Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (113)
- SelectedWorks (22)
- Kansas State University Libraries (13)
- Selected Works (10)
- Association of Arab Universities (7)
-
- University of Pennsylvania Carey Law School (5)
- City University of New York (CUNY) (4)
- Purdue University (4)
- California Polytechnic State University, San Luis Obispo (3)
- Kennesaw State University (3)
- Morehead State University (3)
- Singapore Management University (3)
- University of Nebraska - Lincoln (3)
- Western University (3)
- Bentley University (2)
- Georgia Southern University (2)
- Harrisburg University of Science and Technology (2)
- Southern Methodist University (2)
- The University of San Francisco (2)
- Brigham Young University (1)
- Clark University (1)
- East Tennessee State University (1)
- Embry-Riddle Aeronautical University (1)
- Institute of Business Administration (1)
- Minnesota State University, Mankato (1)
- Old Dominion University (1)
- Rochester Institute of Technology (1)
- Sheridan College (1)
- Southern Illinois University Carbondale (1)
- The University of Akron (1)
- Keyword
-
- ToC (10)
- Innovation (5)
- Innovation and Economic Growth (5)
- Privacy (5)
- Table (5)
-
- Technology (5)
- Blockchain (4)
- Computer science (4)
- Contents (4)
- Cybersecurity (4)
- Editor (4)
- Enterprise and Investment Development (4)
- Information (4)
- Information Systems (4)
- Internet (4)
- Knowledge,Proximity,Innovation and Learning (4)
- Rwanda (4)
- Service Delivery (4)
- Social media (4)
- Tanzania (4)
- AI (3)
- Classification (3)
- Digital preservation (3)
- ICT for Development and Poverty Alleviation (3)
- Industry 4.0 (3)
- Information systems (3)
- International (3)
- International Development (3)
- Machine Learning (3)
- Management (3)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (108)
- Dr Deogratias Harorimana (22)
- Central Plains Network for Digital Asset Management (12)
- Future Computing and Informatics Journal (6)
- All Faculty Scholarship (5)
-
- Electronic Theses, Projects, and Dissertations (5)
- Maurice Dawson (5)
- Electronic Thesis and Dissertation Repository (3)
- Morehead State Theses and Dissertations (3)
- Social Space (3)
- Business Analytics and Information Systems (2)
- Charleston Library Conference (2)
- Dissertations and Theses (2)
- Electronic Theses and Dissertations (2)
- Library Philosophy and Practice (e-journal) (2)
- Open Educational Resources (2)
- Publications and Research (2)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (1)
- 2013 (1)
- 2020 (1)
- ASA Multidisciplinary Research Symposium (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- An-Najah University Journal for Research - B (Humanities) (1)
- Articles (1)
- Business Review (1)
- C. Jason Woodard (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science and Software Engineering (1)
- Dan Mellamphy (1)
Articles 31 - 60 of 228
Full-Text Articles in Business
Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim
Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim
Future Computing and Informatics Journal
Academic advising plays a vital role in achieving higher educational institution’s purposes. Academic advising is a process where an academic advisor decides to select a certain number of courses for a student to register in each semester to fulfil the graduation requirements. This paper presents an Academic Advising Decision Support System (AADSS) to enhance advisors make better decisions regarding their students’ cases. AADSS framework divided into four layers, data preparation layer, data layer, processing layer and decision layer. The testing results from those participating academic advisors and students considered are that AADSS beneficial in enhancing their decision for selecting courses.
Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus
Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus
Journal of Global Business Insights
The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing …
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Future Computing and Informatics Journal
The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …
Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays Do Nascimento, Gustavo Dalmarco
Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays Do Nascimento, Gustavo Dalmarco
Markets, Globalization & Development Review
This paper points out the major disruptions caused by the COVID-19 pandemic. It proposes an automated Internet-of-Things (IoT) based manufacturing and supply chain system, termed FASTEN, that can deal with such severe disruptions.
Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux
Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux
International Conference on Lean Six Sigma
Abstract
Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability. An …
The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola
The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola
Dissertations and Theses
In recent years Revenue Operations or RevOps has emerged in professional circles as a new approach to manage Sales, Marketing and Customer Success teams in the context of b2b sales. In practitioner circles, RevOps definitions range from the increased collaboration of the three job functions to an all-out creation of job function within organizations. While the subject of interdepartmental alignment has been covered extensively in academia (albeit not exhaustively), RevOps as a term and set of practices has received no attention and industry practitioners struggle to find a unified set of best practices that isn’t coming from organizations trying to …
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
Master's Theses
The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …
Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre
Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre
Industrial and Manufacturing Engineering
Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …
Neural Network With Nlp, Harshita Sharma, Tinkle Jain
Neural Network With Nlp, Harshita Sharma, Tinkle Jain
School of Professional Studies
This thesis is about neural networks and how their algorithmic systems work. Neural networks are well-suited to aiding people with complex challenges in real-world situations. Thesis topics include nonlinear and complicated interactions between inputs and outputs, as well as making inferences, discovering hidden links, patterns, and predictions, and modeling highly volatile data and variations to forecast uncommon events. Neural networks have the potential to help people make better decisions. NLP is a technique for analyzing, interpreting, and comprehending large amounts of text. We can no longer evaluate the text using traditional approaches due to the massive volumes of text data …
Bert For Question Answering On Bioasq, Eric R. Fu, Rikel Djoko, Maysam Mansor, Robert Slater
Bert For Question Answering On Bioasq, Eric R. Fu, Rikel Djoko, Maysam Mansor, Robert Slater
SMU Data Science Review
Machine reading comprehension and question answering are topics of considerable focus in the field of Natural Language Processing (NLP). In recent years, language models like Bidirectional Encoder Representations from Transformers (BERT) [3] have been very successful in language related tasks like question answering. The difficulty of the question answering task lies in developing accurate representations of language and being able to produce answers for questions. In this study, the focus is to investigate how to train and fine tune a BERT model to improve its performance on BioASQ, a challenge on large scale biomedical question answering. Our most accurate BERT …
Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch
Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch
Journal of International Technology and Information Management
Technological developments go fast and are interrelated and multi-interpretable. As consumer needs change, the technological possibilities to meet those needs are constantly evolving and new technology providers introduce new disruptive business models. This makes it difficult to predict what the world of tomorrow will look like for an organization and that makes the risks for organizations substantial. In this context, it is difficult for organizations to determine what constitutes a good strategy to adopt digital developments.
This paper describes a first step of a study with the objective to design a method for organizations to formulate a future-proof strategy in …
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
Journal of International Technology and Information Management
From our study, all three covid-19 vaccines have a similar proportion of adverse reaction reports in which the patient had a history of allergies. However, the proportion of life-threatening outcomes were lower for those with the Janssen vaccine (0.62% hospitalization rate for Janssen versus 2.59% for Pfizer and 0.60% death for Janssen versus 5.15% for Moderna). In terms of specific allergies, patients with *cillin or sulfa allergies had the most adverse reactions to covid-19 vaccines, however, Janssen again had the lowest percentage of reported deaths (1.39% for *cillin-related allergy deaths for Janssen versus 6.10% for Pfizer). In terms of patient …
Table Of Contents Jitim Vol 30 Issue 2, 2021
Table Of Contents Jitim Vol 30 Issue 2, 2021
Journal of International Technology and Information Management
Table of Contents JITIM volume 30 issue 2
Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin
Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin
Journal of International Technology and Information Management
The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …
Conference Proceedings Of The 32nd Annual Iima Conference
Conference Proceedings Of The 32nd Annual Iima Conference
Journal of International Technology and Information Management
Conference Proceedings of the 32nd Annual IIMA Conference
Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti
Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti
Journal of International Technology and Information Management
Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, …
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Journal of International Technology and Information Management
Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
Journal of International Technology and Information Management
Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative …
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Journal of International Technology and Information Management
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and …
Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Computational Modeling & Simulation Engineering Faculty Publications
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Journal of International Technology and Information Management
Abstract: The usage of agile software development methods is increasing and so is the need for enhancing the collaboration between the different stakeholders. Thus, we chose to investigate the communication tools and challenges across the different boundaries and consequently deduce implications for practitioners. This research addresses inter-team communication by exploring the practitioners' perception on the different communication tools and the challenges faced at the three different boundaries, inter-team, team and customers, and geographically separated teams. We aim to enhance the productivity of software development through enhancing the communication between the different stakeholders. In this research, we use grounded theory approach …
Table Of Contents Jitim Vol 29 Issue 4
Table Of Contents Jitim Vol 29 Issue 4
Journal of International Technology and Information Management
table of contents
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Journal of International Technology and Information Management
There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …
Table Of Contents Jitim Vol 30 Issue 1, 2021
Table Of Contents Jitim Vol 30 Issue 1, 2021
Journal of International Technology and Information Management
Table of Content
A Comparison Of Artificial Neural Networks And The Statistical Methods In Predicting Mba Student’S Academic Performance, Ojoung Kwon, Harry Hui Xia, Serin Zhang
A Comparison Of Artificial Neural Networks And The Statistical Methods In Predicting Mba Student’S Academic Performance, Ojoung Kwon, Harry Hui Xia, Serin Zhang
Journal of International Technology and Information Management
MBA has become one of the most popular and vital professional degrees internationally. The MBA program admission process’s essential task is to choose the best analysis tools to accurately predict applicants’ academic performance potential based on the evaluation criteria in making admission decisions. Prior research finds that the Graduate Management Admission Test (GMAT) and undergraduate grade point average (UGPA) are common predictors of MBA academic performance indicated by graduate grade point average (GGPA). Using a sample of 250 MBA students enrolled in a state university with AACSB accreditation from Fall 2010 to Fall 2017, we test and compare the effectiveness …
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
Journal of International Technology and Information Management
The key to success in the 21st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the …
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system can …