[AISWorld] Abstract Announcement for International Journal of Technology Diffusion (IJTD) 6(1)

Ali Hussain Zolait azolait at uob.edu.bh
Tue Mar 24 12:01:52 EDT 2015

Abstract Announcement for International Journal of Technology Diffusion (IJTD) 6(1)

The contents of the latest issue of:
International Journal of Technology Diffusion (IJTD)
Volume 6, Issue 1, January - March 2015
Published: Quarterly in Print and Electronically
ISSN: 1947-9301; EISSN: 1947-931X;
Published by IGI Global Publishing, Hershey, USA

Editor(s)-in-Chief: Ali Hussein Saleh Zolait (University of Bahrain, Bahrain)

Note: There are no submission or acceptance fees for manuscripts submitted to the International Journal of Technology Diffusion (IJTD). All manuscripts are accepted based on a double-blind peer review editorial process.


A Conceptual Framework of RFID Adoption in Retail Using TOE Framework

Mithu Bhattacharya (College of Business Administration, University of Detroit Mercy, Detroit, MI, USA), Samuel Fosso Wamba (NEOMA Business School, Mont Saint Aignan, France)

Motivated by the need to understand the underlying antecedents of RFID adoption in retail, this study proposes and tests a framework predicting RFID adoption intent. Based on the TOE (technology-organization-environment) framework, this research develops and validates the research framework to examine the influence of twelve contextual factors under four broad categories (technological, organizational, environmental, and value-chain) on RFID adoption in retail. A structured study instrument is developed to measure these variables and data are collected from 74 experts spread across different business associations through Delphi technique. Multivariate discriminant analysis (MDA) is used to develop the conceptual framework for RFID adoption. The results indicate that relative advantage, competitive pressure, catalyst agent, and value chain complexity are significant determinants of RFID adoption in retail. It suggests that environmental characteristics are very important to be considered in RFID adoption studies along with technological and value chain characteristics.

To obtain a copy of the entire article, click on the link below.

To read a PDF sample of this article, click on the link below.


An Exploratory Study on Policy Transfer for SIM Card Registration in Malawi

Frank Makoza (Department of Information Systems, University of Cape Town, Cape Town, South Africa)

Majority of African countries have adopted policies for mandatory Subscriber Identifiable Module (SIM) card registration to mitigate security threats to citizens and society. However, there are few countries that have not yet adopted the mandatory SIM card registration policies. This study investigated the means through which SIM card registration policy may be transferred in countries without the policy. The context of Malawi was analysed which represented an ideal case of an African country without mandatory SIM card registration policy. The findings showed that the mandatory SIM card registration policy may be transferred through: (a) voluntary transfer to address local challenges related to mobile technologies (b) coercive transfer in response to meet international agreements. However, lack of national identification documents for mobile phone users and delays in implementing legal framework affected the transfer of the mandatory SIM Card registration in Malawi. It will be necessary to consider of social, economic and political factors when adopting the mandatory SIM card registration policy.

To obtain a copy of the entire article, click on the link below.

To read a PDF sample of this article, click on the link below.


On the Analysis of Twitter Spam Accounts in Saudi Arabia

Hend S. Al-Khalifa (Information Technology Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia)

Twitter spam accounts try to spread malicious content, deceive or advertise certain thoughts over Twitter network. Different approaches have been presented both in industry and academia to identify spammers on Twitter. This study aims at understanding the behavior of Twitter spam accounts targeting Saudi Arabia. In this study the author performs an empirical analysis of Twitter spam accounts in Saudi Arabia by applying previous techniques found in various research studies for extracting and analyzing such accounts. The activity levels of spam accounts as well as their content were gathered over a two months period. The study not only analyzes the content of spam accounts but also recognizes their behavior. Results show that Twitter spam accounts targeting Saudi Arabia are naïve and still in their infancy. Third party tools are used to control them for spreading duplicate content and perform retweets. Also trendy hashtags are polluted with specific content in a way to frame the public opinion.

To obtain a copy of the entire article, click on the link below.

To read a PDF sample of this article, click on the link below.


The Role of Social Networking in the Social Reform of Young Society

Emad Abu-Shanab (Information Technology College, Yarmouk University, Irbid, Jordan), Mushera Frehat (Al-Qassim University, Al-Qassim, Saudi Arabia)

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.

To obtain a copy of the entire article, click on the link below.

To read a PDF sample of this article, click on the link below.


Applying Information Science Lens for Advancing Critical Research on IT Adoption: Insights from Continued Usage of Mobile Phones by Poor Women in Rural India

Devendra Dilip Potnis (School of Information Sciences, University of Tennessee, Knoxville, TN, USA)

Critical research on IT adoption dominated by cognitive models grounded in psychology and communication is always in search of new theoretical perspectives to understand, explain, and interpret social issues. Since information plays an important role in IT adoption, this study applies an information science lens to investigate the factors affecting the continued usage of mobile phones in rural India. Analysis of interviews with 22 women earning less than a dollar day reveals the influence of social, economic, cognitive, technological, and information-related factors on their continued usage of mobiles. Micro- and meso-level socioeconomic motives and active information-seeking behavior emerge as the most significant factors encouraging respondents to continue using mobiles against several technical and human barriers. The application of information science lens yields three constructs and ten micro-, meso-, and macro-level variables, advancing critical research on IT adoption with the help of a theoretical lens outside of psychology and communication literature.

To obtain a copy of the entire article, click on the link below.

To read a PDF sample of this article, click on the link below.


For full copies of the above articles, check for this issue of the International Journal of Technology Diffusion (IJTD) in your institution's library. This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: www.igi-global.com/isj<http://www.igi-global.com/e-resources/infosci-databases/infosci-journals/>.



Mission of IJTD:

The mission of the International Journal of Technology Diffusion is to be a leading journal in global innovation and systems management. The journal publishes articles related to the application of information systems, technology, and innovation acceptance. The interdisciplinary journal also encourages manuscripts on management information systems, decision support systems (DSS), managerial and organizational concerns, educational issues, and innovative applications related to global management innovation systems. The journal propagates knowledge to researchers, practitioners, academicians, and educators all over the world.

Indices of IJTD:

  *   ACM Digital Library
  *   Bacon's Media Directory
  *   Cabell's Directories
  *   DBLP
  *   Google Scholar
  *   INSPEC
  *   JournalTOCs
  *   Library & Information Science Abstracts (LISA)
  *   MediaFinder
  *   The Standard Periodical Directory
  *   Ulrich's Periodicals Directory

Coverage of IJTD:

Topics to be discussed in this journal include, but are not limited to, the following:

  *   Adoption of IS
  *   Business data communications
  *   Diffusion of innovation models
  *   Distributed databases and networks
  *   DSS/EIS/ES in international settings
  *   E-commerce
  *   E-government
  *   Electronic commerce
  *   Electronic data interchange
  *   ERP
  *   E-services
  *   Evaluation of MIS
  *   Frameworks and models for international management innovation systems (IMIS) system development
  *   Graphics and Web design
  *   Information resources management
  *   Information security
  *   Internet related issues
  *   IS applications and case studies
  *   Issues in accounting information systems
  *   IT and economic development
  *   IT and human resource issues
  *   IT diffusion in developing countries (eg Middle East, Southeast Asia, and Africa)
  *   IT in developing countries
  *   Management information systems
  *   Network security
  *   Networking
  *   Organizational and management system structures
  *   Performance analysis
  *   System analysis
  *   Technology acceptance
  *   Telecommunications
  *   Web technology

Interested authors should consult the journal's manuscript submission guidelines www.igi-global.com/calls-for-papers/international-journal-technology-diffusion-ijtd/1135<http://www.igi-global.com/calls-for-papers/international-journal-technology-diffusion-ijtd/1135>

Dr. Ali Zolait
Assistant Professor of Management Information Systems
University of Bahrain
P.O. Box 32038, Kingdom of Bahrain
Courier Address: College of Information Technology, Information System Department, UOB Sakhir Campus, Building S40 Room 2026
Phone +973 1743 7702
Fax +973 17449119
Email azolait at uob.edu.bh<mailto:azolait at uob.edu.bh>


Uob Disclaimer Policy
This e-mail message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information. If you are not the intended recipient, you should not copy it, re-transmit it, use it or disclose its contents, but should return it to the sender immediately stating that you received the email in error, and then please delete the email from your system. Any views or opinions expressed in this message are solely the personal views of the sender. The contents in this email message shall not commit or bind the University of Bahrain in any way.University of Bahrain cannot accept any responsibility for the accuracy or completeness of this message as it has been transmitted over a public network. If you suspect that the message may have been intercepted or amended, please contact the sender.University of Bahrain shall not be liable for any loss or damage which results from opening this message and attachments thereto.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20150324/5218782b/attachment.html>

More information about the AISWorld mailing list