{"title":"ICTs for Surveillance and Suppression: The Case of the Indian Emergency 1975-1977","authors":"R. Subramanian","doi":"10.58729/1941-6679.1523","DOIUrl":"https://doi.org/10.58729/1941-6679.1523","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77601506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, and it presents the popular consensus protocols and taxonomy of blockchain systems. Additionally, the paper surveys blockchain-based applications across multiple domains such as in finance, insurance, supply chain management, energy, advertising and media, real estate and healthcare. It aims at examining the industries’ key issues, blockchain solutions and use cases. The paper highlights three broad limitations that blockchain technology presents: scalability, security, and regulation, and shows how these challenges could impact blockchain application and adoption.
{"title":"Blockchain Technology and its Applications Across Multiple Domains: A Survey","authors":"Wajde Baiod, J. Light, Aniket Mahanti","doi":"10.58729/1941-6679.1482","DOIUrl":"https://doi.org/10.58729/1941-6679.1482","url":null,"abstract":"Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, and it presents the popular consensus protocols and taxonomy of blockchain systems. Additionally, the paper surveys blockchain-based applications across multiple domains such as in finance, insurance, supply chain management, energy, advertising and media, real estate and healthcare. It aims at examining the industries’ key issues, blockchain solutions and use cases. The paper highlights three broad limitations that blockchain technology presents: scalability, security, and regulation, and shows how these challenges could impact blockchain application and adoption.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"389 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84996091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. N., Guydeuk Yeon, Sebastian A. Perumbilly, Sarah Hormeila Awungshi
{"title":"Transitional Challenges in Technology Adoption among Academic Communities in Indian Higher Education Institutions","authors":"E. N., Guydeuk Yeon, Sebastian A. Perumbilly, Sarah Hormeila Awungshi","doi":"10.58729/1941-6679.1494","DOIUrl":"https://doi.org/10.58729/1941-6679.1494","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88923751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Higher Education Advertising Expenditures’ Impact on The Key Performance Indicator of New Enrollments Using Information Systems and Business Analytics","authors":"Alison Munsch, C. Cante, Jason Diffenderfer","doi":"10.58729/1941-6679.1452","DOIUrl":"https://doi.org/10.58729/1941-6679.1452","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"255 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77658639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The key to success in the 21 st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the literature review, KM enablers have been explained in different ways. However, this paper categorized them into eight (8) classes: organizational culture, organizational structure, management support, champion support, design of KM strategy, performance and evaluation, training, and technologies. Additionally, this study identified six (6) major components of KM: people, processes, technology, information/content, governance, and strategy. In this study, the KM benefits were seen to support business organizations to achieve both process outcomes and organizational outcomes.
{"title":"An Integrated View of Knowledge Management Enablers, Components, and Benefits: Comprehensive Literature Review","authors":"Shuaibu Hassan Usman, J. Zaveri, A. Hamza","doi":"10.58729/1941-6679.1520","DOIUrl":"https://doi.org/10.58729/1941-6679.1520","url":null,"abstract":"The key to success in the 21 st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the literature review, KM enablers have been explained in different ways. However, this paper categorized them into eight (8) classes: organizational culture, organizational structure, management support, champion support, design of KM strategy, performance and evaluation, training, and technologies. Additionally, this study identified six (6) major components of KM: people, processes, technology, information/content, governance, and strategy. In this study, the KM benefits were seen to support business organizations to achieve both process outcomes and organizational outcomes.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77651931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Divide of Perceptions, Usage, and Purchase Items in Japanese E-Payment Adoption","authors":"Michael E. Ellis, Moe Ota, Alexander N. Chen","doi":"10.58729/1941-6679.1493","DOIUrl":"https://doi.org/10.58729/1941-6679.1493","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91346948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Melissa Brunner, Gabriel González-Castañé, P. Ravesteijn
Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative data collected through a survey was used for this analysis. It was found that Architecture Design (DLA5) has the strongest positive affect on DT.
{"title":"How Digital Leadership competences and IT Capabilities affect an organization's ability to digitally transform and adopt new technologies","authors":"Melissa Brunner, Gabriel González-Castañé, P. Ravesteijn","doi":"10.58729/1941-6679.1526","DOIUrl":"https://doi.org/10.58729/1941-6679.1526","url":null,"abstract":"Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative data collected through a survey was used for this analysis. It was found that Architecture Design (DLA5) has the strongest positive affect on DT.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80684884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The usage of agile software development methods is increasing and so is the need for enhancing the collaboration between the different stakeholders. Thus, we chose to investigate the communication tools and challenges across the different boundaries and consequently deduce implications for practitioners. This research addresses inter-team communication by exploring the practitioners' perception on the different communication tools and the challenges faced at the three different boundaries, inter-team, team and customers, and geographically separated teams. We aim to enhance the productivity of software development through enhancing the communication between the different stakeholders. In this research, we use grounded theory approach to gather data from semi-structured open-ended interviews with practitioners in a geographically separated software development company. The findings observed three main inter-team communication means (Slack, Trello, face-to-face) used by practitioners, and how the preference differs among practitioners. This study also focuses on the different challenges faced, such as absence of communication during user story dependency, unclear customer requirements, and cultural differences, when implementing agile across different geographical locations. Our study discovers how team boundaries are overcome when team members adapt to other teams’ preferred communication tool and enhance the boundary spanners’ role. Furthermore, the study highlights how novice and mature teams require a transition time to adjust to the agile methods.
{"title":"Overcoming Team Boundaries in Agile Software Development","authors":"S. Rahy, J. Bass","doi":"10.58729/1941-6679.1433","DOIUrl":"https://doi.org/10.58729/1941-6679.1433","url":null,"abstract":"The usage of agile software development methods is increasing and so is the need for enhancing the collaboration between the different stakeholders. Thus, we chose to investigate the communication tools and challenges across the different boundaries and consequently deduce implications for practitioners. This research addresses inter-team communication by exploring the practitioners' perception on the different communication tools and the challenges faced at the three different boundaries, inter-team, team and customers, and geographically separated teams. We aim to enhance the productivity of software development through enhancing the communication between the different stakeholders. In this research, we use grounded theory approach to gather data from semi-structured open-ended interviews with practitioners in a geographically separated software development company. The findings observed three main inter-team communication means (Slack, Trello, face-to-face) used by practitioners, and how the preference differs among practitioners. This study also focuses on the different challenges faced, such as absence of communication during user story dependency, unclear customer requirements, and cultural differences, when implementing agile across different geographical locations. Our study discovers how team boundaries are overcome when team members adapt to other teams’ preferred communication tool and enhance the boundary spanners’ role. Furthermore, the study highlights how novice and mature teams require a transition time to adjust to the agile methods.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"359 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72388546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-15DOI: 10.1504/ijitm.2020.10026231
J. Vithayathil, M. Dadgar, J. Osiri
We conducted an empirical study that analysed the relationship between the use of social media at work and project success at work. This study adds to the emerging literature on the impact of social media use on organisational outcomes. We found that only one of the four popular social media platforms studied adds value to the workplace. Specifically, we found the use of Facebook at work, whether controlling for age, gender and education or not, to be negatively associated with project success. The use of LinkedIn (with the controls) and the use of other social media (without the controls) were both found to be positively associated with work project success. Other social media was used to capture all other social media platforms, including firm-specific or work-specific social media platforms. We explained our results using social network analysis (SNA), the strength of weak ties and information diffusion theories. Our findings have implications for practice, policy and future research.
{"title":"Does social media use at work lower productivity","authors":"J. Vithayathil, M. Dadgar, J. Osiri","doi":"10.1504/ijitm.2020.10026231","DOIUrl":"https://doi.org/10.1504/ijitm.2020.10026231","url":null,"abstract":"We conducted an empirical study that analysed the relationship between the use of social media at work and project success at work. This study adds to the emerging literature on the impact of social media use on organisational outcomes. We found that only one of the four popular social media platforms studied adds value to the workplace. Specifically, we found the use of Facebook at work, whether controlling for age, gender and education or not, to be negatively associated with project success. The use of LinkedIn (with the controls) and the use of other social media (without the controls) were both found to be positively associated with work project success. Other social media was used to capture all other social media platforms, including firm-specific or work-specific social media platforms. We explained our results using social network analysis (SNA), the strength of weak ties and information diffusion theories. Our findings have implications for practice, policy and future research.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"19 1","pages":"47-67"},"PeriodicalIF":0.0,"publicationDate":"2020-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48021305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The online proctored examinations are adopted exceedingly in all forms of academic education and professional training. AI with Machine Learning technology take the leading role in supporting authentication, authorization, and operational control of proctored online examination. The paper discusses how administrative, physical, and technical controls can help mitigate related cybersecurity vulnerabilities of online proctoring systems (OPS). The paper considers two classes of OPS: fully automated AI-enabled systems and hybrid systems (automated AI-enabled with an expert live proctor in control). Based on the review of 20 online proctoring systems, the paper discusses methods and techniques of multi-factor authentication and authorizations, including the use of challenge-response, biometrics (face and voice recognition), and blockchain technology. The discussion of operational controls includes the use of lockdown browsers, webcam detection of behavioral signs of fraud, endpoint security, VPN and VM, screen-sharing and keyboard listening programs, technical controls to mitigate the absence of spatial (physical area) controls, compliance with regulations (GDPR), etc. Other topics discussed include confidentiality of the exam content, logging of control data, video and sound recording for auditing, limitations of endpoint-based security protection and detection techniques of behavior-based cheating and the effect of new intrusive technology on students’ privacy. In conclusion, the paper lists advanced features of online proctoring systems.
{"title":"Cybersecurity of Online Proctoring Systems","authors":"L. Slusky","doi":"10.58729/1941-6679.1445","DOIUrl":"https://doi.org/10.58729/1941-6679.1445","url":null,"abstract":"The online proctored examinations are adopted exceedingly in all forms of academic education and professional training. AI with Machine Learning technology take the leading role in supporting authentication, authorization, and operational control of proctored online examination. The paper discusses how administrative, physical, and technical controls can help mitigate related cybersecurity vulnerabilities of online proctoring systems (OPS). The paper considers two classes of OPS: fully automated AI-enabled systems and hybrid systems (automated AI-enabled with an expert live proctor in control). Based on the review of 20 online proctoring systems, the paper discusses methods and techniques of multi-factor authentication and authorizations, including the use of challenge-response, biometrics (face and voice recognition), and blockchain technology. The discussion of operational controls includes the use of lockdown browsers, webcam detection of behavioral signs of fraud, endpoint security, VPN and VM, screen-sharing and keyboard listening programs, technical controls to mitigate the absence of spatial (physical area) controls, compliance with regulations (GDPR), etc. Other topics discussed include confidentiality of the exam content, logging of control data, video and sound recording for auditing, limitations of endpoint-based security protection and detection techniques of behavior-based cheating and the effect of new intrusive technology on students’ privacy. In conclusion, the paper lists advanced features of online proctoring systems.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85895399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}