Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

On-Line Banking Systems: Are They Sustainable?, Satish Mahadevan Srinivasan, Sachin Pawaskar, Abhishek Tripathi, Lotfollah Najjar Nov 2011

On-Line Banking Systems: Are They Sustainable?, Satish Mahadevan Srinivasan, Sachin Pawaskar, Abhishek Tripathi, Lotfollah Najjar

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Although the trend for on-line banking has increased in recent years, the customers have not shown enthusiastic participation in the past and in present. Since the sustainability of a bank supporting on-line-banking service depends on what capacity it can attract new customers, retain already existing customers and how well can it extend its services to the current and future customer base. This investigation is focused on examining if there is any significant difference among the factors namely the transactional security, information design, navigational design, visual design, web site trust, web site satisfaction and e-loyalty over sustainability of on-line banking for …


Creating An International Joint Certificate In It Administration, Peter Wolcott Aug 2011

Creating An International Joint Certificate In It Administration, Peter Wolcott

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The University of Nebraska at Omaha (UNO) and the University of Agder (UiA), Norway, are collaborating on the creation of an undergraduate certificate in Information Technology Administration. The certificate is designed for students who are interested in managing the complex technical infrastructure of today's organizations. The certificate will consist of approximately 15 credit hours of hands-on courses, covering such areas as systems administration, network administration, database administration, security administration, and distributed systems. All courses will be offered online, using a variety of collaboration tools and teaching techniques that reflect the best of current practice. Students will take courses taught by …


Augmenting Online Learning With Real-Time Conferencing: Experiences From An International Course, Bjørn Erik Munkvold, Ilze Zigurs, Deepak Khazanchi Jul 2011

Augmenting Online Learning With Real-Time Conferencing: Experiences From An International Course, Bjørn Erik Munkvold, Ilze Zigurs, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

This paper reports experiences from the use of real-time conferencing to support synchronous class interaction in an international online course. Through combination of video, audio, application sharing and chat, the students and instructors engaged in weekly interactions in a virtual classroom. This created an environment for rich interaction, augmenting the traditional use of course repositories. Further, this gave the students hands-on experience with real-time conferencing tools which are increasingly common in the workplace. The paper also discusses experienced challenges related to combining the use of multiple synchronous communication channels and presents implications for further use of real-time conferencing in online …


Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler Jan 2011

Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Deception in computer-mediated communication is a widespread phenomenon. Cyber criminals are exploiting technological mediums to communicate with potential targets as these channels reduce both the deception cues and the risk of detection itself. A prevalent deception-based attack in computer-mediated communication is phishing. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying and rejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as …


Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal Jan 2011

Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

While the majority of businesses around the world are micro-enterprises, they are the most vulnerable and are often run by people with limited resources, and skills to be able to avail the benefits of Information and Communication Technologies (ICTs). These are a form of small business which employs between 1-5 people and face challenges of limited resources, skills and ability to grow. When they do adopt IT their potential to survive and grow increases as they are then able to participate in the global economy. The challenge for global development lies in enabling these micro-enterprises to adopt the appropriate IT …