Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Business

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


Determinants Of Digital Distraction: A Cross-Cultural Investigation Of Users In Africa, China And The U.S., Leida Chen, Ravi Nath, Robert Insley Jan 2014

Determinants Of Digital Distraction: A Cross-Cultural Investigation Of Users In Africa, China And The U.S., Leida Chen, Ravi Nath, Robert Insley

Journal of International Technology and Information Management

No abstract provided.


Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre Jan 2010

Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre

Journal of International Technology and Information Management

Enterprise systems need reliable, flexible and secure means for making public and confidential information available to users in a secured and trusted manner. Although enterprise systems have variety of choice to authenticate these users, organizations face significant issues when granting access and providing a manageable structure for valuable access control. Logon functionalities such as user name and password algorithm have been used to grant authentication and authorization into enterprise systems network resources. Since most systems clients prefer the ease of using passwords, and since passwords are easily compromised, the urgency for a stronger authentication process becomes paramount. This study performed …


Leadership Characteristics And Team Outcomes In The Development Of A Marketing Web Page, Garry L. White, Karen H. Smith Jan 2010

Leadership Characteristics And Team Outcomes In The Development Of A Marketing Web Page, Garry L. White, Karen H. Smith

Journal of International Technology and Information Management

Team structures are changing under the pressures of e-commerce and globalization. Today teams have to manage the challenges of working across functional boundaries, such as marketing and web development. In such an environment, research in the disciplines of management and psychology have found that shared leadership among team members may be superior to traditional leadership by a single team member, but this notion has not been tested in the contexts of marketing and web development. This paper presents the results of an empirical study showing that teams with shared leadership exhibited better performance and greater member satisfaction than teams with …


Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom Jan 2009

Supporting The Virtual Community: Social Bookmarking As A User- Based Classification Scheme In A Knowledge Library, Nicole Lytle, Tony Coulsom

Journal of International Technology and Information Management

Knowledge libraries hold the promise of widespread access to information available anywhere, anytime, freeing patrons from the geographical and temporal boundaries that currently exist. The classification of materials and subsequent searching of knowledge library content is an overall problem with many complex parts. Relevant classification is important for optimal information retrieval. This is especially important for the virtual communities that exist with extended organizations. Rooted in the virtual community and digital library literature, this paper develops a theory for improving the information classification and retrieval process of knowledge libraries that support virtual communities by applying social bookmarking techniques.


The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome Jan 2008

The Voyeur Among Us: Navigating Around The Global Spyware Epidemic, Daniel B. Garrie, Liane R. Komagome

Journal of International Technology and Information Management

Spyware poses a serious threat of privacy infringement to unassuming internet users across the globe. Existing European legislation attempts to protect end-users from unethical review and use of their personal data. Outlawing spyware technology and strengthening the legal consent requirement for data- mining may offer end users additional assurances that their privacy rights are upheld, as well as more tangible shelter from the existing spyware epidemic. These proposed solutions, however, will only create successful safe havens for internet users by obtaining international buy-in.


Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun Jan 2006

Determining Information Requirements For E-Business Systems From Activity Space To Information Space, Kecheng Liu, Lily Sun

Journal of International Technology and Information Management

The study of information requirements for e-business systems reveals that the level of detail, granularity, format of presentation, and a broad range of information types are required for the applications. The provision of relevant information affects how e-business systems can efficiently support the business goals and processes. This paper presents an approach for determining information requirements for e-business systems (DIRES) which will allow the user to describe the core business processes, whose specification maps onto a business activity space. It further aids a configuration of information requirements into an information space. A case study of a logistics company in China …


Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach Jan 2006

Development Of A Risk Assessment Model For Global Information Technology Outsourcing, June Wei, Brian Peach

Journal of International Technology and Information Management

Global Information Technology (IT) outsourcing has been recognized to have important potential benefits. However, researchers and practitioners also recognize potential risks involved in global IT outsourcing, which sometimes lead to undesirable consequences. This paper develops a model to assess risks in global IT outsourcing. Specifically, this paper begins by identifying global IT outsourcing risk factors by considering the national infrastructure, organizational infrastructure, and project environment. Second, a Global IT Outsourcing (GITO) engagement model for risk assessment is developed to logically link all these risk factors together. Third, one quantifiable approach based on a relative-weighted assessment model is presented to demonstrate …


A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli Jan 2006

A Framework For Agents Conducting E-Business In A Supply Chain, C.W. Leung, T.N. Wong, Domenic Sculli

Journal of International Technology and Information Management

This paper describes the development of an agent-based framework that supports the purchasing function in supply chain management. The framework has been applied in a case situation for planned order releasing from a manufacturer’s materials requirement planning (MRP) system. The proposed framework incorporates a negotiation protocol that can effectively coordinate the negotiation process between a buyer agent and several supply agents, which may represent the manufacturer and its suppliers respectively. These agents negotiate according to their preferred strategies which aim to conclude a deal that achieves their own objectives. The implementation of the negotiation process involves considerations of the price …


Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta Jan 2005

Online Privacy Policies: An Assessment Of The Fortune Global 100, Randy Ryker, M. Khurrum S. Bhutta

Journal of International Technology and Information Management

Both industry leaders and government officials around the globe are struggling with how to address online privacy. One solution suggested by both groups within the United States is for companies to voluntarily comply with the fair information practices of Notice, Choice, Access, and Security. A content analysis of the online privacy policies of the firms in the Fortune Global 100 was conducted to determine the extent to which the most successful global companies comply with fair information practices. The results indicate that 1.2% fully complies, 87.2% partially comply and 11.6% fail to comply with one or more fair information practice.


Features Of Born-Global Processing Plants Under The Global Economy, Helen G. Zhao, Vistor H.Y. Lo, Domenic Sculli Jan 2005

Features Of Born-Global Processing Plants Under The Global Economy, Helen G. Zhao, Vistor H.Y. Lo, Domenic Sculli

Journal of International Technology and Information Management

A Born-Global Processing Plant (BGPP) is the formation of a new manufacturing plant specifically for the world-wide outsourcing industry and is a unique product of the global economy. The concept of a Born-Global entity has been mainly associated with high-tech industries and high-tech products. In this paper we extend the term BGPP to cover the concept of Born-Global to mature/low-tech and labor intensive processing plants that produce many of the traditional manufactured products. Such processing plants form the backbone of Southern China’s economic development. The conventional view regards a BGPP as playing a minor role in a traditional multinational enterprise …


Two Developing Countries With Two Different Economic Results: A Comparative Study Of Thailand & Morocco, Debora J. Gillard Jan 2004

Two Developing Countries With Two Different Economic Results: A Comparative Study Of Thailand & Morocco, Debora J. Gillard

Journal of International Technology and Information Management

After visiting Thailand in 1996 and Morocco in 2001, it was very evident that these two countries had many similarities. Both countries are ruled by monarchs, both are developing countries, and both have overcome many adversities. However, today we find these two countries are very different in their involvement in the global community and in their local economic development. This paper is a study of similarities and differences in the development of Thailand and Morocco which has resulted in the current economic status.