Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

California State University, San Bernardino

Journal

2006

Technology

Articles 1 - 13 of 13

Full-Text Articles in Business

Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson Jan 2006

Regional Economic Development Issues Within The Information And Communications Technology (Ict) Industry, James M. Henson

Journal of International Technology and Information Management

This exploratory research was initiated to develop a computer-based interview tool that would help determine the factors that companies in the information and communications technology (ICT) industry consider a problem in regards to the economic environment within a local study region. Topics included the labor market and community issues, including costs of doing business and quality-of-life questions. A computer-based process was employed in telephone interviews to solicit and record responses from executives in ICT-related companies for the 197 cases that are included in this study. Descriptive data are presented along with a first-order and a second-order factor analysis.


Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka Jan 2006

Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka

Journal of International Technology and Information Management

The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs).


Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar Jan 2006

Cross-Border It-Support For The Management Of International Subsidiary Operations: The Diffusion Of Innovations-Based Conceptual Model, Arto Ojala, Nazmun Nahar

Journal of International Technology and Information Management

Rapid and effective internationalization has increasingly become important for high-tech companies. Establishing a foreign subsidiary can facilitate effective internationalization for a high-tech company. This study investigates how IT can provide cross-border support to manage international subsidiary operations and makes important theoretical contributions. The research results exhibit how companies can use cross-border IT-support to effectively share and utilize information from the target country environment for international subsidiary operations. This paper also introduces the diffusion of innovations-based conceptual model which deals with various factors that should be taken into account while operating a foreign subsidiary through IT support. The findings are useful …


Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek Jan 2006

Use Of Advanced Technologies And Information Solutions For North Sea Offshore Assets: Ambitious Changes And Socio-Technical Dimensions, Jayantha P. Liyanage, Eirik Bjerkebaek

Journal of International Technology and Information Management

The use of various forms of advanced technologies and information solutions are in common place to manage industrial assets today. This is widely seen as the way forward in various industrial sectors owing to range of commercial benefits offered by new technologies and its importance to gain competitive advantage. The objective of this paper is to describe such an ongoing major technology-dependent re- engineering process termed Integrated eOperations in oil and gas exploration and production business in North Sea since 2004-2005, and to highlight the nature of ambitious techno-managerial changes and its critical socio-technical dimensions. The change process focuses on …


Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach Jan 2006

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach

Journal of International Technology and Information Management

Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate …


The Coming Age Of Rfid Revolution, Mohsen Attaran Jan 2006

The Coming Age Of Rfid Revolution, Mohsen Attaran

Journal of International Technology and Information Management

Radio Frequency Identification, or RFID, has been around for decades and is being used in manufacturing to complement established barcodes for the past 25 years. Recently, many companies are embracing RFID as a competitive weapon that can improve their efficiencies, and provide significant business benefits. Despite many useful applications, the technology's potential has yet to be fully realized. The aim of this paper is to provide an overview of contemporary RFID systems, highlight its promises as well as its pitfalls, identify the implementation challenges and key business drivers, survey its application in various industries, and speculate about where this technology …


Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith Jan 2006

Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith

Journal of International Technology and Information Management

This study examined differences in perceptions of U.S. and international college students regarding appropriate use of computers. Ten common inappropriate computer-use behaviors were presented to students. Only two of the ten behaviors were identified by the students as being unacceptable. When compared by geographic region, the U.S. students rated four of the actions as being less acceptable than did the international students. Work experience had minimal influence on the students’ perceptions. The results indicate that regardless of nationality or previous work experience, students lack understanding of the appropriate use of workplace computer technologies. The results reinforce the need for corporations …


Theoretical And Pragmatic Framework For Outsourcing Of It Services, Haidar M. Fraihat Jan 2006

Theoretical And Pragmatic Framework For Outsourcing Of It Services, Haidar M. Fraihat

Journal of International Technology and Information Management

Since previous research in the information technology (IT) field focused on successes and failures of IT outsourcing (ITO) by organizations, this paper investigates the critical success factors (CSF) for IT outsourcing in the existing global environment. It is intended to provide assistance for the consideration of business professionals and IT managers when they make, examine or evaluate ITO decisions. Fifty four IT outsourcing CSFs were identified through an extensive literature review research. Some of the factors were utilized more frequently than others, while some CSFs have been given more importance than other by IT researchers. A 2-part theoretical framework (conceptual …


A Collaborative Project Management Approach And A Framework For Its Supporting Systems, Fang Chen, Nicholas C. Romano Jr, Jay F. Nunamaker Jr Jan 2006

A Collaborative Project Management Approach And A Framework For Its Supporting Systems, Fang Chen, Nicholas C. Romano Jr, Jay F. Nunamaker Jr

Journal of International Technology and Information Management

The project management (PM) paradigm has changed during the past decade due to the globalization of business and advancement of information technology (IT). Increasingly, projects involve members from different geographical locations more than at any other time in history. Traditional PM methods may be inadequate to manage distributed projects, and new information systems are needed to support distributed PM. This article provides the rationale for a collaborative PM approach to manage distributed projects and proposes a conceptual framework for the collaborative PM software development. The objective is to present a collaborative PM framework that can guide further research and development …


The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang Jan 2006

Grey Situation Decision-Making Algorithm To Optimize Silicon Wafer Slicing, Che-Wei Chang, William Yu Chung Wang

Journal of International Technology and Information Management

The slicing of Silicon wafer is a complex manufacturing process in producing the raw materials for electronic chips and requires the efforts to effectively monitor the stability in production line and ensure the quality for the products composed of different shapes and materials. Human decision failure and other analytical errors are the most common source of management problems in such manufacturing stage. This paper presents a case regarding the silicon wafer manufacturing to examine the response to quality errors. The study has adopted the approach of grey situation decision-making algorithm for problem detection that suggests a technique to attain the …


Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara Jan 2006

Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara

Journal of International Technology and Information Management

This study suggests that having access to a computer and the Internet at home leads to better wages. We normally have the idea that people with higher wages have computers and Internet access at home. But with declining prices of home PCs and the increasing importance of Internet, this no longer seems to be the case. The new owners of PC today are considerably poorer and less educated than in the past. People with access to a PC and Internet at home appear to earn 8.6% more than their counterpart. This result seems to suggest that University policies requiring students …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures