Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

California State University, San Bernardino

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 301 - 330 of 1439

Full-Text Articles in Business

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan Jan 2017

It Governance Measurement Tools And Its Application In It-Business Alignment, Mathew Nicho, Shafaq Khan

Journal of International Technology and Information Management

TThe purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the nature of tools employed, measurement processes, and the implementation methodology, using case studies. Analysis of the available academic and non-academic literature sources showed measurement issues being the most dominant and ironically the most neglected domain in ITG implementations. We view ITG measurement tools and it subsequent deployment through the two theoretical ITG models namely the Integrated IT Governance model, and the Structures, Processes, …


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran Jan 2017

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson Jan 2017

Blockchain Technology Adoption Status And Strategies, Joseph M. Woodside, Fred K. Augustine Jr., Will Giberson

Journal of International Technology and Information Management

Purpose: The purpose of this paper is to review the acceptance and future use of blockchain technology. Given the rapid technological changes, this paper focuses on a managerial overview and framework of how the blockchain, including its implementations such as Bitcoin have advanced and how blockchain can be utilized in large-scale, enterprise environments. The paper begins with a technological overview that covers the history of the technology, as well as describing the computational, cryptographic theory that serves as the basis for its notable security features. This paper also covers several key application areas such as finance, accounting, and marketplaces where …


An Adaptive Supplier Selection Mechanism In E-Procurement Marketplace, Liangjun You, Dong-Qing Yao, Riyaz T. Sikora, Barin Nag Jan 2017

An Adaptive Supplier Selection Mechanism In E-Procurement Marketplace, Liangjun You, Dong-Qing Yao, Riyaz T. Sikora, Barin Nag

Journal of International Technology and Information Management

B2B e-commerce has fundamentally changed the way in which an organization purchases goods/service. Nowadays, the adoption of e-procurement, which means the electronic acquisition of goods/service, has been prevalent in supply chain management. A variety of supplier selection models have been developed in supply chain management literature. In this research, an adaptive supplier selection mechanism is proposed to help buyers evaluate suppliers in an e-marketplace. A Multi-Agent System simulation package of Repast is used to create a realistic environment where different kinds of suppliers and buyers equipped with the proposed selection model can interact so as to study the performance of …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari Jan 2017

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …


Identifying Effective Online Service Strategies: The Impact Of Network Externalities And Organizational Lifecycle Stage, Troy J. Strader Jan 2017

Identifying Effective Online Service Strategies: The Impact Of Network Externalities And Organizational Lifecycle Stage, Troy J. Strader

Journal of International Technology and Information Management

This study presents a framework for identifying effective online transaction-based service strategies that incorporates network externalities and organizational life cycle theories. The framework considers changes in marginal costs, marginal revenues, and service value as the company moves through its initial three life cycle stages (start-up, growth, and maturity). Propositions describe potentially effective strategies for service sites in each lifecycle stage. Each of the propositions is supported by real-world strategy examples and research related findings from three industries – online auctions, online career services and online travel services. Start-up strategies must focus on increasing the number of service users, growth companies …


Professional And Personal Social Networking And Enhancement Of Social Capital In Young Adults, Maria Malu H. Roldan, Janejira Sutanonpaiboon, Richard Burkhard Jan 2017

Professional And Personal Social Networking And Enhancement Of Social Capital In Young Adults, Maria Malu H. Roldan, Janejira Sutanonpaiboon, Richard Burkhard

Journal of International Technology and Information Management

PROFESSIONAL AND PERSONAL SOCIAL NETWORKING AND ENHANCEMENT OF SOCIAL CAPITAL IN YOUNG ADULTS

ABSTRACT

This study compares the use of personal and professional social networking sites by young adults for social capital enhancing activities. The research is based on a survey of college-age adults (n=292) who were asked about their use of two social networking sites of contrasting architectures: the more interactive, social/personal\-oriented site Facebook, and the relatively less interactive, professional/business-oriented site LinkedIn. Data were analyzed to determine the relationships among demographic and technology experience factors, and respondents’ use of these sites for social capital enhancing activities. Findings suggest that …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


E-Government Services Adoption And Interdependence: Granger Causality Analysis, Shashi Kant Srivastava, Sanjog Ray Nov 2016

E-Government Services Adoption And Interdependence: Granger Causality Analysis, Shashi Kant Srivastava, Sanjog Ray

Journal of International Technology and Information Management

Adoption of e-government services varies across the different categories of services: government to citizen services, utility services, commercial services, informational services, social benefit services and mobile based services. Faced with constraint of resources, policy makers devising strategies for better adoption of these services face the challenge of prioritizing among these categories of services. This paper attempts to address this challenge by showing the applicability of Granger causality analysis in studying the causation analysis between the categories of e-government services. We prove the applicability of Granger causality analysis in understanding the independence between e-government service categories by analyzing real transactions data …


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


The Role Of Motivational Systems And Emotions In Virtual Work, Steven A. Murphy, Michael J. Hine, Sandra Kiffin-Petersen Dr Jan 2016

The Role Of Motivational Systems And Emotions In Virtual Work, Steven A. Murphy, Michael J. Hine, Sandra Kiffin-Petersen Dr

Communications of the IIMA

The purpose of this paper is to examine the role of the behavioural activation system (BAS), the behavioural inhibition system (BIS) and emotions in virtual work. BIS was found to have significant positive relationships with anger, anxiety, annoyance, nervousness, and distress. There were indications of emotional contagion between research confederates and participants. Self-report skill knowledge and the skill role of the research confederate both had significant relationships with performance. Self-report skill knowledge was fully mediated by the skill role played by the research confederate. Managers of virtual teams need to be aware of individual differences such as motivational systems and …


Big Data Customer Knowledge Management, Joseph O. Chan Jan 2016

Big Data Customer Knowledge Management, Joseph O. Chan

Communications of the IIMA

Knowledge management (KM) and customer relationship management (CRM) are dominant strategies for value creation for businesses in the new economy. Customer knowledge management (CKM) results in the merging of KM and CRM, where the knowledge management process is applied to customer knowledge, and customer knowledge is applied to customer relationship management operations. With the emergence of big data as the latest phase in the evolution of technology in business, CKM strategies need to be adjusted to meet the new challenges, changing from an internal organizational focus to new external channels such as social media and machine communications. This paper explores …


Measurement And Test Performance For Integrated Digital Loop Carrier For White Noise Impairment Using Interleaved Mode, Sarhan M. Musa, Emmanuel U. Opara, Mohammed A. Shayib, J D. Oliver Jan 2016

Measurement And Test Performance For Integrated Digital Loop Carrier For White Noise Impairment Using Interleaved Mode, Sarhan M. Musa, Emmanuel U. Opara, Mohammed A. Shayib, J D. Oliver

Communications of the IIMA

This paper presents results of measurement and test performance for integrated digital loop carrier (IDLC) technology. The study focuses on cable modem termination systems (CMTSs) that are reported on assortments of operating parameters to the end user based on upstream and downstream modes that are incorporated with statistical analysis approach. The study focuses on the statistical analytical measurement for noise margins on a particular type of loops – “white noise impairment.”


Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin Jan 2016

Information Technologies And Elderly Care In China: A New Paradigm, Hailong Zhu, C E Tapie Rohm, Jake Zhu, Frank Lin

Communications of the IIMA

China’s aged population has increased dramatically. Because of the one child policy, China now has fewer and fewer children able to support the elderly. The care of China’s elderly is a huge challenge which requires the exploration of all kinds of elderly care models through intelligence and information management technology advances. With the evolving field of Information Management and with the development of newer and cheaper technology, the time has come for a paradigm shift to be explored. A shift in the way China is managing its technology and culture expectations is necessary to address this unique need. This paper …


Mcneil, A Johnson & Johnson Subsidiary Fda Case Study, Warren Adis Jan 2016

Mcneil, A Johnson & Johnson Subsidiary Fda Case Study, Warren Adis

Communications of the IIMA

This case study provides a detailed five-year review of one of Johnson & Johnson’s important subsidiaries, McNeil Consumer Healthcare. The research presents summaries from the Food and Drug Administration (FDA) inspection reports, out-of-compliance findings, and warning letters for the period between 2007 and 2011. It also relies on a class action lawsuit and a judicial consent decree within this timeframe to further understand the relationship between Johnson & Johnson and McNeil. The case study focusses on problems in the manufacturing and quality assurance at McNeil, and how Johnson & Johnson may have exacerbated McNeil’s production failures.


Business Intelligence And Big Data Analytics: An Overview, Xin James He Jan 2016

Business Intelligence And Big Data Analytics: An Overview, Xin James He

Communications of the IIMA

This research investigates the current status of big data business analytics and critical skills necessary to create business value. Business analytics refers to the skills, technologies, applications and practices for continuous iterative exploration and investigation of past business performance to provide actionable insights. Business analytics focuses on developing new insights and understanding of business performance based on data and statistical methods. Big data is used to characterize data sets that are large, diverse and rapidly-changing, as seen by ever- increasing numbers of organizations. Big data require database management systems with capabilities beyond those seen in standard SQL-based systems. According to …


Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen Jan 2016

Achieving Value Co-Creation In It Outsourcing, Szu-Yuan Sun, Li-Shan Chen

Journal of International Technology and Information Management

Over the past few decades, information technology outsourcing has become a widely used and researched means for enterprises to enhance their performance. As future collaboration is the most desirable outcome between enterprises and IT outsourcing vendors, the purpose of this study is to construct a new model to examine: 1) whether information technology outsourcing satisfaction impact future collaboration, 2) whether value co-creation impact outsourcing satisfaction, 3)which factors influence value co-creation, and 4) whether trust influence enterprises’ commitments. This research assumes that: 1) trust predicts enterprises’ commitments; 2) customer orientation and participation, service quality, communication culture, and enterprises’ commitment predicts value …