Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Business

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Phishing For All Ages, Rachana Vann Dec 2021

Phishing For All Ages, Rachana Vann

Electronic Theses, Projects, and Dissertations

Since the start of the pandemic in 2020 and the increase in teleworking, we have witnessed a subsequent increase in cyber-attacks. This project focused on the tools and techniques a teleworker should use to stay safe from online predators. An online predator or hacker is defined as someone who uses the internet to get access to proprietary information or seek a ransom. This project sought to introduce tools and techniques that would help people of all ages to stay safe online. The questions asked were: What techniques do online predators use to lure their unsuspecting victims? On the American Generation …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani Dec 2021

Evaluation Of Recommended Modular Email Building Approaches, Palak Sadhwani

Electronic Theses, Projects, and Dissertations

Customer relationship management acts as the backbone of marketing. For any company marketing is the most important sector to promote a company and attract customers. Email marketing is one of the most effective ways of digital marketing. However, the cost of design and development is time consuming and redundant. Marketers and project managers are frequently unassertive about how to solve these issues. Although there are blogs, articles and services available for marketing email development, the lack of research in the effectiveness of email building architecture bolsters the need for this study. The project presents an architecture that modularizes the way …


Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame Aug 2021

Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame

Electronic Theses, Projects, and Dissertations

This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp May 2021

An Analysis Of Online Internships And Video Conferencing Security, Joshua Trapp

Electronic Theses, Projects, and Dissertations

This culminating experience project explored online internships and video conferencing security. The research questions asked focus on the effectiveness of online versus in-person internships, internship curriculum, third-party internships, video-conferencing applications and their security, advantages of micro-internships, and benefits of internships to all stakeholders. To answer these research questions, data was collected on the security and encryption of video conferencing, and a literature review was conducted using the following terms: Employment, Internship, Video, Video conferencing, Virtual, Online, Electronic, Technology, and Security. Key findings include: (1) Online internships can provide employers with a global pool of employable candidates with increased diversity. (2) …


Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon May 2021

Analysis Of Immigration Trends In The U.S. To Discover Patterns And Make Better Policy Decisions, Amita Tandon

Electronic Theses, Projects, and Dissertations

Immigration is one of the most hotly debated topics in the US. Merely taking a look at the types of immigrant and non-immigrant visas issued by the US government, one can realize the complexity of the law governing the numerous intricacies involved with the issue of immigration (Golash-Boza, 2009). With the ever-increasing population of immigrants in the US, a good understanding of immigration’s impact on the US society is more important than ever before. The objective of this project was to increase our understanding of immigration’s impact on the US society by investigating the general trends in Visa Applications, employers, …


Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini May 2021

Reshaping Organizational Processes And Workflows Through Integration Of Blockchain Technology, Elijah E. Maggini

Electronic Theses, Projects, and Dissertations

Cybercrime is becoming increasingly sophisticated and devastating as time carries on while many processes and workflows that exist within organizations are stagnant. This project analyzed Blockchain Technology as a use-case for building upon simple processes and workflows that are often overlooked within organizations for the purpose of hardening security and strengthening non-repudiation. This project examined three main questions relating to; how Blockchain can enhance traditional cyber security practices, how Blockchain can be introduced to organizations as a ground-breaking and worthwhile solution to countering cyber-attacks, and the benefits and risks of implementing Blockchain within an organization. An investigation of traditional cyber …


Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch Jan 2021

Innovativeness To Enlarge Digital Readiness - How To Avoid Digital Inertia?, Paul Morsch

Journal of International Technology and Information Management

Technological developments go fast and are interrelated and multi-interpretable. As consumer needs change, the technological possibilities to meet those needs are constantly evolving and new technology providers introduce new disruptive business models. This makes it difficult to predict what the world of tomorrow will look like for an organization and that makes the risks for organizations substantial. In this context, it is difficult for organizations to determine what constitutes a good strategy to adopt digital developments.

This paper describes a first step of a study with the objective to design a method for organizations to formulate a future-proof strategy in …


Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra Jan 2021

Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra

Journal of International Technology and Information Management

Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable …


An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara Jan 2021

An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara

Journal of International Technology and Information Management

From our study, all three covid-19 vaccines have a similar proportion of adverse reaction reports in which the patient had a history of allergies. However, the proportion of life-threatening outcomes were lower for those with the Janssen vaccine (0.62% hospitalization rate for Janssen versus 2.59% for Pfizer and 0.60% death for Janssen versus 5.15% for Moderna). In terms of specific allergies, patients with *cillin or sulfa allergies had the most adverse reactions to covid-19 vaccines, however, Janssen again had the lowest percentage of reported deaths (1.39% for *cillin-related allergy deaths for Janssen versus 6.10% for Pfizer). In terms of patient …


Table Of Contents Jitim Vol 30 Issue 2, 2021 Jan 2021

Table Of Contents Jitim Vol 30 Issue 2, 2021

Journal of International Technology and Information Management

Table of Contents JITIM volume 30 issue 2


Do I Desire Chatbots To Be Like Humans? Exploring Factors For Adoption Of Chatbots For Financial Services, Moses Sugumar, Shalini Chandra Jan 2021

Do I Desire Chatbots To Be Like Humans? Exploring Factors For Adoption Of Chatbots For Financial Services, Moses Sugumar, Shalini Chandra

Journal of International Technology and Information Management

AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of …


Factors Affecting Students’ Satisfaction With Synchronous Online Instruction During The Covid-19 Pandemic, Xue Bai, Ephrem Eyob, Ade Ola, Serena Reese Jan 2021

Factors Affecting Students’ Satisfaction With Synchronous Online Instruction During The Covid-19 Pandemic, Xue Bai, Ephrem Eyob, Ade Ola, Serena Reese

Journal of International Technology and Information Management

A large number of institutions of higher learning at all levels transitioned hurriedly to remote and online learning in response to the novel coronavirus (COVID-19) pandemic. However, recent studies have concluded that university-level students prefer learning in face-to-face settings. This study seeks to understand the factors that are driving students’ rejection of remote and online learning options and to provide insight into future efforts to implement strategies and tools to mitigate these adverse factors. The results show factors that contribute the most to students’ perceived satisfaction in the remote instructional setting are less interaction during live lectures, more distractions, less …


Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin Jan 2021

Exploring The Behavioral Intention To Use Collaborative Commerce: A Case Of Uber, C. Christopher Lee, Sinéad Ruane, Hyoun Sook Lim, Ruoquing Zhang, Heechang Shin

Journal of International Technology and Information Management

The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use the Uber ridesharing app. It focuses on extending the UTAUT2 in collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs – performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new …


Conference Proceedings Of The 32nd Annual Iima Conference Jan 2021

Conference Proceedings Of The 32nd Annual Iima Conference

Journal of International Technology and Information Management

Conference Proceedings of the 32nd Annual IIMA Conference


Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti Jan 2021

Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti

Journal of International Technology and Information Management

Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, …


Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi Jan 2021

Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi

Journal of International Technology and Information Management

Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …


Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr. Jan 2021

Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.

Journal of International Technology and Information Management

Using the case study of an Indian Technology and Outsourcing Service Provider, SmartKey (real but renamed company), a technology vendor to a global healthcare provider, this paper analyses offshore outsourcing issues using IT-enabled services to gain deeper insights needed to understand the core conflict and propose a well-reasoned solution approach. Reasoning, the conscious thought process leading to a well-justified decision, is an important managerial skill required for making dynamic decisions, resolving conflicts, and thereby developing human resources. This paper explores Goldratt’s Evaporating Clouds (ECs) as a systematic approach to reasoning in particular, and as a system for developing human resource …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


A Data Driven Approach To Profile Potential Sars-Cov-2 Drug Interactions Using Tylerade, Robert P. Schumaker, Michael A. Veronin, Trevor Rohm, Matthew Boyett, Rohit R. Dixit Jan 2021

A Data Driven Approach To Profile Potential Sars-Cov-2 Drug Interactions Using Tylerade, Robert P. Schumaker, Michael A. Veronin, Trevor Rohm, Matthew Boyett, Rohit R. Dixit

Journal of International Technology and Information Management

We use a data driven approach on a cleaned adverse drug reaction database to determine the reaction severity of several covid-19 drug combinations currently under investigation. We further examine their safety for vulnerable populations such as individuals 65 years and older. Our key findings include 1. hydroxychloroquine/chloroquine are associated with increased adverse drug event severity versus other drug combinations already not recommended by NIH treatment guidelines, 2. hydroxychloroquine/azithromycin are associated with lower adverse drug event severity among older populations, 3. lopinavir/ritonavir had lower adverse reaction severity among toddlers and 4. the combination of azithromycin, hydroxychloroquine and tocilizumab is safer than …


The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn Jan 2021

The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn

Journal of International Technology and Information Management

While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.

In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.

With an increasing threat to information security for …


Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn Jan 2021

How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn

Journal of International Technology and Information Management

Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative …


Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang Jan 2021

Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang

Journal of International Technology and Information Management

The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and …


What Leads Consumers To Spread Ewom For Food Ordering Apps?, Brinda Hansraj Sampat, Kali Charan Sabat Jan 2021

What Leads Consumers To Spread Ewom For Food Ordering Apps?, Brinda Hansraj Sampat, Kali Charan Sabat

Journal of International Technology and Information Management

Restaurants are using innovative ways to engage with consumers using Food Ordering Apps (FOAs). The purpose of this article is to identify the influence of consumers’ eSatisfaction, perceived value, trust, and eLoyalty on eWOM for FOAs in India. The study also verifies if eWOM for FOAs varies based on age, gender, family size, order value, and online shopping experience. The research followed a multi-stage approach. In the first stage, an extensive literature review was conducted to identify the various factors that lead to eWOM. In the second stage, a survey was distributed among the FOA users. 375 responses were obtained. …


Table Of Contents Jitim Vol 29 Issue 4 Jan 2021

Table Of Contents Jitim Vol 29 Issue 4

Journal of International Technology and Information Management

table of contents


Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer Jan 2021

Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer

Journal of International Technology and Information Management

There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …


Table Of Contents Jitim Vol 30 Issue 1, 2021 Jan 2021

Table Of Contents Jitim Vol 30 Issue 1, 2021

Journal of International Technology and Information Management

Table of Content