Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Social media (3)
- Communication (2)
- Management (2)
- Nigeria (2)
- Recruiting (2)
-
- 9/11 (1)
- Adoption (1)
- Airbus 300 (1)
- Airline (1)
- Al Qaeda (1)
- Analysis (1)
- BPMN notation (1)
- BYU (1)
- BYU Tech Club (1)
- Big data (1)
- Blackboard (1)
- Breaches (1)
- Brigham Young University (1)
- Business (1)
- Business Literature (1)
- Business Simulation (1)
- Business Training (1)
- Business value (1)
- Capsim Management Solutions (1)
- Casino Management (1)
- Civil Reserve Air Fleet (1)
- Classification (1)
- Classifiers (1)
- Cloud Computing Technology (CCT); Public Clouds; Private Clouds; Hybrid Clouds; Community Clouds; Supply Chain Management (SCM) (1)
- Cloud computing (1)
Articles 1 - 30 of 32
Full-Text Articles in Business
Nail It Then Scale It Book Review, Jacob Thorpe
Nail It Then Scale It Book Review, Jacob Thorpe
Marriott Student Review
Nail It Then Scale It highlights how entrepreneurs can deliberately work to create a successful and scalable business.
Social Media In The Hiring Process: Uncovering Top Talent Or Lawsuits, Ian U. Anderson
Social Media In The Hiring Process: Uncovering Top Talent Or Lawsuits, Ian U. Anderson
Marriott Student Review
As social media use in the hiring process increases, hiring managers must understand how to use it effectively and legally. Improper use of social media when researching candidates can lead to lawsuits. This article features three key recommendation for effective use of social media in hiring decisions.
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim
Journal of International Technology and Information Management
The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Table Of Contents Jitim Vol 26 Issue 4, 2017
Table Of Contents Jitim Vol 26 Issue 4, 2017
Journal of International Technology and Information Management
Table of Contents
Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju
Perfect Ratings With Negative Comments: Learning From Contradictory Patient Survey Responses, Andrew S. Gallan, Marina Girju, Roxana Girju
Patient Experience Journal
This research explores why patients give perfect domain scores yet provide negative comments on surveys. In order to explore this phenomenon, vendor-supplied in-patient survey data from eleven different hospitals of a major U.S. health care system were utilized. The dataset included survey scores and comments from 56,900 patients, collected from January 2015 through October 2016. Of the total number of responses, 30,485 (54%) contained at least one comment. For our analysis, we use a two-step approach: a quantitative analysis on the domain scores augmented by a qualitative text analysis of patients’ comments. To focus the research, we start by building …
Faculty Focus: Mark Frigo Named Ezerski Chair
Faculty Focus: Mark Frigo Named Ezerski Chair
Business Exchange
Accountancy Professor Mark L. Frigo has been named Ezerski Endowed Chair in the School of Accountancy and Management Information Systems, which recognizes accountancy faculty excellence. Prior to joining DePaul, Frigo led a successful career in corporate financial analysis and management consulting at KMPG, among other accomplishments.
Alumnus Profile: Double Demon Leads Business Simulation Company
Alumnus Profile: Double Demon Leads Business Simulation Company
Business Exchange
Reda Chafi and business alumnus with an MBA talks about Capsim Management Solutions Inc., a Chicago-based company that delivers online business simulations and learning environments for academic and corporate clients.
Millennials And The Experience-Driven Economy
Millennials And The Experience-Driven Economy
Business Exchange
Millennials expect brands to create authentic, customer-centric experiences for them, no matter whether they are looking for a place to live, eat, visit or shop. This article looks at how businesses are mining data and creating marketing plans and experiences to appeal to this younger demographic.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.
Journal of International Technology and Information Management
Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …
Table Of Contents Jitim Vol 26 Issue 3, 2017
Table Of Contents Jitim Vol 26 Issue 3, 2017
Journal of International Technology and Information Management
Table of Contents
Fss 2020 Financial Markets Programme: Progress So Far, Charles Ohamara
Fss 2020 Financial Markets Programme: Progress So Far, Charles Ohamara
Bullion
The Financial System Strategy (FSS) 2020 is a national reform program aimed at developing and transforming Nigeria's financial sector into a growth catalyst to fast track the achievement of the Vision 20:2020 and engineer Nigeria's evolution into on International Financial Centre. The strategic objectives of FSS2020 are to strengthen and deepen the domestic financial markets, enhance the integration of domestic financial markets with the external financial markets and supporting the reals sector. To attain these objectives, the key regulators of the Nigerian financial system come together under the leadership of the Central Bank of Nigeria and crafted the vision to …
Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout
Market Analysis, Management Consulting, And Miscommunication, Brian W. Stout
Marriott Student Review
This article attempts to inform the audience of the importance of market analysis in management consulting. The article states that consulting firms can utilize the power of market analysis as they commit to understand technology, collaborate with researchers to conduct action research, and align market strategies within the consulting firm. This article concludes that by doing these steps consulting firms will lead in their market.
Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala
Role Of Trust And Involvement In The Effectiveness Of Digital Third-Party Organization Endorsement, Liming Guan, Vishal Lala
Atlantic Marketing Journal
In this research, an online experiment was conducted to investigate the effect of the mere presence of digital third-party organization (TPO) endorsement and the quality of information conveyed by a digital TPO, referred to as the endorsement information value effect. Involvement and institution-based trust were tested as moderators of the endorsement information value effect. The results confirm the intuitive belief of managers that the mere presence of a digital TPO endorsement benefits websites by reducing risk perceptions, improving attitudes and increasing choice likelihood. The findings from this research revealed that effectiveness of digital TPO endorsement information value was contingent upon …
Bitcoin And The Blockchain As Possible Corporate Governance Tools: Strengths And Weaknesses, Fiammetta S. Piazza
Bitcoin And The Blockchain As Possible Corporate Governance Tools: Strengths And Weaknesses, Fiammetta S. Piazza
Penn State Journal of Law & International Affairs
No abstract provided.
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew
Journal of International Technology and Information Management
Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …
Table Of Contents Jitim Vol 26 Issue 2, 2017
Table Of Contents Jitim Vol 26 Issue 2, 2017
Journal of International Technology and Information Management
Table of Contents JITIM vol 26 issue 2, 2017
The Free-Play Tax Deduction Debate: How Academic Research Can Help, Anthony F. Lucas, Katherine Spilde
The Free-Play Tax Deduction Debate: How Academic Research Can Help, Anthony F. Lucas, Katherine Spilde
UNLV Gaming Research & Review Journal
Free-play is the primary play incentive for slot players in many jurisdictions, with some campaigns eclipsing $50 million in annual redemptions. The efficacy of these incentives remains questionable at best, creating some contentious tax policy issues. Operators want to deduct the face value of these offers from taxable gaming win, based in part on the assumption that they expand the tax base; however, many regulators and taxing authorities question this claim. Any failure to fully recover redeemed free-play creates a deduction that is partially funded by tax payers. Arguments on both sides of this complex tax policy issue are thoroughly …
Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams
Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams
Marriott Student Review
As technology continues to drive Utah's economic growth, Brigham Young University students have launchd the BYU Tech Club to inform their peers with technical and non-technical degrees of career opportunities in technology, build the skills and knowledge to be attractive job candidates, and earn internship and full-time offers from high-grow startups and leading technology companies.
Buzzwords: Jargon That Will Keep You Going Through The Year, Annie Pond
Buzzwords: Jargon That Will Keep You Going Through The Year, Annie Pond
Marriott Student Review
Business jargon to help you throughout the year.
News - Georgia Tech, Elizabeth Winter, Kim Mull, Jason D. Wright
News - Georgia Tech, Elizabeth Winter, Kim Mull, Jason D. Wright
Georgia Library Quarterly
No abstract provided.
The Cross-Platform Consistency Of Online User Movie Ratings, Dan Baugher, Chris Ramos
The Cross-Platform Consistency Of Online User Movie Ratings, Dan Baugher, Chris Ramos
Atlantic Marketing Journal
Online movie ratings are often used in studies of Internet word-of-mouth, but the cross-platform consistency of such ratings has not been well established. Mean user ratings were obtained for 500 movies using the rating systems in place on Netflix and IMDb. Mean volume was 1,480,931 (SD = 2,636,388) and 104,746 (SD = 193,532) on the Netflix and IMDb sites, respectively, suggesting the movies were visible, but also variable in visibility. Volume was moderately correlated (r = .724, p ≤ .001). Mean user ratings on the Netflix and IMDB sites averaged 3.57 (SD = .37) and 3.84 (SD = .34). Mean …
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Journal of International Technology and Information Management
Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Journal of Aviation/Aerospace Education & Research
Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …
Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker
Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker
Journal of International Technology and Information Management
Table of Contents JITIM vol 26 issue 1, 2017
Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783
Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783
Journal of International Technology and Information Management
Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
Journal of International Technology and Information Management
There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Journal of International Technology and Information Management
In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Journal of International Technology and Information Management
Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …