Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (123)
- SelectedWorks (44)
- Selected Works (25)
- Kansas State University Libraries (13)
- University of Nebraska - Lincoln (9)
-
- Kennesaw State University (8)
- Embry-Riddle Aeronautical University (3)
- The University of San Francisco (3)
- Association of Arab Universities (2)
- Southern Methodist University (2)
- Bentley University (1)
- Butler University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Chulalongkorn University (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Clark University (1)
- Florida International University (1)
- Fort Hays State University (1)
- Georgia Southern University (1)
- Harrisburg University of Science and Technology (1)
- Liberty University (1)
- Marshall University (1)
- Montclair State University (1)
- New Jersey Institute of Technology (1)
- Portland State University (1)
- Purdue University (1)
- Rochester Institute of Technology (1)
- Singapore Management University (1)
- The University of Akron (1)
- Keyword
-
- Technology (11)
- ToC (10)
- Cybersecurity (9)
- Innovation (8)
- Computer science (7)
-
- Healthcare (7)
- Cyber Security (6)
- Information (6)
- Information systems (6)
- Cyber security (5)
- Enterprise and Investment Development (5)
- ICT for Development and Poverty Alleviation (5)
- Innovation and Economic Growth (5)
- Internet (5)
- Service Delivery (5)
- Social Media (5)
- TAM (5)
- Table (5)
- Blockchain (4)
- Business Model (4)
- Contents (4)
- Data mining (4)
- Editor (4)
- Encryption (4)
- Information Technology (4)
- Information security (4)
- Privacy (4)
- Rwanda (4)
- Social media (4)
- Tanzania (4)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (121)
- Dr. Mutaz M. Al-Debei (24)
- Dr Deogratias Harorimana (23)
- Central Plains Network for Digital Asset Management (12)
- Maurice Dawson (9)
-
- Library Philosophy and Practice (e-journal) (6)
- Arcot Desai NARASIMHALU (3)
- Business Analytics and Information Systems (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- KSU Proceedings on Cybersecurity Education, Research and Practice (3)
- C. Jason Woodard (2)
- Dissertations (2)
- Electronic Theses, Projects, and Dissertations (2)
- Future Computing and Informatics Journal (2)
- Hwee-Joo Kam (2)
- SMU Data Science Review (2)
- School of Computing: Faculty Publications (2)
- The African Journal of Information Systems (2)
- 2013 (1)
- Abhijith Anand (1)
- Alberto Coustasse, DrPH, MD, MBA, MPH (1)
- Articles (1)
- CGU Faculty Publications and Research (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
- Computer Science and Software Engineering (1)
- Dissertations and Theses (1)
- Doctoral Dissertations and Master's Theses (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- FIU Electronic Theses and Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 265
Full-Text Articles in Management Information Systems
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Journal of International Technology and Information Management
Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko
Doctoral Dissertations and Master's Theses
The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob
Senior Honors Theses
Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Small Business Office Network, Michael Gerome
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Journal of International Technology and Information Management
The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Journal of International Technology and Information Management
This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine
The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine
Military Cyber Affairs
Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.
[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Library Philosophy and Practice (e-journal)
This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Journal of International Technology and Information Management
Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Journal of International Technology and Information Management
JITIM ToC
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Journal of International Technology and Information Management
Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
Journal of International Technology and Information Management
Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …
Jitim Front Cover Vol 31 1 2022
Jitim Front Cover Vol 31 1 2022
Journal of International Technology and Information Management
Table of Content JITIM Vol 31. issue 1, 2022
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Journal of International Technology and Information Management
Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Electronic Theses, Projects, and Dissertations
The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …
The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi
The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi
Future Computing and Informatics Journal
different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems.
Many Software companies failed to achieve information follow and reuse the same functionality
This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions
Teeeeeeeest
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux
Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux
International Conference on Lean Six Sigma
Abstract
Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability. An …
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Publications
In recent years, online platforms have been utilized for promoting harmful content and behavior such as extremism, harassment, mis/disinformation, human trafficking, genderbased violence among others affecting our society, often leading to real-world events. Such content and behaviors are inherently complex, making the recognition of these narratives challenging for researchers as well as social media companies. The Cyber Social Threats (CySoc) Workshop 2021 aimed to facilitate a rich forum for researchers and practitioners from both academia and industry in the areas of computing and social science, to discuss novel avenues for research on interdisciplinary aspects of harmful communications on social media, …