Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 203

Full-Text Articles in Entire DC Network

Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff Jan 2015

Cultural And Religious Identities In An Era Of Information And Communications Globalization, M R. Neyestani, Pat Mcinturff

Communications of the IIMA

The rapid advances in information and communication technologies coupled with the dominant overarching Neo-liberal/capitalist ideological underpinnings of the dominant Western powers have generated a momentum towards a homogeneous global village. The impact of which has been to expand World conflict and propelled many nations towards losing their national identity and traditions. This article discusses the various impacts from IT globalization and calls for a new global communication awareness.


Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot Jan 2015

Modular Curriculum Design Using Personal Learning Plans And Reusable Learning Components, Jay M. Lightfoot

Communications of the IIMA

University-based education is facing direct competition from for-profit corporations over the lucrative lifetime-learning market. This is occurring primarily because universities have not adapted to advances in technology and changes in the educational needs of students. To correct this problem, a new curriculum solution is proposed. This solution is loosely based upon the model curricula generated by professional organizations. The solution utilizes personal learning plans tied to a global learning schema. The end result is a very flexible curriculum delivery model that effectively utilizes modern technology and is potentially superior to any offered by commercial education providers.


Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette Jan 2015

Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It?, Andrew Cook, Tanya Goette

Communications of the IIMA

When individuals and businesses conduct transactions electronically over a network using mobile devices, they have participated in mobile e-commerce. The advantages and disadvantages of mobile e-commerce are presented in this paper. This is followed by a discussion of who is using mobile e-commerce and why they are using it. Information is also presented on how to be successful with mobile e-commerce.


The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak Jan 2015

The National Health Information Network And The Future Of Medical Information Privacy, Edward J. Szewczak

Communications of the IIMA

Medical information has a special status among the various items of personal information. The introduction of information technology (IT) has changed the handling of medical information in ways that are both promising for improving health care as well as threatening to the individual patient's medical information privacy. The challenge to business practitioners is to manage medical information intelligently and to avoid the negative consequences of mismanaging this information, which may include customer backlash in the forms of boycotts, lawsuits, and loss of company reputation. This challenge is particularly important in the context of the U.S. National Health Information Network initiative, …


The Business Models Of E-Marketplace, Weijun Zheng Jan 2015

The Business Models Of E-Marketplace, Weijun Zheng

Communications of the IIMA

An electronic marketplace (EM) is an inter-organizational information intermediary that enables participating buyers and sellers to exchange information about price and product offerings and to cooperate on commodity exchange. Prior researches on EM design have not defined EM business model clearly. With a review of existing literatures on business model, this paper developed taxonomy of EM business models and classified existing EMs business model from a network role perspective. Further discussion of the evolution of EM business model is provided at the end.


Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer Jan 2015

Information Technology-Based Logistics Planning: Approaches To Developing A Coordination Mechanism For Decentralized Planning, Ingo Beyer

Communications of the IIMA

This research focused on mid-term planning representing the tactical level of supply chain management among manufacturers. Mid-term planning is based on established frame contracts between suppliers and customers. Demand forecasts and early customer orders (from retailers or consumers) are the starting point for performing planning runs involving logistical functions such as procurement, production, storage, and distribution. The aim is to draw up consistent plans among supply chain partners.


Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang Jan 2015

Teaching Enterprise Resource Planning (Erp) Systems In The Supply Chain Management Course, Huei Lee, Kuo Lane Chen, Jiaqin Yang

Communications of the IIMA

The major purpose of this paper is to investigation the issues of teaching ERP systems in a supply chain management course. The secondary purpose of the paper is to evaluate the effectiveness of students' perception of learning ERF systems in a supply chain management course.


Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller Jan 2015

Naturalness Of Ontology Concepts For Rating Aspects Of The Semantic Web, Yoo Jung An, Kuo-Chuan Huang, James Geller

Communications of the IIMA

The Semantic Web is expected to be the next generation of the WWW. Ontologies and agents are major ingredients of the Semantic Web. In (Lee and Geller 2005), we have argued that some existing ontologies make use of unnatural concepts. We stated that unnatural concepts make it difficult to use an ontology and they contradict the purpose of an ontology, which includes explanatory power for the purpose of sharing information. In this paper we elaborate what makes a concept unnatural. We also analyze existing ontologies to get numeric measures of how natural their concepts are.


A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel Jan 2015

A. Survey Of Entity Resolution And Record Linkage Methodologies, David Guy Brizan, Abdullah Uz Tansel

Communications of the IIMA

A great deal of research is focused on formation of a data warehouse. This is an important area of research as it could save many computation cycles and thus allow accurate information provided to the right people at the right time. Two considerations when forming a data warehouse are data cleansing (including entity resolution) and with schema integration (including record linkage). Uncleansed and fragmented data requires time to decipher and may lead to increased costs for an organization, so data cleansing and schema integration can save a great many (human) computation cycles and can lead to higher organizational efficiency. In …


Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago Jan 2015

Organizational Culture And Telecommuters' Quality Of Work Life And Professional Isolation, Susan J. Harrington, Julie Santiago

Communications of the IIMA

While much has been studied and written about the adjustments managers must make when supervising remote workers in virtual work arrangements, little has been written about the potential change in the organizational culture and the effect the culture has on the virtual worker's quality of work life and professional isolation. Not only may culture affect the implementation and success of telecommuting arrangements, but the increased isolation and independence of a virtual worker may impact the culture surrounding remote workers and create an organizational subculture. This study examines the relationship between quality of work life, professional isolation, and an organization's cultural …


Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii Jan 2015

Evaluating The Usability Of Union Web Sites In The United States: A Case Study, Christopher M. Lowery, Nicholas A. Beadles Ii

Communications of the IIMA

Union membership has undergone a dramatic decline and some have hailed the internet as a means for unions to reverse their membership declines. This study examines the usability of union websites. The content of union websites has been analyzed, but the usefulness of that content, and the overall usability of the websites, has not been assessed. In order for unions to fully utilize the internet and realize the potential benefits of cyberspace usage, they must provide websites that users find easy to use and that provide useful content. This study employs Hassan and Li's (2005) benchmarking approach in order to …


Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau Jan 2015

Relieving The Overloaded Help Desk: A Knowledge Management Approach, Nelson K.Y. Leung, Sim Kim Lau

Communications of the IIMA

The establishment of an organizational help desk (HD) is to provide technical support to users when they encounter technical problems related to hardware, software and network connections. Due to the lack of resources, users often have to wait for a considerably long time before their enquiries and problems are answered and solved. This paper discusses the background of HD and its existing challenges. The application of Knowledge Management (KM) techniques and Knowledge Management System (KMS) enables HD to manage its knowledge effectively. In addition, the combination is capable of relieving the overloaded HD by shifting some of the troubleshooting responsibilities …


Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas Jan 2015

Feasible Task Schedules With Minimum Project Cost Solved By A Genetic Algorithm, Michael L. Gargano, Louis V. Quintas

Communications of the IIMA

Suppose that a project consists of n separate tasks and one and only one task can be completed in one time period. However, since some tasks can be started only before others have been completed, only feasible task schedules are considered. There is a cost associated with the time at which a task is completed and the project cost is equal to the sum of all the task costs. How can a feasible task schedule with minimum project cost be found for completing the entire project? This research proposes using a genetic algorithm to solve this problem efficiently.


Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette Jan 2015

Integrating Technology To Achieve A Measurable Level Of Learning, Dawn Morgan, S. A. Humphries, Tanya B. Goette

Communications of the IIMA

The purpose of this paper is to detail the barriers to the integration of technology in US school systems. The harriers experienced by both individual teachers and to school systems as a whole are discussed. Student barriers, such as computer skill levels or poverty, are also discussed. In addition, this paper explains how technology should be used and the measurable benefits of doing so. Measurable benefits reported in the literature include increased performance on measures of reading comprehension, writing, components of IQ, transfer to novel tasks, and grade point average. Closing comments focus on how technology integration must be an …


Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan Jan 2015

Voip Adoption: Issues & Concerns, Sathasivam Mathiyalakan

Communications of the IIMA

VoIP is a relatively new technology. Current research suggests that firms are using VoIP technology to cut costs, to improve productivity, and the firm's strategic position. The literature is rich with "how to " articles and a discussion ofpossible benefits, costs, and implementation barriers. But, very few academic studies exist. The purpose of this study is to identify and present the issues related to VoIP adoption and implementation.


An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young Jan 2015

An Examination Of Web Site Accessibility Issues, Melissa Bundrick, Tanya Goette, S. A. Humphries, Dale Young

Communications of the IIMA

The Web is becoming more important for communication andfor data access. Unfortunately, not all Web sites are accessible for all users. Web accessibility is concerned with overcoming the barriers that users with disabilities face when they try to access information on Web sites. Currently, for disabled users, the Web presents many barriers that make it dijfiult to use. These barriers can be addressed by organizational commitment and by improved development techniques. This paper examines how Web accessibility standards and legal mandates are affecting the design of corporate and governmental Web sites, and how the rate of adoption can be improved …


To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson Jan 2015

To Catch A Thief Ii: Computer Forensics In The Classroom, Anna Carlin, Steven S. Curl, Daniel Manson

Communications of the IIMA

The subject of computer forensics is still new and both challenging and intriguing for students. Cal Poly Pomona has offered this course since September of 2004. The course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses some of the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum.


Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson Jan 2015

Monitoring Sale Transactions For Illegal Activity, Robert J. Richardson

Communications of the IIMA

Discriminant analysis and neural network methodologies were applied to the problem of identifying illegal sales transactions. The researchers independently developed models using data provided by a cr^it card company. A series of measures were developed and used to construct the models. The final results were that the discriminant analysis model recognized 32.3% of the fraudulent activity, while the neural network approach found 28.9%. With only 11.6% of the transactions in common, the combination of the two models identified 49.6%i. In order to provide a real time monitoring program, the models were simplified yielding a capture rate of approximately 42%.


The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen Jan 2015

The Impact Of Mergers And Acquisitions On Information Systems: A Case Of A Software Industry Acquisition, Jeffrey Hsu, Edward T. Chen

Communications of the IIMA

A company named Syscom was recently acquired by another company, Matcom. Both companies were focused on software development in similar markets, however, the Management Information Systems (MIS) decisions made by each company have resulted in significant differences as to how employees go about the business of developing, selling and supporting software. This paper highlights how Information Systems (IS) decisions made at these two companies enabled different ways for people to work together along with affecting various aspects of business operations and team communications. In addition, this paper presents issues with the integration of Syscom with the Matcom IS structure as …


The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan Jan 2015

The Utilization Of Communication Technologies By Study Abroad Participants, S. A. Humphries, Kimberly Cowert, Catherine Whelan

Communications of the IIMA

This pilot project was designed to evaluate study abroad participants' degree of homesickness and use of communication channels, specifically telephone and email. A questionnaire was developed to assess several dimensions involved with studying abroad, including degree of culture shock and homesickness, and frequency and methods of communicating home. Respondents were 14 study abroad participants from a medium-sized southern university, including 4 males and 10 females. Based on the findings of this study, homesickness and degree of culture shock were related as measured by the items of strain, helpless, missing, accepted, escape, and shock. As hypothesized, students who reported being homesick …


A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke Jan 2015

A Full Life Cycle Defect Process Model That Supports Defect Tracking, Software Product Cycles, And Test Iterations, Jim Nindel-Edwards, Gerhard Steinke

Communications of the IIMA

There are a variety of models, methods and tools to help organizations manage defects found in the development of software. Defect tracking and processing must be integrated in the project life cycle and the testing process for software. This paper reviews a number of defect models and proposes the Full Life Cycle Defect Process model to manage defects that supports defect, project, and test processes. We describe the various states in our model and provide examples of various scenarios and paths through the model.


Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen Jan 2015

Factors Affecting The Adoption Of Web Services Technology, Rajshri Chopde, Pruthikrai Mahatanankoon, Joseph H. Wen

Communications of the IIMA

This study aims to finding the factors that affect the adoption of web services technology. The study proposes a web service technology adoption model in which three contexts from Tornatzky and Fleischer's (1990) framework, namely, external environmental context, technological context and organizational context, and two constructs from the TAM (Davis, 1989) model, perceived usefulness and perceived ease of use, are studied to determine their influence on web services adoption. Exploratory factor analysis is used to explore the factors affecting the adoption of web services technology. Structural Equation modeling is used to validate and analyze the research model.


An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones Jan 2015

An Edi Transaction Set Development Lifecycle (Tsdl): A Case Study In The Food Manufacturing Industry, Robert C. Beatty, Mary C. Jones

Communications of the IIMA

Electronic Data Interchange (EDI) is widely regarded by organizations worldwide as the business standard for the timely and secure exchange of electronic business transactions in an expanding global marketplace. While numerous research efforts have explored how the adoption, implementation, and integration of this technology can impact an organization's technical, organizational, and competitive environment - few studies have documented the process used by organizations to implement EDI transaction sets with trading partners. This paper advances an innovative lifecycle used by a food manufacturing company to successfully design, implement, and test an EDI transaction set. This paper also describes how this transaction …


The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul Jan 2015

The Interrelationship And Effect Of Trust And Strong Cultures In Setting Information Systems Security Goals, Ioannis V. Koskosas, Jyoti Choudrie, Ray J. Paul

Communications of the IIMA

This paper investigates the interrelationship and effect of trust and culture on the level of goal setting within the context of information systems security. In doing so, it explores and discusses the concepts of trust and strong culture and seeks to demonstrate their importance in setting efficiently information systems security goals. The paper contributes to interpretive information systems research with the study of goal setting in a security management context and its grounding within an interpretive epistemology.


Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen Jan 2015

Managers' Perceived Benefits Of Using Electronic Procurement In Taiwan, Jack Shih-Chieh Hsu, Edward T. Chen

Communications of the IIMA

Facing the competitive pressure from new hospitals and new regulations from the Bureau of National Health Insurance, hospital managers in Taiwan are concentrating on reducing the hospital operation costs and improving the healthcare quality. Practitioners and academic researchers agree that reducing the pharmacy cost is one of the best solutions to sustain competitive advantage. As electronic commerce becomes popular in many industry sectors, e- procurement is growing rapidly in the healthcare industry. The purpose of this paper is to investigate the managers' perceptions of benefits of using electronic procurement system. After surveying 152 hospitals in Taiwan, we find that hospital …


Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka Jan 2015

Project Zenith: A Case Study Of Electronic Data Interchange, Charles Frank, Jack T. Marchewka

Communications of the IIMA

This paper utilizes a case study approach to analyze the key decisions, stakeholders, and lessons learned from a project to develop an Electronic Data Interchange (EDI) application conceived and developed by a consulting firm. Several individuals within the firm viewed this EDI service as an opportunity for generating new revenue. However, the new system was not embraced fully by several sales and account representatives who did not view this potential product as a service that could make an adequate profit margin and translate into larger commissions. In addition, the consulting firm's president supported the project to the extent that it …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot Dec 2014

An Empirical Analysis Of Student Perceptions Of Website Components For Class Web-Sites, Jay M. Lightfoot

Communications of the IIMA

Technology has improved to the point where web-sites for every course taught by an instructor are possible. This has produced many instructional benefits; however, it has also created a new set of problems. The problem addressed by this paper is the question of which web-site components to include in the class web-site. This is important because different web components support different student learning styles. Because it is not feasible to include all known webcomponents, the instructor must select those components that are most useful and support the broadest group of students. To address this question, a survey instrument was developed …