Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 265

Full-Text Articles in Management Information Systems

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni Jan 2024

Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni

Journal of International Technology and Information Management

Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko Oct 2023

Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko

Doctoral Dissertations and Master's Theses

The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi Jan 2023

Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi

Journal of International Technology and Information Management

The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky Jan 2023

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari Jan 2023

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson Jan 2023

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine May 2022

The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine

Military Cyber Affairs

Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.

[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]


Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M Mar 2022

Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M

Library Philosophy and Practice (e-journal)

This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …


Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi Jan 2022

Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi

Journal of International Technology and Information Management

Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …


Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian Jan 2022

Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …


Jitim Table Of Contents - Vol. 31 Issue 2 - 2022 Jan 2022

Jitim Table Of Contents - Vol. 31 Issue 2 - 2022

Journal of International Technology and Information Management

JITIM ToC


Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr. Jan 2022

Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.

Journal of International Technology and Information Management

Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …


E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis Jan 2022

E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis

Journal of International Technology and Information Management

Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …


Jitim Front Cover Vol 31 1 2022 Jan 2022

Jitim Front Cover Vol 31 1 2022

Journal of International Technology and Information Management

Table of Content JITIM Vol 31. issue 1, 2022


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi Nov 2021

The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi

Future Computing and Informatics Journal

different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems.

Many Software companies failed to achieve information follow and reuse the same functionality

This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions

Teeeeeeeest


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux Jun 2021

Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux

International Conference on Lean Six Sigma

Abstract

Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability. An …


Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth Jun 2021

Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth

Publications

In recent years, online platforms have been utilized for promoting harmful content and behavior such as extremism, harassment, mis/disinformation, human trafficking, genderbased violence among others affecting our society, often leading to real-world events. Such content and behaviors are inherently complex, making the recognition of these narratives challenging for researchers as well as social media companies. The Cyber Social Threats (CySoc) Workshop 2021 aimed to facilitate a rich forum for researchers and practitioners from both academia and industry in the areas of computing and social science, to discuss novel avenues for research on interdisciplinary aspects of harmful communications on social media, …