Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems
California State University, San Bernardino
Journal of International Technology and Information Management
- Keyword
-
- Editor (4)
- Table (4)
- Contents (3)
- Business Process Management (2)
- China (2)
-
- Culture (2)
- Implementation (2)
- Information (2)
- International (2)
- Journal (2)
- Management (2)
- Security (2)
- Technology (2)
- ANFIS (1)
- APP (1)
- Adaptive neuro-fuzzy inference system (ANFIS) (1)
- Amazon.in (1)
- Anonymous (1)
- Asset Maintenance (1)
- Asset Tracking (1)
- Asymmetric Dominance (1)
- Attitude (1)
- BPM maturity (1)
- BPM performance (1)
- Bad debt recovery (1)
- Big Data (1)
- Big data (1)
- Bitcoin (1)
- Building Information Modelling (BIM) (1)
- Challenge (1)
Articles 1 - 30 of 32
Full-Text Articles in Business
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Mobile App Installation: The Role Of Precautions And Desensitization, Mark A. Harris, Amita Goyal Chin, Robert Brookshire
Mobile App Installation: The Role Of Precautions And Desensitization, Mark A. Harris, Amita Goyal Chin, Robert Brookshire
Journal of International Technology and Information Management
The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumer’s potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the C-HIP Model is …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Implications Of Perceived Utility On Individual Choice And Preferences: A New Framework For Designing Recommender System, Gunjan Tomer
Implications Of Perceived Utility On Individual Choice And Preferences: A New Framework For Designing Recommender System, Gunjan Tomer
Journal of International Technology and Information Management
Consumer psychology and consumer behaviour has constantly been a field of interest for the researchers. Volumes of researches are available in this area, still new theories and concepts keep emerging in response to change in context and environment. Consumer psychology has large cross disciplinary implications. In this paper, a relationship between consumer psychology and recommender system has been explained and how implementing a consumer psychology model can improve recommender system performance. This paper also gives first level analysis of various filters that can be developed along with the design of recommender system in order to generate a more refined and …
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen
Journal of International Technology and Information Management
Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …
Changing Business Process Management In Project Development, Debby Goedknegt
Changing Business Process Management In Project Development, Debby Goedknegt
Journal of International Technology and Information Management
The construction sector is in transition. All related manufacturing industries face the challenge to improve the processes within the whole sector. Building Information Modelling (BIM) could be a tool to make production and control chains more efficient (Verbaan, 2013). The question that is being answered her is: What are the business enabling capabilities regarding efficiency and effectivity of BIM in the domain of project development in the built environment for architects and project developers in the context of the current reality of the Dutch built environment? The answer to this question is found through literature research. These findings were validated …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Information And Communication Technologies (Ict): Components, Dimensions, And Its Correlates, Alexander N. Chen, J. Gabriel Dominguez Castillo, Katherine Ligon
Information And Communication Technologies (Ict): Components, Dimensions, And Its Correlates, Alexander N. Chen, J. Gabriel Dominguez Castillo, Katherine Ligon
Journal of International Technology and Information Management
Information and Communication Technologies (ICT) has been identified as one of the crucial factors that affect teaching effectiveness and student learning worldwide. UNESCO, many international organizations, and many governments emphasized the importance of ICT and try to incorporate ICT into education systems. This study examined self-assessed computer competency in thirteen ICT areas from two samples, e.g., the United States and Mexico. Reliability tests were conducted, and rank analysis was done among them. By using factor analysis, these thirteen areas were grouped into three categories: “basic ICT skills”; “advanced ICT skills;” and “multimedia skills and attitudes towards ICT”. Subjects showed the …
Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin
Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin
Journal of International Technology and Information Management
As cloud computing continues to evolve, organizations are finding new ways to store the massive amounts of big data that are collected. Big data storage often require greater flexibility and scalability which can be provided by incorporating NoSQL technologies. NoSQL (Not Only SQL) is quickly becoming a popular approach to store large and unstructured data. This paper looks at the various classifications of NoSQL technologies as well as many of the notable characteristics of the technologies. The authors also describe some deficiencies of using NoSQL and give some explanation to why companies are adopting the technology. The paper concludes with …
Validating The Technostress Instrument Using A Sample Of Chinese Knowledge Workers, Leida Chen
Validating The Technostress Instrument Using A Sample Of Chinese Knowledge Workers, Leida Chen
Journal of International Technology and Information Management
Today, the phenomenon of technostress is both pervasive and global. Nevertheless, research efforts, especially empirical and cross culture studies, in this domain have been very limited. In addition, lack of consistency in the technostress measure found in existing literature made it difficult to build a unified body of knowledge of technostress. Using a sample of 221 Chinese knowledge workers, this study cross-validated and refined the technostress measure developed by Tarafdar et al. (2007). It was found that the instrument offered high validity and reliability after some respecification in the Chinese context. Technostress experienced by Chinese knowledge workers was investigated and …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Conceptual Model For Successful Implementation Of Big Data In Organizations, Mohanad Halaweh, Ahmed E. Massry
Conceptual Model For Successful Implementation Of Big Data In Organizations, Mohanad Halaweh, Ahmed E. Massry
Journal of International Technology and Information Management
The term ‘big data’ has gained huge popularity in recent years among IT professionals and academicians. Big data describes the massive amount of data that can be processed and analyzed using technology to gain business values that will help organizations to achieve competitive advantages. The current paper aims to develop a holistic model that includes the factors that would affect the success or failure of the implementation of big data in organizations. Furthermore, this research examines the opportunities that organizations would attain from implementing big data, as well as the challenges that could hinder this implementation. The proposed model provides …
Revisit The Classification Of General Purpose Technologies (Gpts) In Corporate Innovation Research Using Patent And Patent Citation Data, Ranfeng Qiu, John Catwell
Revisit The Classification Of General Purpose Technologies (Gpts) In Corporate Innovation Research Using Patent And Patent Citation Data, Ranfeng Qiu, John Catwell
Journal of International Technology and Information Management
Information and Communication Technologies (ICTs) have been recognized as a type of General Purpose Technologies (GPTs), and thus are considered t h e “driving force” in corporate technology advance. In this study, we re-conceptualize and re-classify GPTs from a broad field- based approach, based on a two-dimensional construct using patent and patent citation data. The new construct makes connections of ICTs with other technology fields. The new approach takes into considerations that firms are not only “users” but also “innovators” of new technologies. The research results in this paper will serve as a platform based upon which more studies on …
Cognitive Negotiation Schemata In The It Industries Of Japan And Finland, William W. Baber, Arto Ojala
Cognitive Negotiation Schemata In The It Industries Of Japan And Finland, William W. Baber, Arto Ojala
Journal of International Technology and Information Management
The existing literature emphasizes the importance of negotiation skills in the field of IT. However, negotiation and negotiation styles in the IT industry have received limited attention. This original empirical research compares the negotiation schemata of Finnish and Japanese IT business people. The study identifies negotiation schemata used in one or both culture groups. Negotiators with greater experience and power in the negotiation process command more schemata. However, neither population enjoys the full range of negotiation schemata. Business negotiators in or out of IT and these cultures may benefit from knowing the schemata and the results of matching and mismatching.
Comparing Mobile Apps Usability Characteristics For Designers And Users, Teuta Cata, Ben Martz
Comparing Mobile Apps Usability Characteristics For Designers And Users, Teuta Cata, Ben Martz
Journal of International Technology and Information Management
As the mobile device market grows, so grows the commercial market and therefore the subsequent development of applications for this medium. As this rush to develop apps continues to grow, the search continues for what characteristics will help mobile apps be adopted and continued to be used. This exploratory study looks to see if there are differences between how users of mobile applications and developers of mobile applications perceive these characteristics. The results of our study identified areas of statistically significant differences on key design characteristics between mobile application designers with mobile applications users. More interestingly, a detailed analysis found …
Long Term Factors Of Internet Diffusion In Sub-Saharan Africa: A Panel Co- Integration Analysis, Vasudeva N. R. Murthy, Ravi Nath, Mina Soleimani
Long Term Factors Of Internet Diffusion In Sub-Saharan Africa: A Panel Co- Integration Analysis, Vasudeva N. R. Murthy, Ravi Nath, Mina Soleimani
Journal of International Technology and Information Management
Identifying factors that influence the diffusion of the Internet is paramount for researchers as well as policy makers in articulating strategies to improve the availability and subsequent use of the Internet. Most existing empirical studies have focused on this problem by analyzing diffusion data for countries for one fixed year and identified variables affecting the Internet diffusion. These variables, generally, come from the economic, technological, policy, culture, and human capital realms. These results have provided a good “snapshot” of what factors are important towards the diffusion of the Internet and the results tend to vary for studies conducted in different …
An Innovative Clustering Approach To Market Segmentation For Improved Price Prediction, Donghui Shi, Jian Guan, Jozef Zurada, Alan S. Levitan
An Innovative Clustering Approach To Market Segmentation For Improved Price Prediction, Donghui Shi, Jian Guan, Jozef Zurada, Alan S. Levitan
Journal of International Technology and Information Management
A main obstacle to accurate prediction is often the heterogeneous nature of data. Existing studies have pointed to data clustering as a potential solution to reduce heterogeneity, and therefore increase prediction accuracy. This paper describes an innovative clustering approach based on a novel adaptation of the Fuzzy C-Means algorithm and its application to market segmentation in real estate. Over 15,000 actual home sales transactions were used to evaluate our approach. The test results demonstrate that the accuracy in price prediction shows notable improvement for some clustered market segments. In comparison with existing methods our approach is simple to implement. It …
Business Processes Management In The Netherlands And Portugal: The Effect Of Bpm Maturity On Bpm Performance, Kevin J. Janssen, Pascal Ravesteyn
Business Processes Management In The Netherlands And Portugal: The Effect Of Bpm Maturity On Bpm Performance, Kevin J. Janssen, Pascal Ravesteyn
Journal of International Technology and Information Management
In the last decade, business process management (BPM) has become essential for corporations to maintain their control over business processes. Therefore it is highly important for companies to know which factors influence business process performance. Consequently, this study focuses on the relationship between BPM maturity and BPM performance. The paper aims to determine (1) whether BPM maturity has a significant effect on BPM performance and (2) whether there is a significant difference between a country that is in a relatively more mature stadium with regard to BPM practices and one that is still going through an adapting phase. In this …
Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova
Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova
Journal of International Technology and Information Management
We use social networks to communicate, keep in touch and express our opinions in a manner that has become completely ubiquitous. However, this very ubiquity and ease of expression have exposed another, contentious side – one where nobody can remain completely anonymous for long and where every conversation is stored in perpetuity. Some fear that the ephemeral quality of a social interaction has been lost, which threatens our right to be forgotten and freedom of expression. In this paper, we look at why people engage in anonymous communication, and if there is a perceived need for legal protection of anonymous …
Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku
Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku
Journal of International Technology and Information Management
Students today need to have computer knowledge and skills to enable them perform their task at school and their jobs. This presents a challenge to universities on how to provide computer education to their students. This challenge is even more critical for students in developing countries. Few studies have been done on attitude of students’ use of computers in a university environment using a well-grounded technology acceptance mode. The purpose of this study is to find the factors that influence student attitude in the acceptance and use of computers in tertiary institutions in emerging economies using the Theory of Planned …
Do National Culture And Organizational Development Affect The Effectiveness Of Erp Implementation? A Tale Of Two Cultures: Us Versus China, Wing M. Fok, Lillian Y. Fok, Jing Li
Do National Culture And Organizational Development Affect The Effectiveness Of Erp Implementation? A Tale Of Two Cultures: Us Versus China, Wing M. Fok, Lillian Y. Fok, Jing Li
Journal of International Technology and Information Management
As many US and European companies have implemented Enterprise Resource Planning (ERP) Systems, most of the previous implementation studies have tended to focus on companies from more developed countries. This research points out that there is need for academics and practitioners to “take stock,” to examine what is happening in broad terms across organizations in the ERP implementation process, and to consider whether cultural differences in the U.S. when compared to another culture can impact the process. In this study, we are concerned with several issues surrounding current ERP implementation status and report initial findings from managers in a wide …
Lee Manufacturing Control, Asset Tracking, And Asset Maintenance: Assessing The Impact Of Rfid Technology Adoption, Abubaker Haddud, John C. Dugger, Huei Lee
Lee Manufacturing Control, Asset Tracking, And Asset Maintenance: Assessing The Impact Of Rfid Technology Adoption, Abubaker Haddud, John C. Dugger, Huei Lee
Journal of International Technology and Information Management
The purpose of this study was to study the relationship between RFID technology and lean manufacturing. More specifically, the identification of implementation areas where RFID can have the greatest impact on manufacturing control, manufacturing asset tracking, and asset maintenance in a lean manufacturing environment. A survey was used to collect data from participants working in seven U.S. manufacturing industries. Questions addressed the use of RFID in manufacturing control, asset tracking, and asset maintenance. The survey items were directly related to the following manufacturing wastes: overproduction, waiting time, inefficient transportation, inappropriate processing, unnecessary inventory, unnecessary motion, and rejects and defects. An …
Factors Influencing Online Shopping During Diwali Festival 2014: Case Study Of Flipkart And Amazon.In, Preeti Khanna, Brinda Sampat
Factors Influencing Online Shopping During Diwali Festival 2014: Case Study Of Flipkart And Amazon.In, Preeti Khanna, Brinda Sampat
Journal of International Technology and Information Management
The Indian retail sector is witnessing a dramatic change because of changing mindset of the urban consumers. These consumers are spoilt for choices and are presented not only with different products and brands but also with diverse retailer formats such as departmental stores, specialty stores, and online shopping platforms. The prospect of online shopping is increasing in India because of many factors such as increased Internet literacy, perceived usefulness, ease of use, increased number of working women, entry from the global and local participants, and the increased visibility of online players, to name a few. E-tailing is the process of …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Optimizing Data Management With Disparities In Data Value, G. Shankaranarayanan, Adir Even, Paul D. Berger
Optimizing Data Management With Disparities In Data Value, G. Shankaranarayanan, Adir Even, Paul D. Berger
Journal of International Technology and Information Management
When there is a disparity in the value of different data records and fields, there is a need for an optimization of data resources. Not all data necessarily contribute the same value. It depends on the usage of the data, as well as a variety of other factors. This paper presents models for optimizing data management in the presence of a disparity between the values contributed by different data. We expound on what disparity of data value represents and illustrate models to derive a numerical measure of such disparity. We then use real-world data from a large data resource used …
The State Of Cryptocurrencies, Their Issues And Policy Interactions, Ramesh Subramanian, Theo Chino
The State Of Cryptocurrencies, Their Issues And Policy Interactions, Ramesh Subramanian, Theo Chino
Journal of International Technology and Information Management
This paper focuses on the evolution of cryptocurrencies. It traces the history of early cryptography, the ‘cypherpunk’ movement, and how the work of some cyber libertarians and cryptographers enabled the emergence of popular cryptocurrencies. The paper then focuses on Bitcoin. It delves into the technology behind the Bitcoin architecture and shows how exactly this technology works. The paper then does an analysis of security and regulatory considerations that affect the growth of Bitcoin-based businesses. The paper concludes with some suggestions for future work in the area.
The Innovation Value Chain And Adaptability Of Organizations, Jakobus Smit
The Innovation Value Chain And Adaptability Of Organizations, Jakobus Smit
Journal of International Technology and Information Management
This paper reports on a study of adaptability of organizations and how that relates to their ability to generate innovations. Constructs from an organizational culture model and the innovation value chain was used as the foundation for a cross-sectional study in 7 organizations in Ireland. The findings reveal that adaptability is indeed related to innovativeness. Organizations that are good at creating change, learning, and creativity are better able to generate new ideas. In addition organizations that are also flexible can convert these ideas into outputs and subsequently disseminate them internally as well as outside the organization.
An Adaptive Neuro-Fuzzy System With Semi-Supervised Learning As An Approach To Improving Data Classification: An Illustration Of Bad Debt Recovery In Healthcare, Donghui Shi, Jozef Zurada, Jian Guan, Sandeep Goyal
An Adaptive Neuro-Fuzzy System With Semi-Supervised Learning As An Approach To Improving Data Classification: An Illustration Of Bad Debt Recovery In Healthcare, Donghui Shi, Jozef Zurada, Jian Guan, Sandeep Goyal
Journal of International Technology and Information Management
Business analytics has become an increasingly important priority for organizations today as they strive to achieve greater competitiveness. As organizations adopt business practices that rely on complex, large-scale data, new challenges also emerge. A common situation in business analytics is concerned with appropriate and adequate methods for dealing with unlabeled data in classification. This study examines the effectiveness of a semi-supervised learning approach to classify unlabeled data to improve classification accuracy rates. The context for our study is healthcare. The healthcare costs in the U.S. have risen at an alarming rate over the last two decades. One of the causes …
Ethical Hacking Pedagogy: An Analysis And Overview Of Teaching Students To Hack, Regina D. Hartley
Ethical Hacking Pedagogy: An Analysis And Overview Of Teaching Students To Hack, Regina D. Hartley
Journal of International Technology and Information Management
An area that is being scrutinized as a more effective method of educating and preparing security professionals is that of ethical hacking. The purpose of this research is to examine a more proactive approach to adequately prepare future information security professionals. Future careers in security may require that professionals be equipped with the necessary skill sets to combat an ever-growing presence of unwanted activity throughout the Internet. Many argue that future information security professionals need to have the same skill sets as attackers in order to adequately recognize and defend networks from intrusion. This research defines ethical hacking and examines …