Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Management Information Systems

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Nov 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Alberto Coustasse, DrPH, MD, MBA, MPH

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Oct 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech Oct 2017

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew Jun 2017

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


Client-Vendor Collaboration In Information Technology Development Projects And Its Emerging Outcomes, Mingyu Zhang Apr 2017

Client-Vendor Collaboration In Information Technology Development Projects And Its Emerging Outcomes, Mingyu Zhang

FIU Electronic Theses and Dissertations

This study investigates the key dimensions of IT project collaboration and its outcomes. We conceptualized key dimensions of client-vendor collaboration, and its emerging outcomes based on literature reviews. Then, we proposed a new research framework that links IT development processes to IT project client-vendor collaboration which in turn affects the outcomes of IT project. We examined the key dimensions of IT project collaboration and their impacts on project outcomes. We identified four critical IT development processes and technologies that contribute to the development of project collaboration. Our results include: (1) Coordination practices and technologies (such as communication quality and coordination …


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz Jan 2017

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker Jan 2017

Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 1, 2017


Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa Jan 2017

Computer Science Technology Education: An Incredible Explosion, Iwasan D. Kejawa

School of Computing: Faculty Publications

This paper explore what computers are, their usages and their functionalities. Computers can be used to learn or comprehend the understanding of all subjects, be it physics aerobics, swimming, biology, mathematics, agriculture, chemistry, business administration or commerce, just to name a few. In education, computers are used to project information to individuals in the classrooms or anywhere education is taking place, in churches, homes, schools, conference halls and so on. It is also used to convey the logic of a subject or behind a topic. Computers play an important role in educating our mind. With the usage of computers, we …


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 Jan 2017

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran Jan 2017

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari Jan 2017

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …