Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Technology (27)
- Information (25)
- Internet (19)
- IT (14)
- Systems (14)
-
- Management (10)
- ToC (10)
- Economy (9)
- Online (9)
- Web (9)
- Business (8)
- IS (7)
- Consumer (6)
- Healthcare (6)
- TAM (6)
- Market (5)
- Network (5)
- System (5)
- Table (5)
- Trust (5)
- Communication (4)
- Contents (4)
- Editor (4)
- India (4)
- International (4)
- Mobile (4)
- Programming (4)
- Project (4)
- Security (4)
- Simulation (4)
- Publication Year
Articles 1 - 30 of 191
Full-Text Articles in Engineering
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Communications of the IIMA
Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria's cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni
Journal of International Technology and Information Management
Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Constitution, which came into force on January 26, 1950, guarantees various fundamental rights, such as the freedom of speech and expression, freedom of religion, rights to form association, as well as rights to privacy. Yet, since the adoption of the Constitution, the Indian citizen has been subject to varying degrees of media censorship and surveillance. This paper seeks to delve into the historical evolution of media and Internet censorship and surveillance in India. It shows how media censorship of varying types have existed since the British colonists introduced restrictive laws in order to expand and control the native …
Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora
Short-Term Prediction Of Icu Admission For Covid-19 Inpatients, Yoon Sang Lee, Riyaz T. Sikora
Journal of International Technology and Information Management
Since the COVID-19 outbreak, many hospitals suffered from a surge of some high-risk inpatients needing to be admitted to the ICU. In this study, we propose a method
predicting the likelihood of COVID-19 inpatients’ admission to the ICU within a time frame of 12 hours. Four steps, the Bayesian Ridge Regression-based missing value imputation, the synthesis of training samples by the combination of two rows (the first and another row) of each patient, customized oversampling, and XGBoost classifier, are used for the proposed method. In the experiment, the AUC-ROC and F-score of our method is compared with those of other …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Journal of International Technology and Information Management
The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Journal of International Technology and Information Management
This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Journal of International Technology and Information Management
Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Journal of International Technology and Information Management
Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
Journal of International Technology and Information Management
Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Journal of International Technology and Information Management
Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …
Jitim Front Cover Vol 31 1 2022
Jitim Front Cover Vol 31 1 2022
Journal of International Technology and Information Management
Table of Content JITIM Vol 31. issue 1, 2022
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Journal of International Technology and Information Management
JITIM ToC
Table Of Contents Jitim Vol 30 Issue 2, 2021
Table Of Contents Jitim Vol 30 Issue 2, 2021
Journal of International Technology and Information Management
Table of Contents JITIM volume 30 issue 2
Factors Affecting Students’ Satisfaction With Synchronous Online Instruction During The Covid-19 Pandemic, Xue Bai, Ephrem Eyob, Ade Ola, Serena Reese
Factors Affecting Students’ Satisfaction With Synchronous Online Instruction During The Covid-19 Pandemic, Xue Bai, Ephrem Eyob, Ade Ola, Serena Reese
Journal of International Technology and Information Management
A large number of institutions of higher learning at all levels transitioned hurriedly to remote and online learning in response to the novel coronavirus (COVID-19) pandemic. However, recent studies have concluded that university-level students prefer learning in face-to-face settings. This study seeks to understand the factors that are driving students’ rejection of remote and online learning options and to provide insight into future efforts to implement strategies and tools to mitigate these adverse factors. The results show factors that contribute the most to students’ perceived satisfaction in the remote instructional setting are less interaction during live lectures, more distractions, less …
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
Journal of International Technology and Information Management
The key to success in the 21st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the …
Table Of Contents Jitim Vol 29 Issue 4
Table Of Contents Jitim Vol 29 Issue 4
Journal of International Technology and Information Management
table of contents
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system can …
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Journal of International Technology and Information Management
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless …
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Overcoming Team Boundaries In Agile Software Development, Scarlet Rahy, Julian Bass
Journal of International Technology and Information Management
Abstract: The usage of agile software development methods is increasing and so is the need for enhancing the collaboration between the different stakeholders. Thus, we chose to investigate the communication tools and challenges across the different boundaries and consequently deduce implications for practitioners. This research addresses inter-team communication by exploring the practitioners' perception on the different communication tools and the challenges faced at the three different boundaries, inter-team, team and customers, and geographically separated teams. We aim to enhance the productivity of software development through enhancing the communication between the different stakeholders. In this research, we use grounded theory approach …
Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti
Blockchain Technology And Its Applications Across Multiple Domains: A Survey, Wajde Baiod, Janet Light, Aniket Mahanti
Journal of International Technology and Information Management
Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, …
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Journal of International Technology and Information Management
There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Journal of International Technology and Information Management
Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Journal of International Technology and Information Management
Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …