AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of possible adopters from India, the USA, and Singapore. Results highlight the key role of consumer desires to make artificial machines indistinguishable from human beings. Implications for research and practice are also presented.
{"title":"Do I Desire Chatbots to be like Humans? Exploring Factors for Adoption of Chatbots for Financial Services","authors":"Moses Sugumar, Shalini Chandra","doi":"10.58729/1941-6679.1501","DOIUrl":"https://doi.org/10.58729/1941-6679.1501","url":null,"abstract":"AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of possible adopters from India, the USA, and Singapore. Results highlight the key role of consumer desires to make artificial machines indistinguishable from human beings. Implications for research and practice are also presented.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79917289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijitm.2021.10043578
DongBack Seo, Martin P. Bügel
{"title":"Illusion of SNS influence: are popular SNS influential","authors":"DongBack Seo, Martin P. Bügel","doi":"10.1504/ijitm.2021.10043578","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10043578","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijitm.2021.10049674
Anna Hayduk, G. Feigin
{"title":"Global Information Technology Outsourcing: Issues of Attractiveness of Some Regions in Eastern Europe","authors":"Anna Hayduk, G. Feigin","doi":"10.1504/ijitm.2021.10049674","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10049674","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research
{"title":"The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities","authors":"Alison Munsch, Peter Munsch","doi":"10.58729/1941-6679.1454","DOIUrl":"https://doi.org/10.58729/1941-6679.1454","url":null,"abstract":"Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"256 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73108595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry
{"title":"Overcoming the Downsides of Personal Internet and Cell Phone Use in the Workplace: An Exploratory Empirical Analysis","authors":"Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry","doi":"10.58729/1941-6679.1481","DOIUrl":"https://doi.org/10.58729/1941-6679.1481","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"412 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75004174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining Critical Success Factors for realizing innovative IT solutions in Higher Education","authors":"A. Meijer","doi":"10.58729/1941-6679.1496","DOIUrl":"https://doi.org/10.58729/1941-6679.1496","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77480840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Table of Contents JITIM vol 29 issue 4","authors":"","doi":"10.58729/1941-6679.1497","DOIUrl":"https://doi.org/10.58729/1941-6679.1497","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80145608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Voice over IP Solution in IPv6 and IPv4 Networks to Increase Employee Productivity: A Case Study of Cameroon Telecommunications (Camtel), North-West","authors":"Lottin Cyrille Marcel Malobe, A. Amaechi","doi":"10.58729/1941-6679.1469","DOIUrl":"https://doi.org/10.58729/1941-6679.1469","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80277418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and whether it is physician-owned. We determined the hospital’s degree of social media usage through data on user activity from each social-networking platform. This data includes likes on Facebook, followers on Twitter and Instagram, and subscribers on YouTube. More than 80% of the hospitals in this study have a presence on at least one social-networking website; however, utilization depends on many factors of the hospital’s characteristics. We have observed that hospitals in Ohio, government-owned hospitals, and children’s specialty hospitals with a higher number of full-time registered nurses have a higher degree of social media utilization.
{"title":"Analyzing Social Media Implementation in Hospitals in the U.S. Midwest Region","authors":"Dalsang Chung, C. C. Lee, David Hwang","doi":"10.58729/1941-6679.1544","DOIUrl":"https://doi.org/10.58729/1941-6679.1544","url":null,"abstract":"The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and whether it is physician-owned. We determined the hospital’s degree of social media usage through data on user activity from each social-networking platform. This data includes likes on Facebook, followers on Twitter and Instagram, and subscribers on YouTube. More than 80% of the hospitals in this study have a presence on at least one social-networking website; however, utilization depends on many factors of the hospital’s characteristics. We have observed that hospitals in Ohio, government-owned hospitals, and children’s specialty hospitals with a higher number of full-time registered nurses have a higher degree of social media utilization.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90501658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecom technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless technology, which requires much lower operation cost, the operator can now make a positive profit and therefore by deregulating the market, entries of new firms and competition takes place in the industry which lowers the final product price in the telecom market. The research, therefore, concludes that availability of wireless mobile phone technology led to deregulation of the industry which brought competition by increasing the number of firms in the industry that engendered fall in product price and increase in output. The study observed that the policy of deregulation is intended to usher in perfect competition but it is far from achieving that now for the industry displays behaviour similar to monopolistic competitive and oligopolistic industries. However, one thing is clear, it will never be a natural monopoly again.
{"title":"Wireless Mobile Phone Technology, Deregulation Policy, Competition and Economic welfare in Nigeria’s Telecom Industry: An Analytic model","authors":"O. J. Dieli","doi":"10.58729/1941-6679.1429","DOIUrl":"https://doi.org/10.58729/1941-6679.1429","url":null,"abstract":"This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecom technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless technology, which requires much lower operation cost, the operator can now make a positive profit and therefore by deregulating the market, entries of new firms and competition takes place in the industry which lowers the final product price in the telecom market. The research, therefore, concludes that availability of wireless mobile phone technology led to deregulation of the industry which brought competition by increasing the number of firms in the industry that engendered fall in product price and increase in output. The study observed that the policy of deregulation is intended to usher in perfect competition but it is far from achieving that now for the industry displays behaviour similar to monopolistic competitive and oligopolistic industries. However, one thing is clear, it will never be a natural monopoly again.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81126054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}