Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 421

Full-Text Articles in Engineering

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad Jun 2024

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad

An-Najah University Journal for Research - B (Humanities)

Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni Jan 2024

Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni

Journal of International Technology and Information Management

Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard Ph.D., Austin T. Walden Ph.D., Paul J. Thomas Ph.D. Jan 2024

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard Ph.D., Austin T. Walden Ph.D., Paul J. Thomas Ph.D.

Journal of Aviation/Aerospace Education & Research

Increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations: 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) developing an embedded machine learning framework. Data cleanup and …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi Oct 2023

Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi

Journal of Cybersecurity Education, Research and Practice

The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko Oct 2023

Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko

Doctoral Dissertations and Master's Theses

The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …


Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo Sep 2023

Influencing Air Force Logisticians' Information Seeking During The Covid-19 Pandemic: The Role Of Organizational Meetings In An Expanded Prism Framework, Matthew D. Roberts, Christopher T. Price, Seong-Jong Joo

Faculty Publications

Purpose: This research aims to understand how organizational workplace meetings surrounding the COVID-19 pandemic impacted logistics Airmen across the United States Air Force and how these meetings impacted their risk seeking behavior on social media.

Design/methodology/approach: This survey research tested an extended Planned Risk Information Risk Seeking Model (PRISM) with organizational meetings as an antecedent to determine if current meetings influenced an Airman's perceived behavioral control, attitude toward seeking, subjective norms, knowledge sufficiency and intention to seek information regarding COVID-19.

Findings: Results of the CFA showed that the expanded PRISM model had good model fit. Additionally, using …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


The Impact Of Case Management Intervention For Insured Asthma Patients In Louisiana, An Empirical Study, Mohamed Mohamed Ohaiba Mar 2023

The Impact Of Case Management Intervention For Insured Asthma Patients In Louisiana, An Empirical Study, Mohamed Mohamed Ohaiba

LSU Doctoral Dissertations

Asthma is a chronic condition whose symptoms are managed/prevented using medication and interventions. The overarching objective of this study was to evaluate the impact of patients' demographics on case management enrollment and healthcare utilization, as well as to develop machine learning models to predict high-cost patients.

To accomplish these goals, the Man-Whiteness test, the chi-squares test, logistic regression and odds ratios, and machine learning models were implemented. The average cost of the non-enrolled CM group was significantly higher than the enrolled group (p-value .0001). In addition, the non-enrolled groups had considerably more visits to the emergency department than the other …


Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora Jan 2023

Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora

Journal of International Technology and Information Management

Since the COVID-19 outbreak, many hospitals suffered from a surge of some high-risk inpatients needing to be admitted to the ICU. In this study, we propose a method

predicting the likelihood of COVID-19 inpatients’ admission to the ICU within a time frame of 12 hours. Four steps, the Bayesian Ridge Regression-based missing value imputation, the synthesis of training samples by the combination of two rows (the first and another row) of each patient, customized oversampling, and XGBoost classifier, are used for the proposed method. In the experiment, the AUC-ROC and F-score of our method is compared with those of other …


Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi Jan 2023

Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi

Journal of International Technology and Information Management

The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky Jan 2023

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari Jan 2023

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson Jan 2023

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge Dec 2022

Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge

Theses and Dissertations

Inland recreational fisheries has grown philosophically and scientifically to consider economic and sociopolitical aspects (non-biological) in addition to the biological. However, integrating biological and non-biological aspects of inland fisheries has been challenging. Thus, an opportunity exists to develop approaches and tools which operationalize planning and decision-making processes which include biological and non-biological aspects of a fishery. This dissertation expands the idea that a core set of goals and objectives is shared among and within inland fisheries agencies; that many routine operations of inland fisheries managers can be regimented or standardized; and the novel concept that current information and operations can …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda Sep 2022

A Case Study Of The Efficacy Of Model-Based Requests For Information, Kyle J. Arruda

Theses and Dissertations

The Department of Defense (DoD) has encouraged the transition to digital engineering, yet there are limited guides for how to transition and there is limited data to show where an organization like a program office can reap the most benefit from the transition. To identify areas where potential benefits may be realized, this thesis compares two Requests for Information (RFIs), one document-based and one model-based, from generation to response. A survey was developed and administered to 7 members of a single program office to grade the RFI responses. The survey was based on the 43 benefit categories identified in the …


Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua Aug 2022

Factors Affecting The Adoption Of Information And Communication Technologies In Africa: Literature Review, Edison Wazoel Lubua

African Conference on Information Systems and Technology

This paper synthesised the literature on the adoption of Information and Communication Technology within Africa. The purpose was to determine factors (reported by the literature) determining technology adoption and use, in Africa. The paper used the systematic literature review. The study analysed the factors descriptively. Based on the analysis, the following are the main five factors reported to affect the adoption and use of Information Technology in Africa: Lack of ICT knowledge, unreliable infrastructure, high cost of adoption, the perceived usefulness of ICT, and the perceived ease of use. The government and technology implementing organisation has the key role to …


Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt Aug 2022

Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt

Faculty Publications

Organizations with large facility and infrastructure portfolios have used asset management databases for over ten years to collect and standardize asset condition data. Decision makers use these data to predict asset degradation and expected service life, enabling prioritized maintenance, repair, and renovation actions that reduce asset life-cycle costs and achieve organizational objectives. However, these asset condition forecasts are calculated using standardized, self-correcting distribution models that rely on poorly-fit, continuous functions. This research presents four stepwise asset condition forecast models that utilize historical asset inspection data to improve prediction accuracy: (1) Slope, (2) Weighted Slope, (3) Condition-Intelligent Weighted Slope, and (4) …


The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine May 2022

The Iwar Range + 21 Years: Cyber Defense Education In 2022, Joseph H. Schafer, Chris Morrell, Ray Blaine

Military Cyber Affairs

Twenty-one years ago, The IWAR Range paper published by CCSC described nascent information assurance (now cybersecurity[1]) education programs and the inspiration and details for constructing cyber ranges and facilitating cyber exercises. This paper updates the previously published work by highlighting the dramatic evolution of the cyber curricula, exercise networks and ranges, influences, and environments over the past twenty years.

[1] In 2014, DoD adopted “cybersecurity” instead of “information assurance.” [34:1]


Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker Apr 2022

Digital Transformation: Implementing 3d Printing Activities Into Core Business Classes, Shota Yasuda, Rohit Gibson, Will Smith, Beau Wilkins, Blair Dilbeck, Jamari Baker

Symposium of Student Scholars

The business college’s new 3D lab, launched in August 2021, has been providing 3D design and 3D printing workshops for core business classes, specifically IS 2200 and IS 3100, to allow students to experiment with additive manufacturing, more commonly known as 3D printing. In the age of digital transformation, it is more important than ever that business school graduates are exposed to these emerging technologies, learn from experimentation, and develop a foundational understanding of these technologies so that they are better prepared to innovate and lead once they have graduated.

The idea of the 3D printing workshops is that a …


Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M Mar 2022

Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M

Library Philosophy and Practice (e-journal)

This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …


Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi Jan 2022

Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi

Journal of International Technology and Information Management

Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …


Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian Jan 2022

Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …