Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Business

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang Dec 2017

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech Oct 2017

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew Jun 2017

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz Jan 2017

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …


Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker Jan 2017

Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 1, 2017


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 Jan 2017

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan Jan 2017

It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan

Journal of International Technology and Information Management

TThe purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the nature of tools employed, measurement processes, and the implementation methodology, using case studies. Analysis of the available academic and non-academic literature sources showed measurement issues being the most dominant and ironically the most neglected domain in ITG implementations. We view ITG measurement tools and it subsequent deployment through the two theoretical ITG models namely the Integrated IT Governance model, and the Structures, Processes, …


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran Jan 2017

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson Jan 2017

Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson

Journal of International Technology and Information Management

Purpose: The purpose of this paper is to review the acceptance and future use of blockchain technology. Given the rapid technological changes, this paper focuses on a managerial overview and framework of how the blockchain, including its implementations such as Bitcoin have advanced and how blockchain can be utilized in large-scale, enterprise environments. The paper begins with a technological overview that covers the history of the technology, as well as describing the computational, cryptographic theory that serves as the basis for its notable security features. This paper also covers several key application areas such as finance, accounting, and marketplaces where …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari Jan 2017

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …