Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computers

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 34

Full-Text Articles in Business

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Regulating New Tech: Problems, Pathways, And People, Cary Coglianese Dec 2021

Regulating New Tech: Problems, Pathways, And People, Cary Coglianese

All Faculty Scholarship

New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …


The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof Apr 2021

The Impact Of Ict Projects On Developing Economies: The Case Of People With Physical Disabilities In Nigeria, Abdulrashid Abubakar Iliya, Chidi Gerald Ononiwu, Muhammadou M.O Kah, Olumide Babatope Longe Prof

The African Journal of Information Systems

This study investigates the use of computers by People with Disabilities (PWDs) and whether it improves capability and human development in sub-Saharan Africa. Based on a case study’s findings and interviews with PWDs, we build on the Technology-Augment Capability Approach to show how computers as technical objects and caregivers as non-technical objects facilitate four key capabilities for PWDs, namely (1) Capability to education, (2) Capability to socio-economic activities, (3) Capability to social relations, (4) Informational capabilities and capability to employment. However, PWDs’ ability to convert the use of computers into capabilities is influenced by conversion factors, such as personal, social, …


A Strategic Audit Of Microsoft, Alexander Eitzman Apr 2019

A Strategic Audit Of Microsoft, Alexander Eitzman

Honors Theses

This paper provides an analysis of Microsoft’s current market placement and performance, based off external and internal factors, as well as tools such as SWOT analysis. The goal of this audit is to provide an understanding of Microsoft’s current positioning and strategy, as well as a look into possible paths going forward. Additionally, alternative strategies are discussed, and a recommendation is made to which Microsoft should pursue to continue its success. The recommendation reached is that Microsoft should focus on keeping numbers of active Windows users up, as well as pursue a subscription-based model for Windows updates and pricing. The …


Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei Aug 2018

Assessing The Use Of Information And Communication Technology In Teaching And Learning In Secondary Schools, De-Graft Johnson Dei

Library Philosophy and Practice (e-journal)

Information and Communication Technology (ICT) has become a force that has changed many aspects of the way we live and every aspect of human endeavor such as education, medicine, business, law and engineering. Education is a socially oriented activity and quality education has traditionally been associated with teachers having high degrees of personal and face-to-face contact with students. But with the world moving rapidly into digital media and information, the role of ICT in education is becoming more and more important. However, indicators on technology uptake and use in education in the secondary schools in Ghana are missing and most …


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


K‐State Polytechnic Diversity Assignment & Project Showcase, William Genereux, Becky Lynn Degreeff Oct 2016

K‐State Polytechnic Diversity Assignment & Project Showcase, William Genereux, Becky Lynn Degreeff

Institute for Student Learning Assessment

On the K-State Polytechnic campus in Salina, KS, five faculty members have identified a project or assignment having a connection with human diversity in a course they teach. These projects and assignments were originally presented in a panel session at the 2013 American Society of Engineering Education (ASEE) – Midwest conference.

The panelists were the following faculty members:

Becky DeGreeff (Communication), Fred Guzek (Marketing & Business), Jung Oh (Chemistry), Greg Stephens (Business), and Bill Genereux (Computer Technology). The assignments presented included an activity in speech class that addresses racial and economic privilege, an international marketing exercise that follows a French …


Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols Jun 2015

Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols

Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)

Presenter: Peter D. Nichols, Esq., Partner, Berg, Hill, Greenleaf and Ruscitti, Boulder, CO

25 slides


Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon Feb 2015

Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon

Susan N. Houseman

Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …


Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon Jan 2015

Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy J. Sturgeon

Timothy J. Bartik

Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …


Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku Jan 2015

Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku

Journal of International Technology and Information Management

Students today need to have computer knowledge and skills to enable them perform their task at school and their jobs. This presents a challenge to universities on how to provide computer education to their students. This challenge is even more critical for students in developing countries. Few studies have been done on attitude of students’ use of computers in a university environment using a well-grounded technology acceptance mode. The purpose of this study is to find the factors that influence student attitude in the acceptance and use of computers in tertiary institutions in emerging economies using the Theory of Planned …


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord May 2014

Readings And Cases In Information Security: Law & Ethics, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Readings and Cases in Information Security: Law & Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy Sturgeon Jan 2014

Measuring Manufacturing: How The Computer And Semiconductor Industries Affect The Numbers And Perceptions, Susan N. Houseman, Timothy J. Bartik, Timothy Sturgeon

Upjohn Institute Working Papers

Growth in U.S. manufacturing’s real value-added has exceeded that of aggregate GDP, except during recessions, leading many to conclude that the sector is healthy and that the 30 percent decline in manufacturing employment since 2000 is largely the consequence of automation. The robust growth in real manufacturing GDP, however, is driven by one industry segment: computers and electronic products. In most of manufacturing, real GDP growth has been weak or negative and productivity growth modest. The extraordinary real GDP growth in computer-related industries reflects prices for computers and semiconductors that, when adjusted for product quality improvements, are falling rapidly. Productivity …


Bounding The Inefficiency Of Logit-Based Stochastic User Equilibrium, Xiaolei Guo, Hai Yang, Tian-Liang Liu Jan 2010

Bounding The Inefficiency Of Logit-Based Stochastic User Equilibrium, Xiaolei Guo, Hai Yang, Tian-Liang Liu

Odette School of Business Publications

Bounding the inefficiency of selfish routing has become an emerging research subject. A central result obtained in the literature is that the inefficiency of deterministic User Equilibrium (UE) is bounded and the bound is independent of network topology. This paper makes a contribution to the literature by bounding the inefficiency of the logit-based Stochastic User Equilibrium (SUE). In a stochastic environment there are two different definitions of system optimization: one is the traditional System Optimum (SO) which minimizes the total actual system travel time, and the other is the Stochastic System Optimum (SSO) which minimizes the total perceived travel time …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


El Paso's Digital Divide: A Multivariate Analysis Of Computer Ownership And Internet Access From Home In El Paso County, Mathew Mcelroy, Dennis L. Soden Feb 2003

El Paso's Digital Divide: A Multivariate Analysis Of Computer Ownership And Internet Access From Home In El Paso County, Mathew Mcelroy, Dennis L. Soden

IPED Technical Reports

No abstract provided.


Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden Feb 2003

Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden

IPED Technical Reports

No abstract provided.


Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo Jan 1997

Windows95: Is It The Bargain It Was Supposed To Be?, Conrad Shayo

Journal of International Information Management

Whereas a critical mass of computer users has migrated to Windows95, some are still using Windows 3.1 and DOS. There is concern that the benefits of installing Windows95 may not outweigh the costs.


Development Of Effective Computer Tutorial Documentation, Sheryl L. Fields Jan 1996

Development Of Effective Computer Tutorial Documentation, Sheryl L. Fields

Theses

This thesis will focus on the study of developing effective tutorial documentation.

In the past, computer documentation was written almost exclusively by engineers and programmers (or other highly trained personnel). Because of this, it was referential rather than tutorial, and it tended to assume the audience had a high level of technical knowledge and expertise. People using computers today come from a wide variety of backgrounds, many of them not technical. These users need tutorial manuals that are written in every day language and that emphasize what the user does, not what the machine or the program does.

The instructions …


Computers And Schools, Larry Arnoldsen Jan 1994

Computers And Schools, Larry Arnoldsen

Journal of International Information Management

In an elementary school in a small Idaho town in 1969 a ten-year-old boy suggested the use of a computer to answer a difficult historical question: What was the major cause of the American Civil War?


Personal Computers And Powerful Preseritations, J. Douglas Gibb Jan 1993

Personal Computers And Powerful Preseritations, J. Douglas Gibb

Journal of International Information Management

Some of the best public speakers use personal computers to prepare their talks. They keep a file of speaking materials: quotations, examples, statistics, stories, poems, visual aids, and structured experiences. These items which they keep ori a disk become nuggets of thought and are like money in the bank—always ready when theiy need them. Speaking is not communicating unless some of these materials are used.