Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Information technology

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 191

Full-Text Articles in Physical Sciences and Mathematics

Link Tank Oct 2023

Link Tank

DePaul Magazine

A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.


Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh Sep 2023

Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh

Applied Mathematics & Information Sciences

This study examines how innovation (INN) influences the relationship between supply chain management and information technology in Jordan. 211 employees of Jordanian industrial enterprises who work in the Operations Department provided information for the study, which examines this subject. The findings indicate a close connection between information technology and supply chain management. Innovation also dramatically modifies the interaction between supply chain management and information technology. Management help may be the subject of future research.


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Strategic Perspective Of Leveraging New Generation Information Technology To Enable Modernization Of Emergency Management, Haibo Zhang, Xinyu Dai, Depei Qian, Jian Lyu Dec 2022

Strategic Perspective Of Leveraging New Generation Information Technology To Enable Modernization Of Emergency Management, Haibo Zhang, Xinyu Dai, Depei Qian, Jian Lyu

Bulletin of Chinese Academy of Sciences (Chinese Version)

The application and development of the new generation information technology is a vital support to realize the modernization of emergency management. At present, the new generation information technology such as big data and artificial intelligence has been widely used in natural disasters, safe production, and other fields. It has improved the monitoring and early warning, regulation and law enforcement, command and decision support, rescue, and social mobilization capabilities of governments, promoted the level of intrinsic safety of enterprises, provided important support for the precise prevention and control of the COVID-19, and increased the efficiency of China’s emergency management and sense …


Digital Technology Enables Modernization Of National Statistics, Zongben Xu, Yanyun Zhao, Liping Zhu, Guang Chen, Hongyun Zhang Dec 2022

Digital Technology Enables Modernization Of National Statistics, Zongben Xu, Yanyun Zhao, Liping Zhu, Guang Chen, Hongyun Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

The modernization of national statistics is part of the modernization of national governance. Digital technology has provided power for the transformation of statistical production mode, the improvement of statistical productivity, and the reconstruction of statistical production relations. Digital technology has become an important prerequisite for the promotion of statistical modernization reform. This study summarizes the international experience of digital technology enabling government statistics, the top-level design of national statistical legal system, and the importance of digital technology in promoting the modernization of statistics. This study also analyzes the main challenges existing in the current national statistics and data work. Finally, …


The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson Nov 2022

The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson

Doctoral Dissertations and Projects

The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …


Predicting Covid-19 Fake News, Nilanjana Nambiar Apr 2022

Predicting Covid-19 Fake News, Nilanjana Nambiar

Honors Projects in Data Science

The aim of this project is to use a machine learning model to identify COVID-19 fake news on Twitter and perform additional analysis on the fake news tweets to distinguish any common trends. As misinformation is very common in the information found online, the purpose of the study is to see how machine learning can be used to discern what information can be classified as true versus what is false. Prior research regarding fake news detection, modeling, and analysis was conducted to familiarize on the current studies provided in predicting and analyzing COVID-19 fake news on Twitter. In this study, …


Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata Jan 2022

Comparison Of The Mental Burden On Nursing Care Providers With And Without Mat-Type Sleep State Sensors At A Nursing Home In Tokyo, Japan: Quasi-Experimental Study, Sakiko Itoh, Hwee-Pink Tan, Kenichi Kudo, Yasuko Ogata

Research Collection School Of Computing and Information Systems

Background: Increasing need for nursing care has led to the increased burden on formal caregivers, with those in nursing homes having to deal with exhausting labor. Although research activities on the use of internet of things devices to support nursing care for older adults exist, there is limited evidence on the effectiveness of these interventions among formal caregivers in nursing homes. Objective: This study aims to investigate whether mat-type sleep state sensors for supporting nursing care can reduce the mental burden of formal caregivers in a nursing home. Methods: This was a quasi-experimental study at a nursing home in Tokyo, …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter Jan 2022

From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter

All Faculty Scholarship

Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …


Antitrust By Algorithm, Cary Coglianese, Alicia Lai Jan 2022

Antitrust By Algorithm, Cary Coglianese, Alicia Lai

All Faculty Scholarship

Technological innovation is changing private markets around the world. New advances in digital technology have created new opportunities for subtle and evasive forms of anticompetitive behavior by private firms. But some of these same technological advances could also help antitrust regulators improve their performance in detecting and responding to unlawful private conduct. We foresee that the growing digital complexity of the marketplace will necessitate that antitrust authorities increasingly rely on machine-learning algorithms to oversee market behavior. In making this transition, authorities will need to meet several key institutional challenges—building organizational capacity, avoiding legal pitfalls, and establishing public trust—to ensure successful …


Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade Jan 2022

Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade

Information Technology & Decision Sciences Faculty Publications

The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 °C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot be underestimated, there exists a technical perspective where digital and IS technology has a role to play in the monitoring of potential solutions, but also an integral element of climate change solutions. We explore these aspects in this editorial article, offering a comprehensive opinion based insight to a …


Predicting The Outcome Of Nba Games, Matthew Houde Apr 2021

Predicting The Outcome Of Nba Games, Matthew Houde

Honors Projects in Data Science

The aim of the project is to create a machine learning model to predict NBA games. The purpose is to build upon and improve existing models. Research into other predictive sports models and machine learning techniques was conducted to understand what is currently being done to predict NBA games and how effective it is in doing so. After a thorough literary review, the model was created using Python and a variety of machine learning techniques. The dataset used had an array of team statistics for both the home and away team for each corresponding matchup and two supporting features were …


To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers Feb 2021

To Thine Own Self Be True? Incentive Problems In Personalized Law, Jordan M. Barry, John William Hatfield, Scott Duke Kominers

William & Mary Law Review

Recent years have seen an explosion of scholarship on “personalized law.” Commentators foresee a world in which regulators armed with big data and machine learning techniques determine the optimal legal rule for every regulated party, then instantaneously disseminate their decisions via smartphones and other “smart” devices. They envision a legal utopia in which every fact pattern is assigned society’s preferred legal treatment in real time.

But regulation is a dynamic process; regulated parties react to law. They change their behavior to pursue their preferred outcomes— which often diverge from society’s—and they will continue to do so under personalized law: They …


Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron Jan 2021

Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron

CCE Theses and Dissertations

Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater.

Current models regarding the acceptance and use of technology, Technology Acceptance Model Version 3 (TAM3) and the Unified Theory of Acceptance and Use of Technology Version 2 (UTAUT2), address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand …


Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh Jan 2021

Rfid Adaption In Healthcare Organizations: An Integrative Framework, Ahed Abugabah, Louis Sanzogni, Luke Houghton, Ahmad Ali Alzubi, Alaa Abuqabbeh

All Works

Radio frequency identification (RFID), also known as electronic label technology, is a non-contact automated identification technology that recognizes the target object and extracts relevant data and critical characteristics using radio frequency signals. Medical equipment information management is an important part of the construction of a modern hospital, as it is linked to the degree of diagnosis and care, as well as the hospital's benefits and growth. The aim of this study is to create an integrated view of a theoretical framework to identify factors that influence RFID adoption in healthcare, as well as to conduct an empirical review of the …


Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz Jan 2021

Information Systems: No Boundaries! A Concise Approach To Understanding Information Systems For All Disciplines, Shane M. Schartz

All Open Educational Resources

This book was created to provide a different experience for students beginning their studies in information systems. Instead of being bombarded with information from a business systems perspective, the goal of this book is to provide a baseline of material regarding information systems in all disciplines, not just business systems - hence the name No Boundaries!


The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim Jun 2020

The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim

Theses and Dissertations in Business Administration

Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …


Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed Feb 2020

Experiential Learning In The Technology Disciplines February 2020, Patricia Sendall, Christopher S. Stuetzle, Zachary A. Kissel, Tahir Hameed

Computer Science Faculty Publications

Learning-by-doing has long been a tradition in the technology disciplines. It is the "hands-on" work, combined with student reflection, feedback and assessment, that reinforces theory into practice. Over the past 40 years, experiential learning (EL) in higher education has grown beyond in-class assignments to include internships, cooperative education, team-based learning, project-based learning, community engagement, service learning, international and study-away experiences, capstone projects and research opportunities. This paper provides an overview of experiential education theory and practice in the undergraduate technology disciplines, and presents examples of how experiential learning practices have evolved over time at a medium-sized institution in the Northeast …


Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng Jan 2020

Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng

CCE Theses and Dissertations

The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …


Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James Jan 2020

Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James

CCE Theses and Dissertations

The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.

This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá Jan 2020

Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá

Theses and Dissertations

The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.

The researcher implemented a mixed-methods …


A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier Oct 2019

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier

David Dampier

This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.