Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Technology and Innovation (101)
- Physical Sciences and Mathematics (86)
- Computer Sciences (85)
- Information Security (84)
- Social and Behavioral Sciences (38)
-
- Engineering (21)
- Computer Engineering (17)
- Education (17)
- Psychology (17)
- Organizational Behavior and Theory (16)
- Business Administration, Management, and Operations (15)
- Library and Information Science (15)
- Computer and Systems Architecture (14)
- Industrial and Organizational Psychology (14)
- Organization Development (13)
- Cataloging and Metadata (12)
- Data Storage Systems (12)
- Digital Communications and Networking (12)
- Archival Science (11)
- Management Sciences and Quantitative Methods (7)
- Curriculum and Instruction (6)
- E-Commerce (5)
- Operations and Supply Chain Management (5)
- Business Analytics (4)
- Business Intelligence (4)
- Business and Corporate Communications (4)
- Higher Education (4)
- Arts and Humanities (3)
- Institution
-
- Kennesaw State University (103)
- Kansas State University Libraries (13)
- Michigan Technological University (12)
- University of Nebraska at Omaha (7)
- University for Business and Technology in Kosovo (5)
-
- Purdue University (3)
- Southwestern Oklahoma State University (2)
- University of Tennessee at Chattanooga (2)
- University of Vermont (2)
- Belmont University (1)
- Embry-Riddle Aeronautical University (1)
- Old Dominion University (1)
- University of Nebraska at Kearney (1)
- University of Tennessee, Knoxville (1)
- University of Windsor (1)
- Western Kentucky University (1)
- Western University (1)
- Keyword
-
- Digital preservation (3)
- Industrial and organizational psychology (2)
- 3D models (1)
- 3D printing (1)
- 3D scanning (1)
-
- AI (1)
- Ad Hoc Executive Committee (1)
- Aeronautics (1)
- Aerospace (1)
- Agility (1)
- Argument roles (1)
- Artstor Shared Shelf; Consortium on Digital Resources for Teaching and Research;Digital Preservation (1)
- Assessment (1)
- Audio (1)
- Aviation (1)
- Big Data (1)
- Business Meeting (1)
- Business process (1)
- CPN-DAM (1)
- Challenges (1)
- Channels (1)
- Collaboration (1)
- Complexity Theory (1)
- Cybersecurity (1)
- DAM Implementation (1)
- Data Science (1)
- Data coding (1)
- Design (1)
- Development smart city (1)
- Digital Technologies (1)
- Publication Year
- Publication
-
- KSU Proceedings on Cybersecurity Education, Research and Practice (82)
- African Conference on Information Systems and Technology (19)
- Annual Copper Country Lean Conference (12)
- Central Plains Network for Digital Asset Management (12)
- UNO Student Research and Creative Activity Fair (7)
-
- UBT International Conference (5)
- International Conference on Lean Six Sigma (2)
- Oklahoma Research Day Abstracts (2)
- River Cities Industrial and Organizational Psychology Conference (2)
- UVM Libraries Conference Day (2)
- Academic Chairpersons Conference Proceedings (1)
- Annual Research Symposium of the College of Communication and Information (1)
- Atlantic Marketing Association Proceedings (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Faculty Scholarship Symposium (1)
- Fair Trade Universities' National Convergence (1)
- IMPACT Symposium (1)
- Mountain Plains Business Conference (1)
- National Training Aircraft Symposium (NTAS) (1)
- OSSA Conference Archive (1)
- Symposium of Student Scholars (1)
- Undergraduate Student Research Internships Conference (1)
- File Type
Articles 1 - 30 of 157
Full-Text Articles in Management Information Systems
Unveiling Paradoxes: The Unforeseen Impact Of Content Moderation Policies In E-Commerce, Brandon Holle, Hang Nguyen, Suman Basuroy
Unveiling Paradoxes: The Unforeseen Impact Of Content Moderation Policies In E-Commerce, Brandon Holle, Hang Nguyen, Suman Basuroy
Faculty Scholarship Symposium
In the dynamic digital marketplace, content moderation policies, specifically those addressing 'review bomb' removal, are designed to improve customer experience, nurture consumer trust, and enhance firm performance. However, our comprehensive research, comprising three studies utilizing real-world field data analyzed through regression discontinuity-in-time design and experimental investigations, reveals a surprisingly striking paradox. In contrast to their intended benefits, these policies yield an unexpected adverse impact on user behavior, the e-commerce platform, and listed product performance, resulting in a significant 27.25% drop in total users for products on the e-commerce platform. Drawing from expectancy disconfirmation theory, we uncover the mechanism underpinning this …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
KSU Proceedings on Cybersecurity Education, Research and Practice
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
KSU Proceedings on Cybersecurity Education, Research and Practice
Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt
Exploring The Role Of An Organization In Implementing A Work-From-Home Strategy, Ryan Tripod, Sumarie Roodt
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
Developing An Integrative Theoretical Framework For Electronic Business Value Optimisation In Botswana, Meduduetso Tsumake-Tsiang, Adheesh Budree
African Conference on Information Systems and Technology
Organizations are trying to move quickly to adopt remote working policies into their organizations as to attract and retain top talent, reduce office space costs, and increase productivity. As many of these strategies were quickly adopted by South African ICT organizations during the COIVD-19 pandemic, organizations are still somewhat unclear on what their role is with regards to ensuring long term adoption of remote working. Thus, this study explored the role of the organization with regards to a work-from-home strategy. It was found that the organization is responsible for formalizing the chosen strategy, creating supportive policies, and adapting its management …
The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour
The Sharing Economy: Understanding The Affordances Of And Barriers To The Use Of Digital Platforms, Phaswana Malatjie, Lisa F. Seymour
African Conference on Information Systems and Technology
Studies exploring sharing economy services such as automotive, house-sharing, and bike rentals have predicted that these services will add billions of dollars to the global economy by 2025. Sharing economy services could reduce unemployment in Africa. Hence, there is a need to understand the affordance and the barriers to sharing economy platforms. This paper presents a literature review that helps answer the question: What are the affordances of and barriers to the use of sharing platforms? A literature review following a synthesis approach, reveals gaps around the sharing economy services relating to load-shedding, regulations and social exclusion. Potential future directions …
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
Social Media & Privacy: Understanding Privacy In The Age Of Content Creator Culture, Robert Tagoe, Raphael Amponsah, Emmanuel Awuni Kolog, Eric Afful-Dadzie
African Conference on Information Systems and Technology
In today's digital age, content creators are gaining public attention and becoming highly influential. With that increased influence, it is important to acknowledge the privacy concerns within this culture. This interpretive research study seeks to identify and understand the dynamics of privacy within the content creator culture. This research will leverage information from interviews with content creators from various social media platforms such as YouTube, Instagram, Facebook, and TikTok. Using theories to understand the phenomena, theories of privacy calculus, privacy paradox and self-disclosure, will be used to view how content creators define and navigate privacy, strategies employed to control personal …
The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba
The State Of The Digital Skills Ecosystem In Zimbabwe: An Exploratory Analysis, Annette Mangena, Gwamaka Mwalemba
African Conference on Information Systems and Technology
There are many ongoing efforts globally to address the skills requirements gaps created by the high pace of technological changes often referred to as the 4IR. The challenge is particularly acute in developing countries grappling with many high-priority socioeconomic challenges, including low levels of digital literacy. This study represents initial efforts to understand a developing country's local digital skills landscape, explicitly focusing on Zimbabwe. The study was conducted through a literature analysis to explore the digital skills discourse in Zimbabwe based on published academic papers. The findings point to a discourse focused on applied digital skills within specific fields and …
The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa
The Impact Of Digital Transformation On Institutional Growth. A Case Of Zimbabwean Universities, Vusumuzi Maphosa
African Conference on Information Systems and Technology
The pressure for institutions to digitally transform has been building, and COVID-19 accelerated the transition in developing countries. The study evaluated the impact of digital transformation on Zimbabwean universities. The Microsoft digital transformation framework guided the study. Thematic analysis was used to extract meaning and generate themes from qualitative data from university ICT Directors. Results show that digital transformation positively impacted institutional growth and efficiency. Most universities invest in digital technology to increase service reliability and availability. Digital transformation teams were bolstered to support student processes and create personalised learning journeys. The digital transformation led to the adoption of several …
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
Digital Transformation Of Smes Through Social Media, Georgette Eugenia Otoo, Raphael Amponsah, Eric Afful-Dadzie, Emmanuel Awuni Kolog
African Conference on Information Systems and Technology
This research paper explores the strategic integration of social media platforms by Small and Medium-sized Enterprises (SMEs) in Low- and Middle-Income Countries (LMICs) beyond marketing. Drawing from Resource-Based View and Dynamic Capabilities theories, the study investigates how social media enhances management, coordination, and control functions. Through five diverse case studies from Ghana, findings reveal SMEs’ innovative use of platforms like Instagram, WhatsApp, Slack, and Trello. These platforms foster efficient internal communication, customer engagement, project management, and talent acquisition. Challenges such as technical expertise and dynamic digital landscapes are identified.
Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn
Benefits Of Adopting Micro-Credentials For Skills Development, Oyena Nokulunga Mahlasela, Adriana A. Steyn
African Conference on Information Systems and Technology
Micro-credential providers are increasing both in diversity and volume. However, employers are still concerned about their role in skill development. This study aimed to understand how micro-credentials can assist employees in skills development. A systematic literature review was conducted for studies published between (2016 to 2023). Thirty-two sources were included in the final review. After that, five recommendations for employers when adopting micro-credentials were constructed first by (1) defining the value of formal and informal education. (2) exploring micro-credentials as a tool for skills development. (3) encouraging organisations to collaborate with other institutions. (4) encouraging continuous personalised learning, known as …
Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle
Factors Influencing The Establishment Of Technology Innovation Hubs - A Structured Literature Review, Oluwaseun Alexander Dada, Jean-Paul Van Belle
African Conference on Information Systems and Technology
The research context focuses on the establishment of innovation hubs within specific geographical locations, aiming to drive innovation and economic development. The research scope encompassed a thorough examination of existing literature to uncover the diverse range of factors influencing AI hub creation and success. Our research was prompted by the need to address the lack of a comprehensive understanding of these factors. With the aim of examining, we adopted the Structured Literature Review (SLR) methodology. Through our comprehensive analysis, we identified a multitude of critical factors. Based on the number of sources in which they were reported, the factors are …
Information Technology Decision Makers’ Readiness For Artificial Intelligence Governance In Institutions Of Higher Education In South Africa, John Mangundu
African Conference on Information Systems and Technology
Artificial intelligence (AI) can enhance the educational experience for academics and students. However, research has inadequately examined AI ethics and governance, particularly in the higher education sector of developing economies such as South Africa. AI governance ensures that envisioned AI benefits are realized while reducing AI risks. Against this backdrop of huge research deficit, the current study reports on a qualitative exploratory study that investigates the state of readiness for AI governance and AI governance maturity in South African higher education institutions. Informed by the combination of the TOE framework, the traditional IT governance model and the adapted IT governance …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk
Cybercrime In The Developing World, David A. Ghelerter, John E. Wilson, Noah L. Welch, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper attempts to discover the reasons behind the increase in cybercrime in developing nations over the past two decades. It discusses many examples and cases of projects to increase internet access in developing countries and how they enabled cybercrime. This paper examines how nations where many cybercrimes occurred, did not have the necessary resources or neglected to react appropriately. The other primary focus is how cybercrimes are not viewed the same as other crimes in many of these countries and how this perception allows cybercriminals to do as they please with no stigma from their neighbors. It concludes that …
Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk
Microtransactions And Gambling In The Video Game Industry, Christopher L. Antepenko, Samuel R. Rickey, Angel L. Hibbets, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
The beginning of the 21st century has had a drastic effect on the video game industry. The advent of almost universal Internet access, the release of inexpensive broadband-enabled consoles, and the availability of mobile gaming have led to game developers and publishers heavily relying on premium in-game currencies, exclusive paid items, and loot boxes to subsidize or even replace profits from traditional video game business models. By 2020, in-game purchases made up a market of $92.6B worldwide and, in the US, experienced growth of over 30%.[1] In this highly lucrative market, the legal and ethical landscape is constantly bubbling with …
Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk
Social Media Platforms And Responsibility For Disinformation, Matt T. Figlia, Brandon M. Henschen, Joseph T. Sims, John-David Rusk
KSU Proceedings on Cybersecurity Education, Research and Practice
Researchers are paying closer attention to the rise of disinformation on social media platforms and what responsibility, if any, the companies that control these platforms have for false information being spread on their websites. In this paper, we highlight the recent growth in concern regarding online disinformation, discuss other works regarding the use of social media as a tool for spreading disinformation, and discuss how coordinated disinformation campaigns on social media platforms are used to spread propaganda and lies about current political events. We also evaluate the reactions of social media platforms in combatting disinformation and the difficulty in policing …
Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard
Using Experts For Improving Project Cybersecurity Risk Scenarios, Steven S. Presley, Jeffrey P. Landry, Jordan Shropshire, Philip Menard
KSU Proceedings on Cybersecurity Education, Research and Practice
This study implemented an expert panel to assess the content validity of hypothetical scenarios to be used in a survey of cybersecurity risk across project meta-phases. Six out of 10 experts solicited completed the expert panel exercise. Results indicate that although experts often disagreed with each other and on the expected mapping of scenario to project meta-phase, the experts generally found risk present in the scenarios and across all three project meta-phases, as hypothesized.
Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li
Towards Assessing Organizational Cybersecurity Risks Via Remote Workers’ Cyberslacking And Their Computer Security Posture, Ariel Luna, Yair Levy, Gregory Simco, Wei Li
KSU Proceedings on Cybersecurity Education, Research and Practice
Cyberslacking is conducted by employees who are using their companies’ equipment and network for personal purposes instead of performing their work duties during work hours. Cyberslacking has a significant adverse effect on overall employee productivity, however, recently, due to COVID19 pandemic move to remote working also pose a cybersecurity risk to organizations networks and infrastructure. In this work-in-progress research study, we are developing, validating, and will empirically test taxonomy to assess an organization’s remote workers’ risk level of cybersecurity threats. This study includes a three-phased developmental approach in developing the Remote Worker Cyberslacking Security Risk Taxonomy. With feedback from cybersecurity …
Nids In Airgapped Lans--Does It Matter?, Winston Messer
Nids In Airgapped Lans--Does It Matter?, Winston Messer
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper presents an assessment of the methods and benefits of adding network intrusion detection systems (NIDS) to certain high-security airgapped isolated local area networks. The proposed network architecture was empirically tested via a series of simulated network attacks on a virtualized network. The results show an improvement of double the chances of an analyst receiving a specific, appropriately-severe alert when NIDS is implemented alongside host-based measures when compared to host-based measures alone. Further, the inclusion of NIDS increased the likelihood of the analyst receiving a high-severity alert in response to the simulated attack attempt by four times when compared …
What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson
What You See Is Not What You Know: Deepfake Image Manipulation, Cathryn Allen, Bryson Payne, Tamirat Abegaz, Chuck Robertson
KSU Proceedings on Cybersecurity Education, Research and Practice
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers’ capability of distinguishing deepfake videos from genuine video footage. This work focuses on exploring deepfake videos’ potential use for deception and misinformation by exploring people’s ability to determine whether videos are deepfakes in a survey consisting of deepfake videos and original unedited videos. The participants viewed a set of four videos and were asked to judge whether the videos shown …
Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editors' Preface, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
KSU Proceedings on Cybersecurity Education, Research and Practice
Since 2004, Kennesaw State University, Georgia, has hosted an academic conference. Over the years, the event has brought together hundreds of faculty and students from throughout the U.S., sharing research into pedagogical efforts and instructional innovations. Initially, the conference was named the Information Security Curriculum Development conference and served as KSU’s contribution to engage our colleagues in growing security education from its infancy. It was paired with KSU’s inaugural security education journal, the Information Security Education Journal. In 2016, the event was rebranded as the Conference on Cybersecurity Education, Research, and Practice to reflect both an expansion of topics suitable …
The State Of Digital Transformation: A Pilot Study, Ngan N. Chau, Steve Schulz, Vijay Agrawal
The State Of Digital Transformation: A Pilot Study, Ngan N. Chau, Steve Schulz, Vijay Agrawal
Mountain Plains Business Conference
Although the COVID-19 pandemic has created many challenges for business operations, it has certainly driven businesses to deploy digital technologies in a variety of areas, including customer engagement, customer services, and workflow coordination. In addition to supporting overall business strategies, digital technologies have been shown to carry the capacity to trigger business innovations and renewal. This pilot study aims to understand the impact of COVID-19 on digitalization and further investigate the various paths of digital transformation at different businesses. Key findings will be discussed along with their implications for future research.
Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt
Developing A Model To Assess Feasible Capacity To Work-From-Home, Ryan Tripod, Sumarie Roodt
African Conference on Information Systems and Technology
With the growing popularity of Work-From-Home (WFH) organizations have been required to adapt their ‘ways of working’ strategies to the ‘new normal’, as both employees and organizations aim to reap the benefits of WFH. This has resulted in organizations and their leadership teams needing to create WFH strategies for their organizations. With many of these WFH strategies developed in isolation of all stakeholders, with the feasibility of these WFH strategies remain uncertain. Therefore, this research task has reviewed literature to develop a conceptual model that describes how leadership teams can make informed feasible WFH strategy decisions, through the concept of …
The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda
The Impact Of Mobile Banking Customer Experience On Loyalty Among Millennials In South Africa, Justice Ncube, Salah Kabanda
African Conference on Information Systems and Technology
Banks need to remain competitive in the ever-changing business environment. Millennials are one of the largest customer segments with a large digital and mobile appetite; as a result, they form a natural target for banks. To increase their customer base, banks need to ensure that their customer experience strategy caters for these young customers in accordance with their expectations. This study explores factors that influence customer experience in mobile banking and how this experience influences customer loyalty to their bank. This study used a mixed-methods strategy and collected data from 344 mobile banking users via an online survey questionnaire and …
Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua
Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua
African Conference on Information Systems and Technology
This paper synthesised the literature on the adoption of Information and Communication Technology within Africa. The purpose was to determine factors (reported by the literature) determining technology adoption and use, in Africa. The paper used the systematic literature review. The study analysed the factors descriptively. Based on the analysis, the following are the main five factors reported to affect the adoption and use of Information Technology in Africa: Lack of ICT knowledge, unreliable infrastructure, high cost of adoption, the perceived usefulness of ICT, and the perceived ease of use. The government and technology implementing organisation has the key role to …