Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Business

Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova Jan 2015

Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova

Journal of International Technology and Information Management

We use social networks to communicate, keep in touch and express our opinions in a manner that has become completely ubiquitous. However, this very ubiquity and ease of expression have exposed another, contentious side – one where nobody can remain completely anonymous for long and where every conversation is stored in perpetuity. Some fear that the ephemeral quality of a social interaction has been lost, which threatens our right to be forgotten and freedom of expression. In this paper, we look at why people engage in anonymous communication, and if there is a perceived need for legal protection of anonymous …


Value Of Online Social Networks From The Perspective Of The User, A.J. Gilbert Silvius, Ruta Kavaliauskaite Jan 2014

Value Of Online Social Networks From The Perspective Of The User, A.J. Gilbert Silvius, Ruta Kavaliauskaite

Journal of International Technology and Information Management

This paper reports a study on the willingness to pay for the services of online social networks (OSNs). The relevancy of the question is derived from indications that these OSNs are considering charging their users for more advanced services in order to develop from the advertisement-based business model. The value of these OSNs has been studied mainly from the perspective of the advertiser. This paper reports a study into the value of OSNs from the user perspective. More specifically, the study investigated the willingness to pay for the use of the OSNs Facebook, Twitter and LinkedIn, and the factors influencing …


Teaching Web Information Retrieval And Network Communications Undergraduate Courses In It Curriculum, Song Xing, Xiannong Meng, Wei Wang Jan 2012

Teaching Web Information Retrieval And Network Communications Undergraduate Courses In It Curriculum, Song Xing, Xiannong Meng, Wei Wang

Journal of International Technology and Information Management

This paper provided the results of an investigation on the teaching of computer networks courses and web information retrieval courses in undergraduate Information Technology (IT) curriculum. The paper consists of two parts. First part of the paper surveys the undergraduate courses in two curriculum areas, computer networks and web information retrieval. The content of the survey includes the topics covered, the textbooks used, and major projects in these courses. The second part of the paper describes the authors’ experiences in teaching such courses to undergraduate students in various discipline areas including computer science majors, IT majors, and non-technical majors.


Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre Jan 2010

Enterprise Systems Network: Securid Solutions, The Authentication To Global Security Systems, Emmanuel U. Opara, Vance Etnyre

Journal of International Technology and Information Management

Enterprise systems need reliable, flexible and secure means for making public and confidential information available to users in a secured and trusted manner. Although enterprise systems have variety of choice to authenticate these users, organizations face significant issues when granting access and providing a manageable structure for valuable access control. Logon functionalities such as user name and password algorithm have been used to grant authentication and authorization into enterprise systems network resources. Since most systems clients prefer the ease of using passwords, and since passwords are easily compromised, the urgency for a stronger authentication process becomes paramount. This study performed …


Strategies For Manufacturing In Southern China, Hilda M.S Lai, Domenic Sculli Jan 2009

Strategies For Manufacturing In Southern China, Hilda M.S Lai, Domenic Sculli

Journal of International Technology and Information Management

This paper investigates the structure of industrial and business network strategies in the global manufacturing environment based on empirical data from 87 manufacturing firms in the Pearl River Delta of Southern China. Relevant data was collected using a questionnaire approach and analyzed using appropriate statistical techniques. Hierarchical cluster analysis was employed to devise taxonomy for industrial network strategies. Three distinct clusters were identified: Network Integrators, Network Learners and Network Conformists. Results indicate that the former two clusters, though differing in the extent of scale, adopt a holistic approach in developing both intra- and inter-firm strategies and that the third cluster …


The Moderating Effects Of Technology On Career Success: Can Social Networks Shatter The Glass Ceiling?, Paul Fadil, Cindi Smatt, Sharon L. Segrest, Crystal Owen Jan 2009

The Moderating Effects Of Technology On Career Success: Can Social Networks Shatter The Glass Ceiling?, Paul Fadil, Cindi Smatt, Sharon L. Segrest, Crystal Owen

Journal of International Technology and Information Management

This paper reviews the demographic predictors of career success and proposes that technology plays a critical role in alleviating career success barriers for various demographic groups who have historically encountered barriers. Specifically we propose that technology can act as a moderator allowing minority groups greater participation and acceptance in networks. And, ultimately the greater participation and acceptance in networks will lead to greater career success for groups who have typically encountered “glass ceilings” based on demographic variables such as gender, age, race and ethnicity.


Inference-Guiding On Bayesian Knowledge-Based Systems, Jinchang Wang Jan 2009

Inference-Guiding On Bayesian Knowledge-Based Systems, Jinchang Wang

Journal of International Technology and Information Management

Bayesian network is a robust structure for representing knowledge containing uncertainties in a knowledge-based system. In applications of expert systems and knowledge-based systems, it often happens that initial data are not sufficient to derive a conclusion of high enough certainty. Inference-guiding is in that case to identify the missing information, pursue its value, and lead inference to a conclusion. This paper presents and characterizes a criterion for effectively selecting key missing information, and thereby develops a “smart” inference approach with the inference-guiding function based on the newly developed criterion for uncertain inference in a Bayesian knowledge-based system.


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka Jan 2006

Enterprise Integrated Security Platform: A Comparison Of Remote Access And Extranet Virtual Private Networks, Emmanuel U. Opara, Jack T. Marchewka

Journal of International Technology and Information Management

The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs).


A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt Jan 2005

A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt

Journal of International Technology and Information Management

Ultra-wideband (UWB) is a promising class of high-speed wireless communications applications that is projected to significantly change local and wide area network architectures. This article describes the technology, its probable application areas, the environmental forces that are constraining and enabling commercialization, and the prospects for short-term growth for UWB services. Commercial sale and distribution of UWB products has been approved, and widespread sale is expected by 2007.


Machines And Machinations: The Integrated Care Record Service In The Uk National Health Service, Reshma Ramesh Gandecha, Christopher Atkinson, Anastasia Papazafeiropoulou, Lampros Stergioulas Jan 2005

Machines And Machinations: The Integrated Care Record Service In The Uk National Health Service, Reshma Ramesh Gandecha, Christopher Atkinson, Anastasia Papazafeiropoulou, Lampros Stergioulas

Journal of International Technology and Information Management

This paper examines the use of Actor Network Theory (ANT) as a lens to get a better understanding of the implementation of the Integrated Care Record Service (ICRS) in the UK National Health Service (NHS). Actor Network Theory has been deployed in various environments to achieve a better understanding of the roles of not only the humans but also the artifacts that constitute, in this case, healthcare networks of services and organisations. The theory is used as a means of supporting real world interventions, providing a richer understanding of complexities involved and thereby helps management to make better decisions. This …


Review Of The Opnet It Guru Software, Jeng-Chung Victor Chen Jan 2004

Review Of The Opnet It Guru Software, Jeng-Chung Victor Chen

Journal of International Technology and Information Management

The OPNET IT GURU has been in existence for years and designed to be used for the industry and the academics. The simulation software is now in version 10.0 and equipped with abundant features such as: modeling network topology and traffic, application impact assessment, and server capacity planning. The features of modeling network topology and traffic are ideal for network engineers to experiment different kinds of scenarios before implementation of any networks, which in turn could cost the organizations less on the IT budget. The application impact assessment is useful when measuring the end-to-end time of the deployed or to-be-deployed …