Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Management Information Systems

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Comparisons And Contrasts Of It Systems And Socioeconomic Status In School Districts, Hannah A. Ross Jan 2022

Comparisons And Contrasts Of It Systems And Socioeconomic Status In School Districts, Hannah A. Ross

OUR Journal: ODU Undergraduate Research Journal

In a technology thrived society, one would think that anyone can have access to technology – especially in schools. However, it is not always the case due to budgets and other factors. As technology becomes an essential part of the workforce, students need to know certain web applications that companies use. This study will compare four school districts within the Tidewater area of Virginia. The following school districts include Hampton City Schools, Newport News Public Schools, York County School Division, and Williamsburg-James City County Public Schools. Each school will be compared and contrasted by the technology applications that are used …


A Nation In Crisis... In Three Acts, William D. Senn Dec 2021

A Nation In Crisis... In Three Acts, William D. Senn

Proceedings from the Document Academy

A dramatic, spoken-word performance based on a detailed examination of the text of more than 1.7 million tweets concerning coronavirus and covid that were sent during the hours surrounding the president's declaration of emergency on March 13, 2020 including the transcript of the remarks made at the Rose Garden press conference. The researcher used the Twitter JSON API to retrieve all of the tweets containing the search terms "covid" and "corona" occurring during the timeframe. A text analysis was performed to identify the most frequently occurring n-grams present in the corpus of tweets. Thematic analysis and sentiment analysis were used …


Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina Nov 2021

Capabilities Information Technology And Knowledge Sharing : A Bibliometric Perspective, Ilham I. M, Anis Eliyana, Tri Siwi Agustina

Library Philosophy and Practice (e-journal)

This study was conducted with the aim of determining various bibliometric characteristics of documents published in the Scopus database. The information starts from the type of access, year, author, subject area, document type, publication stage, source title, keyword, affiliation, funding sponsor, country, source type, and language. Capabilities Information Technology and Knowledge Sharing are defined as the use of information technology capabilities and information technology management processes between business units by using the capabilities of resources together. Research on Information Technology Capabilities and Knowledge Sharing by providing a big picture that is visualized from year to year. This study aims to …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


To Close The Skills Gap, Technology And Higher-Order Thinking Skills Must Go Hand In Hand, Manying Qiu, Yaquan Xu, Emmanuel O. Omojokun Jan 2020

To Close The Skills Gap, Technology And Higher-Order Thinking Skills Must Go Hand In Hand, Manying Qiu, Yaquan Xu, Emmanuel O. Omojokun

Journal of International Technology and Information Management

Technology is rapidly changing the business landscape. Workforce skills gap is widening in the digital business environment. Universities and employers call for developing students’ higher-order thinking skills along with integrating technology into academic curricula. We conducted a survey to assess learning outcomes from two groups of undergraduate students: business majors and information technology (IT) majors. SAP ERP hands-on case studies were used for this comparative experiment. The student survey results showed that the students of both majors believed that learning SAP software can lead to more rewarding jobs and they felt confident about their competitiveness in the job market. Although …


Modernizing The Supply Chain Of Airbus By Integrating Rfid And Blockchain Processes, Michael D. Santonino Iii, Constantine M. Koursaris, Michael J. Williams Jan 2018

Modernizing The Supply Chain Of Airbus By Integrating Rfid And Blockchain Processes, Michael D. Santonino Iii, Constantine M. Koursaris, Michael J. Williams

International Journal of Aviation, Aeronautics, and Aerospace

Radio Frequency Identification, or RFID, has been gaining momentum within the aviation industry for improving efficiencies in the supply chain. RFID technology is not new, with many manufacturers outside of aviation being more responsive as early adopters to the technology. Currently, many of the full-scale implementation organizations from late adopters, have strategically integrated RFID technology into the manufacturing supply chain to tag parts and for airports/airlines to track baggage and passengers throughout their airport journey. Literature remains rather sparse in the implementation and success factors within the aviation supply chain as a number of businesses have kept much of the …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth Apr 2015

An Examination Of Fit And The Use Of Mobile Devices For Performing Tasks, Carole L. Hollingsworth

Doctor of Business Administration Dissertations

This research seeks to better understand an individual’s use of mobile devices and the matching fit between type of mobile device and activity. As mobile devices swiftly progress and alter individuals’ ways of interacting with technology, a more comprehensive understanding of how tasks are impacted may help ensure appropriate device selection. The ability for more targeted device selection may increase use and help mobile device users and designers avoid the pitfalls of pre-existing, traditional technology.

Building on identified antecedents of success from the DeLone & McLean Information Systems Success Model and focusing on the measurement of hedonic and utilitarian tasks …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed Dec 2011

Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed

Maurice Dawson

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …


Importance-Performance Analysis Of Guest Entertainment Technology Amenities In The Lodging Industry, Anil Bilgihan Dr., Cihan Cobanoglu, Brian L. Miller Jan 2010

Importance-Performance Analysis Of Guest Entertainment Technology Amenities In The Lodging Industry, Anil Bilgihan Dr., Cihan Cobanoglu, Brian L. Miller

Hospitality Review

An assessment of how hotel guests view in-room entertainment-technology amenities was conducted to compare the importance of these technologies to how they performed. In-room entertainment technology continues to evolve in the hotel industry. However, given the multitude of entertainment products available in the marketplace today, hoteliers have little understanding of guests’ expectations and of which in-room entertainment-technology amenities will drive guest satisfaction and increase loyalty to the hotel brand. Given that technology is integral to a hotel stay, this study seeks to evaluate the importance and performance of in-room entertainment-technology amenities. Findings indicate that free-to-guest television (FTG TV) and high-speed …


Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski Jan 2009

Business Risks: When Is Fails To Detect Circumvention Activities, Stanley X. Lewis Jr., J. Scott Magruder, Eddy J. Burks, Carl Smolinski

Journal of International Technology and Information Management

A business must recognize and address various risk factors when establishing and maintaining its information system. The overall risk to management is that the control environment does not protect proprietary business data and the financial reporting system that produces financial statements and other information used by investors, creditors and regulatory agencies. These risks require that management implement efforts to ensure the integrity and effectiveness of control procedures over business activities while being aware of additional system issues such as failing to adequately consider other risks which are more business-oriented including the risk of failing to prevent or detect fraudulent or …


Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan Jan 2009

Rapid Development Of Multimedia Instructional Modules For Information Technology Education, Nanda Ganesan

Journal of International Technology and Information Management

A multifaceted learning model was developed for implementing e-learning in a largely commuter campus. The primary objective of the model was to build a flexible learning environment that combined the learning effectiveness of in-class learning with the flexibility and accessibility of online learning. One of the components of the model was the multimedia instructional modules produced to teach various Information Technology courses. Several different types of modules were produced representing chalk-and-talk type of lectures, PowerPoint presentations and software tutorials. The chalk-and-talk type of lecture modules and the software tutorials that emulated the in-class learning experience contributed positively towards enhancing the …


Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl Jan 2009

Egypt's Information Society Strategy: A Critical Lexicography, Neil Mcbride, Bernd Carsten Stahl

Journal of International Technology and Information Management

The development of ICT policies within developing countries in the past ten years has opened up a new area for study. These documents chart the ambitions of the countries for the use of ICT to promote rapid development. As such they are intercultural documents, developing at the interface between the culture of the country and western economic culture. This paper develops a critical approach to understanding these documents and studying their message. The approach involves the preparation of a critical dictionary which identifies relevant terms within the ICT policy document and reflects on their multiple meanings. The approach was applied …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash Jan 2007

Development Of A Maintenance System Based On Web And Mobile Technologies, Jaime Campos, Erkki Jantunen, Om Prakash

Journal of International Technology and Information Management

The paper reports the development of an e-monitoring and maintenance system based on web technology and mobile device, PDA. Rarity of experts led to the application of artificial intelligence and later, distributed artificial intelligence for condition monitoring and diagnosis of machine condition. Recently, web technology along with wireless communication is emerging as a potent tool in maintenance. It facilitates obtaining of the desired information by the relevant personnel at any time wherever he may be. The paper first describes the web and mobile architecture that formed the basis of the system and ICT tools used to communicate among the different …


Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo Jan 2007

Comparing The Prioritization Of Erp System Effectiveness Measures By Organizational Actors: A Focus On It Professionals And Business Managers, Princely Ifinedo

Journal of International Technology and Information Management

Modern organizations adopt Enterprise Resource Planning systems (ERP) to integrate their organizational data resources into unified systems. Researchers tend to concentrate on ERP implementation issues with only a handful studying ERP system effectiveness or success in adopting organizations. In fact, none has studied how key organizational actors prioritize or rank relevant measures or items related to the effectiveness of such systems. This study is designed to fill this gap in research as it aims at investigating how two organizational stakeholder groups, i.e. information technology (IT) professionals and business managers prioritize relevant measures related to ERP systems effectiveness. Using surveys in …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder Jan 2007

An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder

Journal of International Technology and Information Management

The C language and its derivatives have been some of the dominant higher-level languages used, and the maturity has stemmed several newer languages that, while still relatively young, possess the strength of decades of trials and experimentation with programming concepts. While C++ was a major step in the advancement from procedural to object-oriented programming (with a backbone of C), several problems existed that prompted the development of new languages. This paper focuses on one such language: D. D was designed as a potential successor to C++, supporting most features of C++’s class design and modifications intended to ease common program …


The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender Jan 2005

The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender

Manoj Maharaj

No abstract provided.


A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt Jan 2005

A Critical Time For Ultra-Wide Band, Gary F. Templeton, Mark B. Schmidt

Journal of International Technology and Information Management

Ultra-wideband (UWB) is a promising class of high-speed wireless communications applications that is projected to significantly change local and wide area network architectures. This article describes the technology, its probable application areas, the environmental forces that are constraining and enabling commercialization, and the prospects for short-term growth for UWB services. Commercial sale and distribution of UWB products has been approved, and widespread sale is expected by 2007.