International Journal of Information Technology and Management最新文献

筛选
英文 中文
Do I Desire Chatbots to be like Humans? Exploring Factors for Adoption of Chatbots for Financial Services 我希望聊天机器人像人类一样吗?探讨金融服务中采用聊天机器人的因素
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1501
Moses Sugumar, Shalini Chandra
{"title":"Do I Desire Chatbots to be like Humans? Exploring Factors for Adoption of Chatbots for Financial Services","authors":"Moses Sugumar, Shalini Chandra","doi":"10.58729/1941-6679.1501","DOIUrl":"https://doi.org/10.58729/1941-6679.1501","url":null,"abstract":"AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of possible adopters from India, the USA, and Singapore. Results highlight the key role of consumer desires to make artificial machines indistinguishable from human beings. Implications for research and practice are also presented.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79917289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Illusion of SNS influence: are popular SNS influential SNS影响力错觉:是受欢迎的SNS影响力
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.1504/ijitm.2021.10043578
DongBack Seo, Martin P. Bügel
{"title":"Illusion of SNS influence: are popular SNS influential","authors":"DongBack Seo, Martin P. Bügel","doi":"10.1504/ijitm.2021.10043578","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10043578","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Information Technology Outsourcing: Issues of Attractiveness of Some Regions in Eastern Europe 全球信息技术外包:东欧部分地区的吸引力问题
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.1504/ijitm.2021.10049674
Anna Hayduk, G. Feigin
{"title":"Global Information Technology Outsourcing: Issues of Attractiveness of Some Regions in Eastern Europe","authors":"Anna Hayduk, G. Feigin","doi":"10.1504/ijitm.2021.10049674","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10049674","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities API(应用程序编程接口)安全的未来:数字通信API的采用及其对网络安全漏洞的影响
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1454
Alison Munsch, Peter Munsch
{"title":"The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities","authors":"Alison Munsch, Peter Munsch","doi":"10.58729/1941-6679.1454","DOIUrl":"https://doi.org/10.58729/1941-6679.1454","url":null,"abstract":"Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"256 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73108595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overcoming the Downsides of Personal Internet and Cell Phone Use in the Workplace: An Exploratory Empirical Analysis 克服个人互联网和手机在工作场所使用的缺点:一项探索性实证分析
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1481
Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry
{"title":"Overcoming the Downsides of Personal Internet and Cell Phone Use in the Workplace: An Exploratory Empirical Analysis","authors":"Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry","doi":"10.58729/1941-6679.1481","DOIUrl":"https://doi.org/10.58729/1941-6679.1481","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"412 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75004174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining Critical Success Factors for realizing innovative IT solutions in Higher Education 确定在高等教育实现创新资讯科技解决方案的关键成功因素
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1496
A. Meijer
{"title":"Determining Critical Success Factors for realizing innovative IT solutions in Higher Education","authors":"A. Meijer","doi":"10.58729/1941-6679.1496","DOIUrl":"https://doi.org/10.58729/1941-6679.1496","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77480840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Table of Contents JITIM vol 29 issue 4 目录JITIM第29卷第4期
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1497
{"title":"Table of Contents JITIM vol 29 issue 4","authors":"","doi":"10.58729/1941-6679.1497","DOIUrl":"https://doi.org/10.58729/1941-6679.1497","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80145608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Voice over IP Solution in IPv6 and IPv4 Networks to Increase Employee Productivity: A Case Study of Cameroon Telecommunications (Camtel), North-West 在IPv6和IPv4网络中集成IP语音解决方案以提高员工生产力:喀麦隆电信(Camtel)西北部的案例研究
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1469
Lottin Cyrille Marcel Malobe, A. Amaechi
{"title":"Integrating Voice over IP Solution in IPv6 and IPv4 Networks to Increase Employee Productivity: A Case Study of Cameroon Telecommunications (Camtel), North-West","authors":"Lottin Cyrille Marcel Malobe, A. Amaechi","doi":"10.58729/1941-6679.1469","DOIUrl":"https://doi.org/10.58729/1941-6679.1469","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80277418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Social Media Implementation in Hospitals in the U.S. Midwest Region 分析美国中西部地区医院的社交媒体实施情况
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1544
Dalsang Chung, C. C. Lee, David Hwang
{"title":"Analyzing Social Media Implementation in Hospitals in the U.S. Midwest Region","authors":"Dalsang Chung, C. C. Lee, David Hwang","doi":"10.58729/1941-6679.1544","DOIUrl":"https://doi.org/10.58729/1941-6679.1544","url":null,"abstract":"The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and whether it is physician-owned. We determined the hospital’s degree of social media usage through data on user activity from each social-networking platform. This data includes likes on Facebook, followers on Twitter and Instagram, and subscribers on YouTube. More than 80% of the hospitals in this study have a presence on at least one social-networking website; however, utilization depends on many factors of the hospital’s characteristics. We have observed that hospitals in Ohio, government-owned hospitals, and children’s specialty hospitals with a higher number of full-time registered nurses have a higher degree of social media utilization.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90501658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Mobile Phone Technology, Deregulation Policy, Competition and Economic welfare in Nigeria’s Telecom Industry: An Analytic model 无线移动电话技术、放松管制政策、竞争与尼日利亚电信业的经济福利:一个分析模型
International Journal of Information Technology and Management Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1429
O. J. Dieli
{"title":"Wireless Mobile Phone Technology, Deregulation Policy, Competition and Economic welfare in Nigeria’s Telecom Industry: An Analytic model","authors":"O. J. Dieli","doi":"10.58729/1941-6679.1429","DOIUrl":"https://doi.org/10.58729/1941-6679.1429","url":null,"abstract":"This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecom technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless technology, which requires much lower operation cost, the operator can now make a positive profit and therefore by deregulating the market, entries of new firms and competition takes place in the industry which lowers the final product price in the telecom market. The research, therefore, concludes that availability of wireless mobile phone technology led to deregulation of the industry which brought competition by increasing the number of firms in the industry that engendered fall in product price and increase in output. The study observed that the policy of deregulation is intended to usher in perfect competition but it is far from achieving that now for the industry displays behaviour similar to monopolistic competitive and oligopolistic industries. However, one thing is clear, it will never be a natural monopoly again.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81126054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信