizational culture and the effect the culture has on the virtual worker's quality of work life and professional isolation. Not only may culture affect the implementation and success of telecommuting arrangements, but the increased isolation and independence of a virtual worker may impact the culture surrounding remote workers and create an organizational subculture. This study examines the relationship between quality of work life, professional isolation, and an organization's cultural …
Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii
Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii
Communications of the IIMA
Union membership has undergone a dramatic decline and some have hailed the internet as a means for unions to reverse their membership declines. This study examines the usability of union websites. The content of union websites has been analyzed, but the usefulness of that content, and the overall usability of the websites, has not been assessed. In order for unions to fully utilize the internet and realize the potential benefits of cyberspace usage, they must provide websites that users find easy to use and that provide useful content. This study employs Hassan and Li's (2005) benchmarking approach in order to …
Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau
Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau
Communications of the IIMA
The establishment of an organizational help desk (HD) is to provide technical support to users when they encounter technical problems related to hardware, software and network connections. Due to the lack of resources, users often have to wait for a considerably long time before their enquiries and problems are answered and solved. This paper discusses the background of HD and its existing challenges. The application of Knowledge Management (KM) techniques and Knowledge Management System (KMS) enables HD to manage its knowledge effectively. In addition, the combination is capable of relieving the overloaded HD by shifting some of the troubleshooting responsibilities …
Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas
Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas
Communications of the IIMA
Suppose that a project consists of n separate tasks and one and only one task can be completed in one time period. However, since some tasks can be started only before others have been completed, only feasible task schedules are considered. There is a cost associated with the time at which a task is completed and the project cost is equal to the sum of all the task costs. How can a feasible task schedule with minimum project cost be found for completing the entire project? This research proposes using a genetic algorithm to solve this problem efficiently.
Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette
Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette
Communications of the IIMA
The purpose of this paper is to detail the barriers to the integration of technology in US school systems. The harriers experienced by both individual teachers and to school systems as a whole are discussed. Student barriers, such as computer skill levels or poverty, are also discussed. In addition, this paper explains how technology should be used and the measurable benefits of doing so. Measurable benefits reported in the literature include increased performance on measures of reading comprehension, writing, components of IQ, transfer to novel tasks, and grade point average. Closing comments focus on how technology integration must be an …
Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan
Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan
Communications of the IIMA
VoIP is a relatively new technology. Current research suggests that firms are using VoIP technology to cut costs, to improve productivity, and the firm's strategic position. The literature is rich with "how to " articles and a discussion ofpossible benefits, costs, and implementation barriers. But, very few academic studies exist. The purpose of this study is to identify and present the issues related to VoIP adoption and implementation.
An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young
An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young
Communications of the IIMA
The Web is becoming more important for communication andfor data access. Unfortunately, not all Web sites are accessible for all users. Web accessibility is concerned with overcoming the barriers that users with disabilities face when they try to access information on Web sites. Currently, for disabled users, the Web presents many barriers that make it dijfiult to use. These barriers can be addressed by organizational commitment and by improved development techniques. This paper examines how Web accessibility standards and legal mandates are affecting the design of corporate and governmental Web sites, and how the rate of adoption can be improved …
To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson
To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson
Communications of the IIMA
The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum.
Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson
Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson
Communications of the IIMA
Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.
The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen
The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen
Communications of the IIMA
A company named Syscom was recently acquired by another company, Matcom. Both companies were focused on software development in similar markets, however, the Management Information Systems (MIS) decisions made by each company have resulted in significant differences as to how employees go about the business of developing, selling and supporting software. This paper highlights how Information Systems (IS) decisions made at these two companies enabled different ways for people to work together along with affecting various aspects of business operations and team communications. In addition, this paper presents issues with the integration of Syscom with the Matcom IS structure as …
The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan
The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan
Communications of the IIMA
This pilot project was designed to evaluate study abroad participants' degree of homesickness and use of communication channels, specifically telephone and email. A questionnaire was developed to assess several dimensions involved with studying abroad, including degree of culture shock and homesickness, and frequency and methods of communicating home. Respondents were 14 study abroad participants from a medium-sized southern university, including 4 males and 10 females. Based on the findings of this study, homesickness and degree of culture shock were related as measured by the items of strain, helpless, missing, accepted, escape, and shock. As hypothesized, students who reported being homesick …
A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke
A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke
Communications of the IIMA
There are a variety of models, methods and tools to help organizations manage defects found in the development of software. Defect tracking and processing must be integrated in the project life cycle and the testing process for software. This paper reviews a number of defect models and proposes the Full Life Cycle Defect Process model to manage defects that supports defect, project, and test processes. We describe the various states in our model and provide examples of various scenarios and paths through the model.
Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen
Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen
Communications of the IIMA
This study aims to finding the factors that affect the adoption of web services technology. The study proposes a web service technology adoption model in which three contexts from Tornatzky and Fleischer's (1990) framework, namely, external environmental context, technological context and organizational context, and two constructs from the TAM (Davis, 1989) model, perceived usefulness and perceived ease of use, are studied to determine their influence on web services adoption. Exploratory factor analysis is used to explore the factors affecting the adoption of web services technology. Structural Equation modeling is used to validate and analyze the research model.
An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones
An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones
Communications of the IIMA
Electronic Data Interchange (EDI) is widely regarded by organizations worldwide as the business standard for the timely and secure exchange of electronic business transactions in an expanding global marketplace. While numerous research efforts have explored how the adoption, implementation, and integration of this technology can impact an organization's technical, organizational, and competitive environment - few studies have documented the process used by organizations to implement EDI transaction sets with trading partners. This paper advances an innovative lifecycle used by a food manufacturing company to successfully design, implement, and test an EDI transaction set. This paper also describes how this transaction …
The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul
The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul
Communications of the IIMA
This paper investigates the interrelationship and effect of trust and culture on the level of goal setting within the context of information systems security. In doing so, it explores and discusses the concepts of trust and strong culture and seeks to demonstrate their importance in setting efficiently information systems security goals. The paper contributes to interpretive information systems research with the study of goal setting in a security management context and its grounding within an interpretive epistemology.
Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen
Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen
Communications of the IIMA
Facing the competitive pressure from new hospitals and new regulations from the Bureau of National Health Insurance, hospital managers in Taiwan are concentrating on reducing the hospital operation costs and improving the healthcare quality. Practitioners and academic researchers agree that reducing the pharmacy cost is one of the best solutions to sustain competitive advantage. As electronic commerce becomes popular in many industry sectors, e- procurement is growing rapidly in the healthcare industry. The purpose of this paper is to investigate the managers' perceptions of benefits of using electronic procurement system. After surveying 152 hospitals in Taiwan, we find that hospital …
Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka
Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka
Communications of the IIMA
This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm's president supported the project to the extent that it …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot
An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot
Communications of the IIMA
Technology has improved to the point where web-sites for every course taught by an instructor are possible. This has produced many instructional benefits; however, it has also created a new set of problems. The problem addressed by this paper is the question of which web-site components to include in the class web-site. This is important because different web components support different student learning styles. Because it is not feasible to include all known webcomponents, the instructor must select those components that are most useful and support the broadest group of students. To address this question, a survey instrument was developed …