Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Business

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani Jan 2014

The Influence Of Cognitive Trust And Familiarity On Adoption And Continued Use Of Smartphones: An Empirical Analysis, Efosa C. Idemudia, Mahesh S. Raisinghani

Journal of International Technology and Information Management

In the information-driven and application rich environment of smartphones, power is closer to the user than ever before and it has the potential of helping them become more effective and efficient. Smartphones have become increasingly important for companies to create strategic opportunities and competitive advantage by adding value for its stakeholders and improving efficiency. Technological advances in smartphones have led to increased mobile applications and implications for theory and practice since they create strategic opportunities and competitive advantage by adding value for customers and improving efficiency through the use of mobile technologies. Understanding the factors that influence the continuance in …


A Mixed Mode Analysis Of The Impact Of Requirement Volatility On Software Project Success, Rahul Thakurta Jan 2011

A Mixed Mode Analysis Of The Impact Of Requirement Volatility On Software Project Success, Rahul Thakurta

Journal of International Technology and Information Management

Requirement volatility has been identified as a significant risk factor behind software project success. This paper describes our findings of a 2-phase study comprising of interviews and surveys on the preparedness of organizations in managing requirement volatility and the resultant effect on project success and failure. Findings illuminate on the current level of awareness and management response to the problem of requirement volatility affecting software projects. The subjective treatment of project success/failure is brought out, and the association with requirement volatility is explored. Results are expected to lead to better governance mechanisms and improve project success rates under requirement volatility.


A Hybrid Machine Learning System For Stock Market Forecasting, Lokesh Kumar, Anvita Pandey, Saakshi Srivastava, Manuj Darbari Jan 2011

A Hybrid Machine Learning System For Stock Market Forecasting, Lokesh Kumar, Anvita Pandey, Saakshi Srivastava, Manuj Darbari

Journal of International Technology and Information Management

A hybrid machine learning system based on Genetic Algorithm (GA) and Time Series Analysis is proposed. In stock market, a technical trading rule is a popular tool for analysts and users to do their research and decide to buy or sell their shares. The key issue for the success of a trading rule is the selection of values for all parameters and their combinations. However, the range of parameters can vary in a large domain, so it is difficult for users to find the best parameter combination. In this paper, we present the Genetic Algorithm (GA) to overcome the problem …


The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai Jan 2011

The Evolution Of Information Systems Offshoring Research: A Past, Present And Future Meta Analysis Review, Peter Haried, Hua Dai

Journal of International Technology and Information Management

This research article presents a past, present and future meta analysis of information systems offshoring (ISO) research over the 2000-2010 time period. ISO has emerged as a significant sourcing strategy adopted by many organizations to manage, support and deliver their information system needs. Across the selected academic articles our findings compare research methodologies applied, client vs. vendor perspectives studied and ISO topic areas investigated. Interesting results emerge in the range and evolution of ISO research. As a result of our analysis, our findings clearly indicate areas of need for future ISO researchers to consider when conducting future ISO research.


Statistical Analysis Of Vodsl Technology For The Efficiency Of Listening Quality Of 640k/640k, Sarhan M. Musa, Mostafa A. El-Aasser Jan 2010

Statistical Analysis Of Vodsl Technology For The Efficiency Of Listening Quality Of 640k/640k, Sarhan M. Musa, Mostafa A. El-Aasser

Journal of International Technology and Information Management

Next-generation Internet technology will offer high performance and high capacity traffic aggregation and scalability. Voice over Digital Subscriber Line (VoDSL) technology allows service providers to offer multiple telephone lines over a single subscriber line in addition to high speed data transmission services. This article provides a baseline test for the Listening Quality (LQ) using VoDSL access technology by using Voice/Listening Quality (V/LQ) transmission with voice compression while countinously downloading files. The result will be to enable the efficiency of the LQ and its statistical analysis based on a Digital Subscriber Line (DSL) service at level 640K/640K for each American National …


Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi Jan 2009

Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi

Journal of International Technology and Information Management

Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.


It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb Jan 2009

It Alignment With Business Strategies In Healthcare Organizations: An Empirical Analysis, Zach G. Zacharia, David S. Preston, Chad W. Autry, Charles W. Lamb

Journal of International Technology and Information Management

This paper describes a study that assessed the performance implications of aligning information technology (IT) strategy to overall business strategy across a variety of health care organization (HCO) structures. We obtained survey results from senior executives of 178 hospitals to identify key configurations of IT strategic practices, business strategy and HCO structures. Using K- means cluster analysis, we identified which business strategies correlate strongly with certain IT strategy types. Our results indicate that HCOs achieve superior performance through unique combinations of business and IT strategy, suggesting that correctly aligning these strategies is a critical decision for healthcare organizations.


A Quantitative Model For Crm Performance Evaluations, Sanjeev K. Bordoloi, Prabhu Aggarwal, Tom Tobin Jan 2008

A Quantitative Model For Crm Performance Evaluations, Sanjeev K. Bordoloi, Prabhu Aggarwal, Tom Tobin

Journal of International Technology and Information Management

This paper identifies important performance measurements for the operation of CRM units in the call center industry, and then uses Data Envelopment Analysis (DEA) to compare the performances of a selected set of call centers. The results provide several managerial insights that will assist CRM managers in effective decision making, especially in the areas of increasing efficiencies and improving customer service. Overall, this paper contributes towards managing resources and processes that would aid in the acquisition and support of information technology within a firm.


Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs Jan 2008

Validating An End-User Computing Satisfaction Instrument: A Confirmatory Factor Analysis Approach Using International Data, Kee-Sook Lim, Jeen-Su Lim, John H. Heinrichs

Journal of International Technology and Information Management

This study evaluates the construct validity of an end-user computing satisfaction scale in the context of the Korean culture. The structure and dimensionality, reliability and validity of an end-user computing satisfaction (EUCS) instrument were cross-validated using data obtained from 108 managers of Korean firms in the context of the end-user satisfaction with their office information system. The results of this study are generally consistent with previous findings regarding the measurement property of this instrument. However, Korean data also supports the five correlated first-order factors model. Managerial and research implications of the identified results are discussed.


Determinants Of Mobile Payments: An Empirical Analysis, Lei-Da Chen, Ravi Nath Jan 2008

Determinants Of Mobile Payments: An Empirical Analysis, Lei-Da Chen, Ravi Nath

Journal of International Technology and Information Management

Success of mobile commerce hinges on the availability of methods of payment that are secure, ubiquitously available, globally accepted, and easy-to-use. Mobile payment (mPayment) entails making payments using mobile devices such as wireless handsets, personal digital assistants, and other radio frequency (RF) and near field communication (NFC) devices. While mPayment is still in its infancy, its acceptance is likely to increase considerably in the coming years. In the United States, the acceptance of mPayment lags behind that of Europe and Asia. In the U.S, many experts believe that the next step in mPayment evolution is the development of a single-device …


Enterprise Modelling Using Unified Framework Supporting Distributed Object Computing, Manuj Darbari, Bhaskar Karn Jan 2008

Enterprise Modelling Using Unified Framework Supporting Distributed Object Computing, Manuj Darbari, Bhaskar Karn

Journal of International Technology and Information Management

This paper provides a support for the analysis phase in the life cycle of the enterprise distributed computing systems. The major goal of our work is to provide a small but powerful set of enterprise modeling concepts. We will be extending the concept of Enterprise Modeling using EDOC inter-agent system using OPEN Framework.


State And Context-Dependent Information Management And Wealth Accumulation: An Information Analysis Of The Billionaires Between Taiwan And China, Ben-Chieh Liu, Lee-Hsuan Lin Jan 2008

State And Context-Dependent Information Management And Wealth Accumulation: An Information Analysis Of The Billionaires Between Taiwan And China, Ben-Chieh Liu, Lee-Hsuan Lin

Journal of International Technology and Information Management

From the Forbes Magazine survey of the world’s 538 richest, seventy seven (77) or about 14.4% were identified as born in Asia (Asia Week, June 28, 2001). In addition, the top 100 billionaires (in $NT) in Taiwan, 2001 and 2002 were surveyed by Taiwan Smart Monthly magazine ( Nov 11, 2002) and another top 100 billionaires in China (in U.S dollars) were reported by the Forbes magazine in 2004. This paper utilizes Liu ,Lin, Lee and Chou’s (1996) state and context dependent information management model specification (Joseph & John, 2006), and equity account dependent variables to study the underlying intercultural …


An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen Jan 2007

An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen

Journal of International Technology and Information Management

The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …


The Development Of A Thorough Test Plan In The Analysis Phase Leading To More Successful Software Development Projects, Jim Nindel-Edwards, Gerhard Steinke Jan 2007

The Development Of A Thorough Test Plan In The Analysis Phase Leading To More Successful Software Development Projects, Jim Nindel-Edwards, Gerhard Steinke

Journal of International Technology and Information Management

A critical problem in many software development projects is missing some important requirements until late in the development life cycle. Building a thorough test plan very early in the product development cycle has the potential for early discovery of missing requirements with attendant reduction in project costs and schedule improvement. Key to the success of this approach is the understanding that mature tests often go beyond the documented requirements for applications and into exploring the boundaries of the application domain where missing requirements are often uncovered. In addition, the test methodology of looking at features from multiple users’ perspectives and …


A New Approach For Evaluating The Order Fulfillment Process Options Of B2c Horizontal Portals Using Dea (Data Envelopment Analysis), Tapati Bandopadhyay, Pradeep Kumar Jan 2007

A New Approach For Evaluating The Order Fulfillment Process Options Of B2c Horizontal Portals Using Dea (Data Envelopment Analysis), Tapati Bandopadhyay, Pradeep Kumar

Journal of International Technology and Information Management

By using the traditional statistical or operations research methods for deciding the product-delivery logistics, the portal companies are not using their competitive advantages on being more e-enabled, informed and computationally able than their traditional counterparts. In this paper, we show some typical characteristics of the portals like their handling of a huge range of goods in terms of transactional values or volumes. Subsequently, we have identified three types of generic product-delivery logistics of the portals with various intermediate entities or trading partners. Then, a completely different approach using an extreme point method rather than the traditional central-tendency-based statistical methods has …


A Predictive Analytic Model For Value Chain Management, Joseph O. Chan Jan 2007

A Predictive Analytic Model For Value Chain Management, Joseph O. Chan

Journal of International Technology and Information Management

Value chain management has gone through various stages of automation, integration and optimization in the past decades. While an optimization model for value chain deals with business scenarios under known circumstances, a predictive value chain model deals with probable circumstances in the future. Predictive analytics is succeeding optimization in the evolution of technologies supporting value chain management. This paper proposes a forward looking value creation model that combines the important concepts of value chain management and predictive analytics. An enterprise model for value chain predictive analytics that facilitates the convergence of information, operations and analytics is presented.


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed Jan 2006

Simulation Model And Analysis Of A Data Warehouse, Vikas Agrawal, Udayan Nandkeolyar, P.S. Sundararaghavan, Mesbah U. Ahmed

Journal of International Technology and Information Management

Data warehouses are large complex systems with many interacting nonlinear components. It is an amalgamation of many different systems and integration of such diverse elements is its primary concern. It is often difficult for a data warehouse manager to predict the performance of the system especially when demand pattern for the required data keeps changing. We have developed a simulation model using ARENA simulation package that will simulate the behavior and performance of a data warehouse system environment based on its overall design. Given such a model, a data warehouse manager can walk through various what-if scenarios and can pinpoint …


Contextual Analysis Of Enterprise Mobile Services Requirements, Radhika Jain Jan 2005

Contextual Analysis Of Enterprise Mobile Services Requirements, Radhika Jain

Journal of International Technology and Information Management

This article presents a framework to classify various types of mobile services implemented in organizational settings. Based on the objectives of wireless information systems (WIS), we identify three categories viz. enterprise mobile services, enterprise-advantage mobile services, and consumer mobile services. While the last two categories of mobile services have received broader attention, there has not been much work done in analyzing the role of mobile services in the organizational settings specific to various industries. In this article, we attempt to fill this void by synthesizing the extant literature in this area. Based on the degree of user’s mobility in their …


Task-Technology Fit In Data Warehousing Environments: Analyzing The Factors That Affect Utilization, Richard V. Mccarthy, George F. Claffey Jan 2005

Task-Technology Fit In Data Warehousing Environments: Analyzing The Factors That Affect Utilization, Richard V. Mccarthy, George F. Claffey

Journal of International Technology and Information Management

Enterprise data warehouses are an expensive investment in both time and resources. The promise of data warehouses is improved decision-making through user empowerment and enablement of sophisticated decision support tools. Have organizations been able to achieve this goal? Task- technology fit defines a model that suggests that for a technology to be utilized, it must meet the needs of a user and provide features that support the fit of the requirements of the task; performance impacts will result. When an organization commits the time and resources necessary to develop an enterprise data warehouse, their expectation will be a high task-technology …