Open Access. Powered by Scholars. Published by Universities.®

Business Intelligence Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 45

Full-Text Articles in Business Intelligence

Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta Dec 2023

Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …


Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich May 2023

Selecting Appropriate Technology For An Effective Online Extension Course, Paul A. Hill, Amanda D. Ali, Emy A. Swadley, Russell O. Goodrich

The Journal of Extension

Technology is a strategic asset in accomplishing the land grant mission. Selecting appropriate technology for Extension program management and delivery is essential to achieving planned outcomes, but can be challenging. This article describes the technology platforms selected by a new, legislatively funded Extension program delivering an online course in a hybrid distance-learning experience. The descriptions and application of these technology platforms will assist Extension professionals in choosing technology suitable for delivery and management of their programs as they plan for impact.


Consumers’ Responses To New Technologies In The Marketplace, Umair Usman Jan 2023

Consumers’ Responses To New Technologies In The Marketplace, Umair Usman

Theses and Dissertations--Marketing and Supply Chain

Chapter 1. This research examines whether the use of blockchain technology to back a brand’s claims (i.e., blockchain augmented claims) influences consumer preference for sustainable products. Consumers are demanding higher levels of transparency from brands and are also showing keen interest in consuming sustainable products, which includes products that promote social, environmental and economic sustainability. Recent advancement in digital technology, specifically blockchain, is offering an opportunity for brands to meet both these consumer demands. In five laboratory studies, I demonstrate that blockchain augmented claims, as compared to traditional industry practices (i.e., use of third-party labels and brand’s self-made claims), increases …


The Role Of Institution Based Trust In Iot Environment: A Theoretical Model, Anupam K. Nath Jun 2022

The Role Of Institution Based Trust In Iot Environment: A Theoretical Model, Anupam K. Nath

Southern University College of Business E-Journal

Internet of Things (IoT) is rapidly gaining popularity at the industrial as well as personal level. This rapid adoption of IoT has created privacy, security, and other relevant concerns. In this paper, we develop a theoretical model based on the Trust-based model that can help us understand a user's adoption of an IoT device.


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


An Empirical Study To Understand The Effectiveness And Scope Of Blockchain Technology In Indian Public Sector, Radhakrishnan Airy, Hritika Gajarlawar, Nilay Bajaria, Ganesh Joshi Mar 2022

An Empirical Study To Understand The Effectiveness And Scope Of Blockchain Technology In Indian Public Sector, Radhakrishnan Airy, Hritika Gajarlawar, Nilay Bajaria, Ganesh Joshi

Walden Faculty and Staff Publications

The Blockchain is a distributed database that is maintained as Blocks and contains all transactions or digital occurrences. These are the records of transactions that take place between parties.Blockchain blocks are kept as blocks and shared among participants. Each Block is examined, validated, and saved by the parties who are a part of the system/network, each brick is unique and contains the details of a single transaction as well as the transaction's hash key. The study offers insights to researchers about the opportunity threat and future use of blockchain in the public sector.


Bitcoin: The Pioneer Of Cryptocurrency With A Limited Dream, Anna M. Gellerman, Benjamin Zheng May 2021

Bitcoin: The Pioneer Of Cryptocurrency With A Limited Dream, Anna M. Gellerman, Benjamin Zheng

Publications and Research

BitCoin is the most well known and adaptable cryptocurrency today. Due to the evolvement of the cryptocurrency market, many are thinking what this could mean for society; is the world ready for a new mainstream medium of exchange? This poster argues that although BitCoin is functional for small scale payments, it is inadaptable to become a payment tool comparable to cash and card.


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


A Path To Digitalisation Featuring The Dbs Story, Robin Speculand May 2020

A Path To Digitalisation Featuring The Dbs Story, Robin Speculand

Perspectives@SMU

Digitalisation of businesses has been rapidly increasing over the last few years and now it has become a necessity, rather than an option, for many. The article provides a path and model for leaders to transform their business. It starts by recognising that businesses need a digital vision driven by customers’ requirements and explains how to build centricity and be ready for the future.


China: Nuevo Líder Global En Robótica, Andrei Camilo Enriquez Rodriguez, Mateo Arcila Gómez Jan 2020

China: Nuevo Líder Global En Robótica, Andrei Camilo Enriquez Rodriguez, Mateo Arcila Gómez

Finanzas y Comercio Internacional

Con el crecimiento económico y empoderamiento de China profundizado en el siglo XXI, Estados Unidos, hegemón hasta ahora en el sistema internacional, ha visto debilitado su poder especialmente en el desarrollo de algunos sectores tecnológicos; de ahí la importancia de investigar esta coyuntura global, donde China se perfila como actor principal del sistema internacional. En este sentido, la presente investigación se propone profundizar en los intereses tanto de Estados Unidos como de China, en investigación y desarrollo de las nuevas tendencias en materia de tecnología y su incidencia en el desempeño del sistema internacional, cuyos efectos, por la interdependencia global …


The Futurist, Ryan Stenquist Apr 2019

The Futurist, Ryan Stenquist

Marriott Student Review

Ubiquitous self-driving cars, robot workers, and massive political shifts may seem far away and irrelevant to our day to day lifestyles. However, Mr. Schenker proves that these changes are fast-approaching and come as timely responses to the problems and opportunities of today.


Dynamic Logistics Enabled By Iot, Madeline K. Conner Apr 2018

Dynamic Logistics Enabled By Iot, Madeline K. Conner

Honors College Theses

The implementation of Internet of Things technology is becoming increasingly popular in the logistics industry due to its promise of valuable payoffs. The benefits will span across the entire logistics value chain, and benefits from IoT implementation will also impact areas such as operational efficiency, safety, security, and customer experience, while redesigning traditional business models. This report specifically focuses on creating a dynamic logistics system using the Internet of Things. The findings of this report focus on the associated cost savings between traditional logistics systems, and a daily dynamic model enabled by IoT technology. By applying IoT to logistics operations …


Where Will Technology Lead Us?, Jerry Kennelly Jan 2018

Where Will Technology Lead Us?, Jerry Kennelly

Irish Business Journal

Artificial intelligence is a misnomer in my opinion. You get out what you put in. AI seeks to simulate intelligent human behaviour in software and computers. If you consider AI software like a big database and learns along the way. It is programmed by clever humans who create algorithms which use all of the data available and process it to give a calculated result. For example, my IPhone will tell me that it’s going to take me ten minutes to drive home when I walk onto the street from my office in Killorglin. It doesn’t know I’m going home, but …


Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D Dec 2017

Education Leadership Perspectives: Positve Ways, Iwasan D. Kejawa Ed.D

Department of Educational Administration: Faculty Publications

Are outdated traditional education, information technological infrastructure, problematic issues in providing quality leadership education in many of our instittutions today? With this into considerations, are these issues vital in order to stabilize the political and economic embroidery of our institutions or organizations, and its psychological and sociological awareness? What are really to be taught in our institutions to educate the present and the future leaders in the society? It is found that education may be the training of the mind to perform desire functions or to perpetuate the modality of obtaining an end or result. Actually, the accessibility of leadership …


Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams Apr 2017

Byu Tech Club: At The Base Of Silicon Slopes, William R. Adams

Marriott Student Review

As technology continues to drive Utah's economic growth, Brigham Young University students have launchd the BYU Tech Club to inform their peers with technical and non-technical degrees of career opportunities in technology, build the skills and knowledge to be attractive job candidates, and earn internship and full-time offers from high-grow startups and leading technology companies.


Patient-Centered Care Process Enabled By Integrative Social Media Platform In An Outpatient Setting, Inkyoung Hur Aug 2016

Patient-Centered Care Process Enabled By Integrative Social Media Platform In An Outpatient Setting, Inkyoung Hur

FIU Electronic Theses and Dissertations

As an effort to guide patients toward being more informed and more involved as healthcare decision makers in the clinical processes, health care organizations have adopted a new technology referred to as an integrative social media platform (ISMP). This ISMP combines features of mobile technology and those of social media technology, integrating healthcare systems in order to support a more patient-centered healthcare process. However, users, both physicians and patients, have showed varied usages of ISMP, as a results, have shown mixed results of ISMP. To provide a better understanding of the use of ISMP, especially the interaction between patients and …


Rethinking Intellectual Property For The 21st Century, Tim Jones May 2016

Rethinking Intellectual Property For The 21st Century, Tim Jones

Asian Management Insights

New models are undermining the traditional views of intellectual property.


Clues From Networked Readiness Index: Business Imperatives And Challenges, Florenz C. Tugas May 2016

Clues From Networked Readiness Index: Business Imperatives And Challenges, Florenz C. Tugas

Center for Business Research and Development

In May 2016, President Benigno Aquino III signed into law Republic Act (RA) No. 10844 creating the Department of Information and Communications Technology (DICT). According to the new law, the newly-created department is mandated to formulate and implement policies that will promote the development and use of ICT, establish a free internet service that can be accessed in government offices and public areas, and protect the rights and welfare of consumers and business users to privacy, security and confidentiality in matters relating to ICT, among others (Alvarez, 2016).


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder Jan 2007

An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder

Journal of International Technology and Information Management

The C language and its derivatives have been some of the dominant higher-level languages used, and the maturity has stemmed several newer languages that, while still relatively young, possess the strength of decades of trials and experimentation with programming concepts. While C++ was a major step in the advancement from procedural to object-oriented programming (with a backbone of C), several problems existed that prompted the development of new languages. This paper focuses on one such language: D. D was designed as a potential successor to C++, supporting most features of C++’s class design and modifications intended to ease common program …


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …