Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

California State University, San Bernardino

2006

Computer

Articles 1 - 4 of 4

Full-Text Articles in Business

Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith Jan 2006

Differing Cultural Perceptions Regarding The Appropriate Use Of Workplace Computer Technologies, Heidi Perreault, Nancy Keith

Journal of International Technology and Information Management

This study examined differences in perceptions of U.S. and international college students regarding appropriate use of computers. Ten common inappropriate computer-use behaviors were presented to students. Only two of the ten behaviors were identified by the students as being unacceptable. When compared by geographic region, the U.S. students rated four of the actions as being less acceptable than did the international students. Work experience had minimal influence on the students’ perceptions. The results indicate that regardless of nationality or previous work experience, students lack understanding of the appropriate use of workplace computer technologies. The results reinforce the need for corporations …


The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel Jan 2006

The Effects Of Personal Innovativeness , Perceived Risk , And Computer Self -Efficacy On Online Purchasing Intent, Randall J. Boyle, Cynthia P. Ruppel

Journal of International Technology and Information Management

The rapid growth of e-commerce makes it important for the success of companies to understand both the factors that facilitate and are barriers to these transactions. Therefore, the purpose of this study is to investigate the relationships between perceived Internet risk, personal innovativeness and computer/web self-efficacy, and online purchases intentions as three of these factors. Results indicate that perceived Internet risk, personal innovativeness and computer/web self-efficacy are all strongly related to online purchasing intentions. There is also a strong relationship between computer self- efficacy and personal innovativeness, two of the values-compatibility variables related to intention to purchase on-line. Suggestions for …


Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara Jan 2006

Access To Computer Technologies At Home Improves Wages In The Marketplace, Pankaj Kumar Maskara, Rajesh Aggarwal, Rajesh Maskara

Journal of International Technology and Information Management

This study suggests that having access to a computer and the Internet at home leads to better wages. We normally have the idea that people with higher wages have computers and Internet access at home. But with declining prices of home PCs and the increasing importance of Internet, this no longer seems to be the case. The new owners of PC today are considerably poorer and less educated than in the past. People with access to a PC and Internet at home appear to earn 8.6% more than their counterpart. This result seems to suggest that University policies requiring students …


Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey Jan 2006

Computer Security Checklist For Non-Security Technology Professionals, Chlotia P. Garrison, Roderick B. Posey

Journal of International Technology and Information Management

Networked computers and electronic data storage make computer security a fundamental component of a company’s survival. Security incidents can cause reputation damage, loss customers, or even liability. Companies that are unable or unwilling to hire certified security professionals often rely on non-security IT professionals for assistance. This paper provides a checklist the non-security professional can use to assist the company in the critical areas of conducting risk analysis, performing vulnerability assessments, educating employees and developing computer security policies and procedures