[AISWorld] JGITM, Vol 18, No 4, 2015

Prashant Palvia pcpalvia at uncg.edu
Thu Apr 7 16:51:05 EDT 2016


Please distribute to colleagues and relevant lists.  The issue was
published in time; I just got around posting the contents. Sorry for the
delay.
*************************
Dear IS friends:

JGITM is among the elite group of MIS journals included in the prestigious
Social Sciences Citation Index (SSCI).  It is included in both SSCI and
CC/S&BS, both produced by Thomson Reuters.
Publisher: Taylor & Francis Group (T&F), http:// www.tandfonline.com/UGIT
Editor-in-Chief: Dr. Prashant Palvia, University of North Carolina at
Greensboro, pcpalvia at uncg.edu
************************
CALL FOR MANUSCRIPTS: The journal invites contributions from all parts of
the world from academic and industry scholars involved in research,
management, and the utilization of global information resources. Besides
quality work, at a minimum each submitted article should have the following
three components:  an IS topic, an international orientation (e.g., cross
cultural studies or strong international implications), and strong evidence
(e.g., survey data, case studies, experiments, secondary data, etc.).
Please submit your manuscript to the submission site:
http://www.editorialmanager.com/ugit

REVIEW PROCESS: Each suitable article is blind-reviewed by three members of
the editorial review board. A recommendation is then made by the
Editor-in-Chief or an Associate Editor. The final decision is made by the
Editor-in-Chief.  If a revision is recommended, the revised paper is sent
for final approval to one of the Editors.
************************
CONTENTS OF VOLUME 18, NUMBER 4, (October - December, 2015) OF THE JOURNAL
OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT (JGITM)

EDITORIAL PREFACE: CYBERCRIME AND CYBERSECURITY ISSUES IN THE BRICS
ECONOMIES
Nir Kshetri, The University of North Carolina - Greensboro,
nbkshetr at uncg.edu
Cybercrime and cybersecurity issues in the so-called BRICS countries
(Brazil, Russia, India, China, and South Africa) have important global
implications, both politically and economically. A comparison of
cybercrimes in these economies and their approaches to cybersecurity could
thus provide an interesting opportunity to explore contexts, mechanisms and
processes associated with the cybersecurity frameworks in economies with
diverse political, cultural and economic backgrounds. The goal of this
editorial is to provide such a comparison in order to better understand
emerging cybersecurity frameworks.

ICTS AND TOURISM IN SMALL ISLAND DEVELOPING STATES: THE CASE OF THE MALDIVES
Vizaad Ali, Victoria University of Wellington, New Zealand,
Vizaad at hotmail.com
Rowena Cullen, Victoria University of Wellington, New Zealand,
Rowena.Cullen at vuw.ac.nz
Janet Toland, Victoria University of Wellington, New Zealand,
Janet.Toland at vuw.ac.nz
Increasing reliance on information and communication technology (ICT) in
the tourism industry has become one of the major challenges facing
developing countries, especially Small Island Developing States (SIDS).
This research uses a combination of grounded theory and multi-grounded
theory to identifies a set of factors and institutional influences
affecting the adoption and integration of ICT in the tourism organizations
of SIDS like the Maldives. These factors and institutional influences
formed the basis of a new theoretical framework organized around three
themes: country, sector, and information systems. Although many of the
issues in using ICT in the Maldives tourism industry are similar to those
faced by other developing countries, two factors were found to be unique to
SIDS: the issues of vulnerability and technology dependency. These issues
were found to have a major impact on the way the tourism industry operates
in the Maldives, because of the industry’s dependence on ICT.

COGNITION, BEHAVIOR AND TEAM STRUCTURE IN ENTERPRISE SYSTEMS
IMPLEMENTATION: A COMPARATIVE STUDY
Pedro Jácome de Moura Junior, Universidade Federal da Paraíba, Brazil,
pjacome at sti.ufpb.br
Carlo Gabriel Porto Bellini, Universidade Federal da Paraíba, Brazil,
carlo.bellini at pq.cnpq.br
Rita de Cássia de Faria Pereira, Universidade Federal da Paraíba, Brazil,
rita.pereira at pq.cnpq.br
The METRICS framework was developed to support the design and the
management of the social subsystem (cognition, behavior, and structure) of
customer teams when they work with external developers and consultants to
implement customized information systems software (CISS). Drawing on
METRICS, this study proposes a general view of cognitive, behavioral, and
structural attributes that are expected to impact the performance of
customer teams in projects. This has been accomplished by comparing two
studies developed in different periods, with different methods, theories,
projects and types of teams, and in different geographical, cultural and
economic regions of Brazil – the South and the Northeast. The analysis
verify that the framework is stable across multiple settings. Given that
Enterprise Resource planning (ERP) implementation usually involves global
technology vendors, and since Brazil is an illustrative case of Latin
America and the developing countries, authors believe that this research
contributes to the global interests about the management of IT
professionals.

EXAMINING A MODEL OF MOBILE HEALTHCARE TECHNOLOGY ACCEPTANCE BY THE ELDERLY
IN TAIWAN
Chun-Hua Hsiao, Kainan University, Taiwan, maehsiao at gmail.com
Kai-Yu Tang, National Taiwan University of Science and Technology, Taiwan,
ky.nctu at gmail.com
This study explores the rising number of seniors and retirees in developed
countries accompany with the expanding healthcare costs of long-term care
and hospitalization by investigating the use intention of mobile healthcare
devices from the perspectives of elderly people in Taiwan. This study aims
to propose an extended technology acceptance model (TAM) to examine the
elderly users’ perceptions of mobile healthcare technology. Using survey
data and the structural equation modeling technique, the empirical results
support the inclusion of perceived ubiquity, personal health knowledge, and
perceived need for healthcare in the technology acceptance model. The
mobile healthcare technology acceptance model (MHTAM) provides researchers
and practitioners with in-depth understanding of the introduction of new
mobile healthcare technology devices.

THE EXPERT OPINION: AN INTERVIEW WITH JOHN P. CAMPBELL (ASSOCIATE PROVOST
FOR INFORMATION TECHNOLOGY AND CHIEF INFORMATION OFFICER, WEST VIRGINIA
UNIVERSITY, USA)
Interview conducted by Virginia Kleist
Dr. John P. Campbell is Associate Provost for Information Technology and
Chief Information Officer at WVU. He is focused on strategic planning,
improvement in coordination among independent college IT units and
communication with the larger campus community. In this interview, he talks
about global IT and educational institutions and how IT supports
international engagement, research and teaching at WVU. Specifically, he
discusses cloud computing, copyright, security, investment in new
technologies, costs and funds allocation, open sourcing, and other
challenges of moving to an international educational platform.

BOOK REVIEW: INFORMATION SECURITY THEORY AND PRACTICE. GERMANY: SPRINGER;
2015, RAJA AKRAM and SUSHIL JAJODIA.
Reviewed by: Robert Vinaja, Texas A&M University San Antonio, Texas, USA,
bvinaja at tamusa.tamus.edu
The importance of information security has reached unprecedented levels in
recent years. Ensuring the security of information systems has become a
critical global need, both in the government and in corporations across
many industries.  This book contains a collection of articles selected from
submissions to the 9th IFIP International Conference. Articles were
carefully chosen resulted in a high-quality collection.  This is an
additional volume in the proceeding series for this conference. Some of the
topics highlighted in this book are: mobile crowdsourcing and privacy, the
Internet of things (IoT), the new threats by malware software in
smartphones, and a socio-technical framework in a tree format to identify
potential security attacks. A major contribution of the book is that it can
help IT professionals to stay aware of the latest developments in the
field. Also, the book is valuable for IT professionals in other fields,
like database administration, networking and mobile development, where a
solid knowledge of information security is also important.

********************************************
For copies of the above articles, please check for the Journal of Global
Information Technology Management (JGITM) in your institution's library.
********************************************
MISSION: The mission of the Journal of Global Information Technology
Management (JGITM) is to continue to be the premier journal on Global
Information Technology Management.  It is a refereed international journal
supported by global IT scholars from all over the world.  JGITM publishes
articles and reports related to all aspects of the application of
information technology for international business.  For example, it will
report on information resource management, managerial and organizational
concerns, educational issues, and innovative applications related to global
IT. Very important to the journal is its emphasis on quality and
relevance.  The journal disseminates this knowledge to researchers,
practitioners, academicians, and educators all over the world on a timely
basis.  Finally, the journal is international in all respects: content,
article authorship, readership, and the editorial board.

SCOPE AND COVERAGE: The journal's scope is multidisciplinary. It publishes
research, applied, and educational articles from all areas of MIS as well
as functional IT applications that have international focus. The journal
also entertains a variety of methodological approaches. It encourages
manuscript submissions from authors all over the world, both from academia
and industry. In addition, the journal will also include educational cases
and reviews of MIS books that have bearing on global aspects. Practitioner
input will be specifically solicited from time-to-time in the form of
industry columns and CIO interviews.

Articles in the journal include, but are not limited to the following
areas:  Frameworks and models for global information systems (GIS),
Development, evaluation and management of GIS, Electronic Commerce,
Internet related issues, Societal impacts of IT in developing countries, IT
and Economic development, IT Diffusion in developing countries, IT human
resource issues, DSS/EIS/ES in international settings, Organizational and
management structures for GIS, Transborder data flow issues, Electronic
data interchange, Telecommunications, Distributed global databases and
networks, Cultural and societal impacts, Comparative studies of nations,
and Applications and case studies (both educational and research).
********************************
Please participate in the 2016 GITMA Annual World conference to be held in
San Diego, USA on Aug 09-10, 2016.  http://www.gitma.org.



More information about the AISWorld mailing list