Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

California State University, San Bernardino

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 271 - 300 of 1455

Full-Text Articles in Business

Authentically Disney, Distinctly Chinese: A Case Study Of Glocalization Through Shanghai Disneyland’S Brand Narrative, Chelsea Michelle Galvez Jun 2018

Authentically Disney, Distinctly Chinese: A Case Study Of Glocalization Through Shanghai Disneyland’S Brand Narrative, Chelsea Michelle Galvez

Electronic Theses, Projects, and Dissertations

In 2016, the Walt Disney Company launched Shanghai Disneyland--the company’s first theme park in mainland China. Entering mainland China poses significant political and cultural challenges for American companies. To address these challenges, Disney pursued a “glocalization” strategy -- it accounted for local norms and values in launching Shanghai Disneyland. This paper examines how Shanghai Disneyland constructed its brand narrative to negotiate tensions in this glocalization process. A semiotic analysis of two Shanghai Disneyland commercials illustrates the ways in which Disney tapped into culturally meaningful themes of harmonic balance and collective identity to produce the park’s brand narrative--“China’s Disneyland.” A thematic …


College Choices Of Latina/O Students Attending A For-Profit College: Understanding Persistence And Retention, Cecilia Loftus Ornelas Jun 2018

College Choices Of Latina/O Students Attending A For-Profit College: Understanding Persistence And Retention, Cecilia Loftus Ornelas

Electronic Theses, Projects, and Dissertations

Although Latina/os are the largest minority group in California and enrolling in higher education in record-breaking numbers (Zarate & Burciaga, 2010), the graduation rate of this group is very low (Kewal-Ramani, Gilbertson, Fox, & Provasnik, 2007). A phenomenological approach was used in this study to explore the lived experiences of Latina/o students at a for-profit college in the Inland Empire. Students from different major fields of study described how they explored and sought college information, how they experienced both community and for-profit colleges, and described their levels of sense of belonging in both community and for-profit colleges. Students shared their …


Competitive Models To Detect Stock Manipulation, Jose J. Thoppan, Punniyamoorthy M., Ganesh K. Mar 2018

Competitive Models To Detect Stock Manipulation, Jose J. Thoppan, Punniyamoorthy M., Ganesh K.

Communications of the IIMA

In this paper, data from the Indian stock market is used to study the prediction accuracy of various classification techniques that can be used to identify market manipulation. The data contains information regarding price, volume and volatility of various stocks. Techniques like discriminant analysis, a composite model based on artificial neural network – genetic algorithm (ann-ga) and support vector machine (svm) have been used for classifying stocks into manipulated and non manipulated categories. It is observed that the support vector machine based technique gives the best classification accuracy among the three techniques.


The Relationship Of Long-Term Orientation With Knowledge Sharing In Virtual Community, Shahnaz Bashir, Abel Usuro Mar 2018

The Relationship Of Long-Term Orientation With Knowledge Sharing In Virtual Community, Shahnaz Bashir, Abel Usuro

Communications of the IIMA

Some studies have looked at how people from different countries share knowledge, information and ideas but the research is still limited. Therefore, this research takes up the challenge to find out the relationship of societal culture and knowledge sharing in multi-national and cross-cultural ‘virtual community.’

The purpose of this paper is to quantitatively assess the relationship of long-term orientation which influences sharing of knowledge, ideas and information in virtual community among different cultural groups. Data were collected from the world’s second largest multinational PC manufacturing company that serves customers across 160 countries. The analysis from five of the countries specifically …


A Benchmarking Toolkit For Corporate Sustainable Development In Supply Chains, Göran Svensson, Nils M. Høgevold Mar 2018

A Benchmarking Toolkit For Corporate Sustainable Development In Supply Chains, Göran Svensson, Nils M. Høgevold

Communications of the IIMA

The objective is to describe and apply a benchmarking toolkit to prioritize managerial implications for the measurement and assessment of sustainable development in supply chains. A case study approach of a Scandinavian hotel chain, which is well-known for its dedication and commitment to the sustainable development of its business practices, is used. The outcome of a TBL dominant logic consisting of dimensions, indicators and items across economic, social and environmental aspects, which yields various benchmarking priorities of implications for supply chains is discussed. The priority of sustainable development in supply chains depends on the others involved who may have contradictory …


Code Generation On Mobile Devices For Mobile Apps, Nathan Amanquah, Susana Ndede Mar 2018

Code Generation On Mobile Devices For Mobile Apps, Nathan Amanquah, Susana Ndede

Communications of the IIMA

There is both a demand and a need for rapidly developing mobile apps for data management as well as apps for conducting surveys. Much of the code for data management operations – create, retrieve, update and delete (CRUD) is the same, except for the parameters passed. Such boilerplate type code is well suited for code generation. Many tools are available for creating apps for conducting surveys, but are ill suited for data management scenarios since CRUD operations are not supported. The tools available generally require a PC to access the web-based build tool, and do not provide source code for …


Bpm Maturity And Performance: The Influence Of Knowledge On Bpm, Benny M.E. De Waal, Arjen Maris, Pascal Ravesteyn Mar 2018

Bpm Maturity And Performance: The Influence Of Knowledge On Bpm, Benny M.E. De Waal, Arjen Maris, Pascal Ravesteyn

Communications of the IIMA

In order to continuously improve performance, organizations need to control their processes. To do this it is assumed that organizations need a high level of business process management maturity and employees need a high level of knowledge and experience in BPM. Proof of this assumption has not been found in the literature. Therefore, the objective of this study is to determine what the influence is, of knowledge and experience of BPM, on the dependence between BPM maturity and process performance. For this study a dataset of 469 respondents from Dutch organizations was collected over the period of 2010 till 2015. …


Project Based Learning Syllabus - Csusb Art Department Brand Identity Re-Design, Andrew Oakes Jan 2018

Project Based Learning Syllabus - Csusb Art Department Brand Identity Re-Design, Andrew Oakes

Q2S Enhancing Pedagogy

In this course and over the entire quarter you will be involved in a group project, which explores and aims to solve a real design and communication problem. As times have changed and the face of art and design has changed so has our perception of what art and design are, as well (and most importantly to you, “where do I fit in, and what skill sets will I need to be successful in this new creative workforce?) Three new studies show that the skills wanted by employers in the design related fields involve not only the hard skills like …


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Should Agile Be Part Of Your Quality Management System?, Timothy C. Krehbiel, Dana P. Miller Jan 2018

Should Agile Be Part Of Your Quality Management System?, Timothy C. Krehbiel, Dana P. Miller

Journal of International Technology and Information Management

Purpose: The purpose of this paper is to explore the role of Agile in Quality Management Systems.

Design/methodology/approach: This paper provides a brief history of Agile and compares it to the management theory of W. Edwards Deming. The authors then examine the strengths and weaknesses of Lean, Agile, and Six Sigma in relationship to the four components of Deming’s System of Profound Knowledge in order to clarify Agile’s role in contemporary Quality Management Systems. In addition to the existing literature, the authors draw extensively on their experiences and observations from more than 50 years of experience in IT …


Table Of Contents Jitim Vol 27 Issue 2, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 2, 2018

Journal of International Technology and Information Management

ToC JITIM vol 27 - 2, 2018


The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi Jan 2018

The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi

Journal of International Technology and Information Management

The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.

This study covers …


Moderating Effects Of Age And Experience On The Factors Influencing The Actual Usage Of Cloud Computing, Shailja Tripathi Jan 2018

Moderating Effects Of Age And Experience On The Factors Influencing The Actual Usage Of Cloud Computing, Shailja Tripathi

Journal of International Technology and Information Management

Cloud computing technology (CCT) has attracted extensive attention of organizations to enhance their agility, flexibility and competitive advantage. Successful implementation of CCT depends on its acceptance and useby senior IT managers in the organizations. This study proposes an extended technology acceptance model (TAM) to predict actual CCT usage by the managers. A questionnaire is used to collect the needful data. Exploratory and confirmatory factor analyses are performed to analyze the factor structure and measurement model. Structural equation modeling is used to analyze the structural model. The results supported all the hypotheses of the model. The moderating effect of experience and …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Managing Employee Attitude For A Successful Information System Implementation: A Change Management Perspective, Smita Chaudhry Jan 2018

Managing Employee Attitude For A Successful Information System Implementation: A Change Management Perspective, Smita Chaudhry

Journal of International Technology and Information Management

In the last three decades, there has been considerable advancement in the design of information systems used in organizations. Information systems facilitate critical organizational activities like recording and processing of business transactions, analyzing complex and large sets of data and generating management and executive level reports. However, their adoption is generally fraught with challenges because of the negative attitude of employees to the impending change in their work life. Taking into account the enormous investment of cost, time and effort in information system implementation, it is imperative for organizations to recognize and influence employee attitude from the very beginning to …


Not All Consumers Follow Suit: Information Choices And Effect Of Reviews, Seung Lee Jan 2018

Not All Consumers Follow Suit: Information Choices And Effect Of Reviews, Seung Lee

Journal of International Technology and Information Management

Understanding the process of consumers' buying decisions is not intuitively obvious from the way it appears. Before we come up with any acceptable account of the process, we should learn more about consumers' traits as well as the characteristics of the goods or services they intend to purchase. The goal of this study is to establish the alignment of consumers' buying decisions with information choice and determine why consumers may or may not make buying decisions compatible with reviewer comments. To explain the reality of multiple consumer equilibria, the paper draws on the four information choice theories: inattentiveness, rational inattention, …


Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu Jan 2018

Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu

Journal of International Technology and Information Management

Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang Dec 2017

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor Dec 2017

Trends In It Human Resourses And End-Users Involved In It Applications, Vipin K. Agrawal, Vijay K. Agrawal, Srivatsa Seshadri, A. Ross Taylor

Journal of International Technology and Information Management

The Bureau of Labor Statistics projected the demand for information technology (IT) human resources to increase by 13.26 percent between 2014 and 2024. In this survey research, the IT professionals estimated a growth of 34.16 percent in IT human resources over a period of five years from the year 2016. The goal of this survey study was to try to understand the discrepancy in the estimates for IT human Resources requirements by developing a theory-driven model to evaluate the impact of growth in IT outsourcing/offshoring, cloud-computing, end-users-computing, IT applications, and usage of commercial-off-the-shelf/ERP on the need for IT human resources.


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech Oct 2017

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Backpedaling Nugget Smugglers: A Facebook And News Article Thematic Analysis Of Chick-Fil-A Vs. Gay Marriage, Stacy M. Wiedmaier Jun 2017

Backpedaling Nugget Smugglers: A Facebook And News Article Thematic Analysis Of Chick-Fil-A Vs. Gay Marriage, Stacy M. Wiedmaier

Electronic Theses, Projects, and Dissertations

This study utilizes William Benoit’s Image Repair Theory to frame the dominant crisis communication strategies that fast food chain Chick-fil-A (CFA) employed before, during and after their CEO mixed his personal opinion on social issues with corporate policy in June 2012. The thematic analysis draws from three distinct data sets that include 3,900 Facebook comments posted by the general public on CFA’s social media page, 32 individual Atlanta Journal-Constitution news articles that address the debate and CFA’s public response to the crisis titled “Who We Are.” This thesis aims to identify both the dominant themes in Facebook posts and the …


The Chief Information Security Officer: An Exploratory Study, Erastus Karanja, Mark A. Rosso Jun 2017

The Chief Information Security Officer: An Exploratory Study, Erastus Karanja, Mark A. Rosso

Journal of International Technology and Information Management

The proliferation and embeddedness of Information Technology (IT) resources into many organizations’ business processes continues unabated. The security of these IT resources is essential to operational and strategic business continuity. However, as the large number of recent security breaches at various organizations illustrate, there is more that needs to be done in securing IT resources. Firms, through organizational structures, usually delegate the management and control of IT security activities and policies to the Chief Information Security Officer (CISO). Nevertheless, there seem to be a number of firms without a CISO and for the ones that do, there is little consensus …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017