Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

DIGITAL AND WIRELESS COMMUNICATION (31 journals)

Showing 1 - 31 of 31 Journals sorted alphabetically
Ada : A Journal of Gender, New Media, and Technology     Open Access   (Followers: 22)
Advances in Image and Video Processing     Open Access   (Followers: 24)
Communications and Network     Open Access   (Followers: 13)
E-Health Telecommunication Systems and Networks     Open Access   (Followers: 3)
EURASIP Journal on Wireless Communications and Networking     Open Access   (Followers: 14)
Future Internet     Open Access   (Followers: 84)
Granular Computing     Hybrid Journal  
IEEE Transactions on Wireless Communications     Hybrid Journal   (Followers: 25)
IEEE Wireless Communications Letters     Hybrid Journal   (Followers: 41)
IET Wireless Sensor Systems     Open Access   (Followers: 17)
International Journal of Communications, Network and System Sciences     Open Access   (Followers: 9)
International Journal of Digital Earth     Hybrid Journal   (Followers: 14)
International Journal of Embedded and Real-Time Communication Systems     Full-text available via subscription   (Followers: 9)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Machine Intelligence and Sensory Signal Processing     Hybrid Journal   (Followers: 3)
International Journal of Mobile Computing and Multimedia Communications     Full-text available via subscription   (Followers: 2)
International Journal of Satellite Communications and Networking     Hybrid Journal   (Followers: 40)
International Journal of Wireless and Mobile Computing     Hybrid Journal   (Followers: 8)
International Journal of Wireless Networks and Broadband Technologies     Full-text available via subscription   (Followers: 2)
International Journals Digital Communication and Analog Signals     Full-text available via subscription   (Followers: 2)
Journal of Digital Information     Open Access   (Followers: 164)
Journal of Interconnection Networks     Hybrid Journal   (Followers: 1)
Journal of the Southern Association for Information Systems     Open Access   (Followers: 2)
Mobile Media & Communication     Hybrid Journal   (Followers: 10)
Nano Communication Networks     Hybrid Journal   (Followers: 5)
Psychology of Popular Media Culture     Full-text available via subscription   (Followers: 2)
Signal, Image and Video Processing     Hybrid Journal   (Followers: 13)
Ukrainian Information Space     Open Access  
Vehicular Communications     Full-text available via subscription   (Followers: 4)
Vista     Open Access   (Followers: 2)
Wireless Personal Communications     Hybrid Journal   (Followers: 6)
Similar Journals
Journal Cover
Journal of the Southern Association for Information Systems
Number of Followers: 2  

  This is an Open Access Journal Open Access journal
ISSN (Online) 2325-3940
Published by Michigan Publishing Homepage  [22 journals]
  • An Exploration of Wikipedia Contributions in the Era of COVID-19

    • Authors: Michael Holt et al.
      Abstract: With the declaration of COVID-19 as a pandemic by the World Health Organization and associated public health concerns and emergency measures, the lives of many came to a grinding halt. Whether due to stay-at-home orders and lockdowns, or quarantines, many were required to change their day-to-day way of life overnight. This not only changed the mechanical activities performed daily, such as driving to the office, going out to a restaurant, or attending a party, but this also changed the resultant implications of the utility we received from those activities. Utility theory posits that individuals choose what activities to perform based on some utility function, where the utility satisfies some need. As these activities to meet existing needs were disrupted, we seek to use this as an opportunity to explore how contribution in open-source communities changed, specifically the English Wikipedia. We utilize a natural experiment methodology, centered around the COVID-19 pandemic, and explore contribution patterns before and after the pandemic. Our project will contribute to the understanding of IS during unusual times, specifically in the context of open source communities that rely on volunteer time and effort
      PubDate: Thu, 30 Jun 2022 09:05:34 PDT
       
  • Impact of COVID-19 on the Career Trajectories of Black, Indigenous, and
           Latinx IT Graduate Students and Professionals

    • Authors: Thema Monroe-White et al.
      Abstract: This study utilizes an explanatory sequential mixed-methods design to examine the impact of COVID-19 on the career trajectories of information technology (I.T.) graduate students and professionals of color. Building on individual differences theory in the initial quantitative phase, data from a national survey of 356 STEM graduate students and professionals of color (Black, Indigenous, and Latino) were analyzed to investigate intersectional differences among I.T. and non-I.T. STEM graduate students and professionals by race/ethnicity, gender, and socio-economic characteristics. Findings suggest differential impacts of COVID-19 on I.T. graduate students and I.T. professionals. Among STEM graduate students, financial strain significantly affected their career plans, whereas among professionals, gender was a significant predictor. Qualitative evidence from I.T. respondents clarified quantitative findings. I.T. graduate students (n=239) were more concerned about research setbacks and career instability, while I.T. professionals (n=117) were concerned with setbacks in professional roles and networks, work/life stability, and increased desires for entrepreneurship.
      PubDate: Thu, 16 Jun 2022 21:15:28 PDT
       
  • Developing a Cybersecurity Educational Community Using Discord During the
           COVID-19 Pandemic

    • Authors: Randall Joyce et al.
      Abstract: The COVID-19 pandemic has been a hectic time for faculty at the higher education and K-12 levels. With many institutions having to switch to remote learning, faculty had to find tools and resources that could be used to create virtual educational communities. In this milieu of remote learning, the technology tools must foster a thriving educational environment and facilitate communications. In the undergraduate Cybersecurity and Network Management (CNM) program at Murray State University (MSU), the faculty adopted Discord for teaching classes, lab work, and for social events. Discord has been used by the CNM faculty for over a year now and has shown positive results. Students like using Discord for streamlining the communication process and for having the ability to establish real time communication with faculty. In this paper, the authors present their approach to developing and managing the use of Discord in the CNM program at MSU.
      PubDate: Thu, 16 Jun 2022 21:05:29 PDT
       
  • The Persistent Digital Divide: The Case Study of a Minority Serving
           Institution

    • Authors: Brandis Phillips Ph.D; CPA et al.
      Abstract: The COVID-19 pandemic has laid bare the persistent digital divide between those that have access to technology and those that do not. As such, we conducted a case study that consisted of interviews and a survey of students along with interviews of administrators and faculty at a minority serving institution. The institution is used along with resources and appropriations theory as a lens to further understand the digital divide and how technology access and use have manifested during the pandemic. The results suggest that students perceived difficulty with access to and use of information communication technologies (such as hardware and software), which interfered with their engagement with learning. At the institution under investigation, the pre-pandemic lack of access to technological resources was eliminated during the pandemic thanks to additional funding. Nevertheless, the communication problems between the administration and students limited students’ access to the resources available.
      PubDate: Thu, 16 Jun 2022 20:50:31 PDT
       
  • Changing Product Perceptions: A Pre-COVID-19 and Post-COVID-19 Survey of
           Software Products

    • Authors: Adarsh Kumar Kakar
      Abstract: Traditionally software products have been classified as utilitarian or hedonic based on the value they provide to the users. In this cross-disciplinary study, we introduce another category of software products called social products i.e., those which provide symbolic value to its users. However, we also suggest these three types of software products are ideal types. In reality, most software products are likely hybrid. They provide differing magnitude of all three values: Utilitarian, Hedonic and Social. We use the different levels (high, medium, and low) of these three values to classify products as predominantly Utilitarian, predominantly Hedonic, predominantly Social and five types of Hybrids. This classification of products offers a fresh perspective into how users view different products in terms of the value they provide to them. The insights from the study can be used to assess software product positioning and to develop suitable product development strategies.
      PubDate: Thu, 16 Jun 2022 20:35:33 PDT
       
  • A Longitudinal Study to Identify the Psychological Needs Profile of Users
           of Social Media in the pre-COVID and post-COVID Eras

    • Authors: Ashish Kakar
      Abstract: Social media has had a huge impact on how we live and interact as a society. Yet, research literature is sparse on the psychology of users who participate enthusiastically in the social media. In this exploratory study with 222 student users we apply the theory of fundamental human needs to predict and assess the psychological profile of users who actively engage in social media. Overall the finding of the study support our hypothesis but with a few unexpected findings. Need of relationship, self-esteem and popularity-influence were found to positively impact the behavioral intention, frequency and time users spent on social media. The findings have useful practical implications for product/ project managers in understanding what motivates users to engage in social media and how social media can be designed to further enhance user participation.
      PubDate: Thu, 16 Jun 2022 20:10:35 PDT
       
  • Problematic Technology Use: The impact of personality and continued use

    • Authors: Brandis Phillips et al.
      Abstract: As technology becomes more pervasive, it is more accessible to use anytime, anywhere. Although technology has been a savior in many respects, there is a need for awareness of the potential for excessive and problematic technology use (PTU). Prompted by an increase in anxiety, stress, and feelings of isolation, some individuals may be more prone to PTU than others. If not recognized, PTU may become associated with obesity, sleeplessness, a decline in social skills, and deficient performance at school and work. The information systems literature has indicated that a variety of information technology artifacts can lead to PTU. The focus of this research will be to examine the antecedents of PTU, with an emphasis on IS continued use and personality traits. The value of this study is in addressing awareness, recognition, and prevention of PTU and proposing possible factors to consider in regulating the use of technology. The results suggest a significant and positive association between PTU and Information Systems continuance, habit, and personality traits of introversion and neuroticism.
      PubDate: Mon, 14 Mar 2022 13:25:48 PDT
       
  • Toward Remaking Software Development to Secure It

    • Authors: Jonathan Jenkins
      Abstract: Modern software development depends on tools and techniques to represent implied information processing logic to the human engineer, relying chiefly on effortful human reasoning to best determine critical properties of the software system. Current conceptualization, visualization and contextualization of software in development amounts to a significant under-utilization of already limited development resources directed to optimization, prevention, and addressing fundamental security properties of the software system. As a step toward increasing such utilization as a basis for a global ecosystem of secure software, this work explores and evaluates an alternative representation of software source code for the sake of secure development, manifesting universal, critical properties of the system to enhance control of security factors while the bulk of the properties of the system are being determined and the costly skills of the developer are directed to the many aspects of the task.
      PubDate: Mon, 14 Mar 2022 13:25:46 PDT
       
  • Generation Z, Learning Preferences, and Technology: An Academic Technology
           Framework Based on Enterprise Architecture

    • Authors: Curtis C. Cain et al.
      Abstract: This work provides an overview of Generation X, Y (Millennials), and Z and their characteristics in academia. We present the ways that mobile technology is infused into their lifestyle. We reference how Generation Y and Z in particular expect technology to be integrated into their educational experience, as well as how it helps faculty to facilitate both synchronous and asynchronous learning. Furthermore, an overview is provided of how technology currently contributes to learning and provides a framework for how educators can better engage current students. The conceptual academic technology framework (ATF) put forth in this work will provide an immediate impact in several key areas. This framework enhances structure during course design, which may be based directly on learning outcomes and department/school objectives. It will also directly improve consistency in faculty/student communication by closely monitoring how changes in communication methods have evolved. Finally, we describe how to integrate technology in a meaningful way, in a manner that does not distract students while preparing them for careers in business.
      PubDate: Mon, 14 Mar 2022 13:05:26 PDT
       
  • A Decade in Review: An Exploration of the Level of Analysis and the
           Subjects for Information Systems Security (ISS) Research

    • Authors: Christopher Kreider
      Abstract: Information System Security (ISS) research has been identified as an area that IS researchers can and should contribute to. Our research in this area, however, may not yet demonstrate an ability to do better than experts and professionals in the field. This paper explores the last decade of ISS research across a selected basked of journals to determine how ISS research is continuing to fit into the broader base of IS topics. Additionally, we seek to explore the level of analysis and the subjects sampled with a focus on the role of students with respect to quality and generalizability. Finally, we look to better understand the role of the artifact in this research, and the types of artifacts that researchers are focusing on. We find that with a nearly 200% increase in ISS articles over the prior decade, with a strong focus on individuals and the firm/organization, that ISS research is an increasing and thriving area of IS research.doi:10.17705/3JSIS.00018
      PubDate: Wed, 07 Jul 2021 19:45:24 PDT
      DOI: 10.17705/3JSIS.00018
       
  • An Investigation into user Adoption of Personal Safety Devices in Higher
           Education Using the Unified Theory of Acceptance and Use of Technology
           (UTAUT)

    • Authors: Dawit Demissie et al.
      Abstract: Educational institutions are temples of knowledge that require the utmost safety and security. To ensure that, they are implementing safety measures, including the use of personal safety devices. Adoption of such devices is uneven and not well understood. The main focus of the current study is to investigate the adoption of Peace of Mind (POM), a personal safety device, by students at a liberal arts college in the United States. The Unified Theory of Acceptance and Use of Technology served as the theoretical framework. Findings from a sample of 405 students confirmed that performance expectancy, trusting belief, facilitating conditions, and social influence had direct effects on the students’ behavioral intention to use POM. Based on our findings, we discuss concrete implications for various stakeholders such as higher learning institutions and businesses involved in the innovation and diffusion of personal safety devices. We also make specific recommendations for future research.doi:10.17705/3JSIS.00017
      PubDate: Wed, 07 Jul 2021 19:45:23 PDT
      DOI: 10.17705/3JSIS.00017
       
  • Surveillance Concerns as Predictors of Obfuscation and the Chilling Effect
           in the Context of a Pandemic

    • Authors: Craig Van Slyke et al.
      Abstract: Potential negative consequences of digital surveillance represent an area of increasing concern due to the rising impact of digital and mobile technologies on daily life. The COVID-19 pandemic increased these concerns as governments worldwide turned to both digital and non-digital surveillance to help in the battle to control the spread of the disease. Due to this, surveillance creep (the use of supposedly limited-scope surveillance for increasingly pervasive purposes) is a growing concern. Concerns over digital surveillance have led to some individuals turning to protective measures, including obfuscation and the chilling effect. Obfuscation involves intentionally providing ambiguous or misleading information to interfere with surveillance activities. The chilling effect is the decision to not engage in some behavior due to concerns about the consequences of that behavior. Often, obfuscation is a general protective measure that guards against surveillance across applications and reflects general concerns about privacy and surveillance. In contrast, the chilling effect is application and concern specific. In this paper, we use a research model that draws on the health beliefs model and protection motivation along with data from a survey of American social media users to investigate antecedents of obfuscation and the chilling effect in the context of social media surveillance related to COVID-19. Results indicate that age, sex, social media experience, social media habit, and the perceived surveillance severity impact obfuscation. These same antecedents affect the chilling effect, as does perceived surveillance vulnerability. Although our research is exploratory, the results of our study hold implications for both research and practice.doi:10.17705/3JSIS.00016
      PubDate: Wed, 07 Jul 2021 19:45:23 PDT
      DOI: 10.17705/3JSIS.00016
       
  • Antecedents of Members’ Trust Propensity and Its Impact on
           Self-Disclosure Intention in Mobile-Based Online Dating Apps

    • Authors: Bao Q. Duong et al.
      Abstract: To examine users’ intention to disclose detailed information on Mobile-Based Online Dating Apps (MBODAs), we adapted Privacy Calculus Theory (PCT) to develop our research model. We posited perceived members’ trust propensity as a central factor connecting its antecedents with users’ information self-disclosure intention. We examine a) the impact of users’ perceived benefit, perceived risk, electronic word of mouth (eWOM), and prior experience on members’ perceived trust propensity, and b) the impact of perceived members’ trust propensity toward users’ information self-disclosure intention. Analysis of MBODA users’ responses indicates that perceived benefit has a positive effect on perceived members’ trust propensity, while perceived risk has a negative effect. Members’ experience positively influences perceived members’ trust propensity; however, eWOM does not show any effect on perceived members’ trust propensity. Finally, perceived members’ trust propensity is positively associated with information disclosure intention. Implications along with limitations and future research directions are discussed.doi:10.17705/3JSIS.00015
      PubDate: Wed, 07 Jul 2021 19:45:21 PDT
      DOI: 10.17705/3JSIS.00015
       
  • Psychological Contract in IT: A Qualitative Exploration of Missed
           Expectations

    • Authors: René Moquin
      Abstract: This study examines the nature of reciprocity between IT workers and their organization and the IT profession by applying two theoretical perspectives - social identity and the psychological contract. Social Identity Theory addresses the connection between individuals and their profession while Psychological Contract Theory addresses the mental retention of direct and indirect promises and their reciprocation. The linkage of these theories assesses the behavioral outcomes of missed expectations. The results from in-depth interviews with IT professionals generate a taxonomy of twenty-five themes that potentially influence a breach or violation of the psychological contract. The discussion then focuses on the four salient themes that were highly referenced by the interviewees and that closely aligned with the theoretical foundations of the study. This paper widens the operational aspects of the Psychological Contract by investigating the factors that potentially influence a Psychological Contract Breach and Psychological Contract Violation within the IT profession.doi:10.17705/3JSIS.00014
      PubDate: Tue, 03 Nov 2020 06:51:04 PST
      DOI: 10.17705/3JSIS.00014
       
  • Risk and Demographics’ Influence on Security Behavior Intentions

    • Authors: Ramakrishna Ayyagari et al.
      Abstract: Behavioral information security has become an important aspect of information security. In this study, we extend previous works on developing a comprehensive tool to measure security behaviors (i.e. Security Behavior Intentions scale - SeBIS(Egelman & Peer, 2015)). We extend the work on SeBIS by 1) proposing the use of security domain-specific risk as opposed to a generic risk measure, 2) investigating differences in SeBIS across age, gender, education and experience, and 3) providing suggestions for improving SeBIS measures. Survey results from our study provide support for security risk - device securement relationship, a previously unsupported link. We also uncover the role of demographics in influencing SeBIS. Overall, our study contributes to, and further establishes SeBIS as a predictive tool for measuring security behaviors.doi:10.17705/3JSIS.00013
      PubDate: Tue, 08 Sep 2020 07:05:10 PDT
      DOI: 10.17705/3JSIS.00013
       
  • Mobile Learning via Mobile Devices in Nigeria Higher Education: Usage
           Analysis Based on Utaut Model

    • Authors: Olumuyiwa Alaba et al.
      Abstract: The recent influx of various technologies has affected all sectors of the human life including education. Mobile learning has emerged with the evolution of mobile devices that has enhanced knowledge sharing via distance education systems. In Nigeria, it has been observed that under-utilization of the technology in higher education institutions (HEIs) is still prevalent. This study investigated the factors hindering the use of mobile devices for mobile-learning by students. Four research questions were formulated based on UTAUT model with nine variables and 391 survey questionnaires were administered on the students in two institutions in Ogun State. Data obtained were analyzed using two multiple regression and path analysis on SPSS 23. Findings showed that the facilitating factor of the mobile device leads other variables on direct effect on the attitude of students towards usage of mobile devices for m-learning. The management of HEIs should provide technical infrastructure supports on the use of mobile devices
      PubDate: Tue, 08 Sep 2020 07:05:06 PDT
       
  • Stereotyping and Stigmatizing IT professionals Toward a model of
           devaluation

    • Authors: René Moquin et al.
      Abstract: An understanding between information technology (IT) and business units is important to information systems research in that their alignment is critical for organizational performance in the digital environment. Negative perceptions and associated behavioral outcomes can affect group cohesion and effectiveness. The present research uses the lens of stigma and stereotypes to explore a notion of non-productive relationships between the IT and nonIT groups. The primary focus of this study was to analyze interviews with IT professionals to explore and identify potential antecedents to stigma. The differences between IT professionals and users are defined and explicated, illustrating the occurrence of stereotyping among and between the various groups. We found that relationships between the IT and nonIT groups appear to support a notion of differentness. The support of stigmatization between these two groups likely exists in interpersonal relationships during situations of stress, cultural differences, and expectations. Relationships in the pervasive digital environment between business units are critical for organizational performance. Each unit maintains its own culture and, therefore, the associated views and behavioral outcomes. The existence of different groups implies a difference in perception, expectation, and ultimately performance.doi:10.17705/3JSIS.00012
      PubDate: Thu, 19 Mar 2020 08:10:26 PDT
      DOI: 10.17705/3JSIS.00012
       
  • Information Technology Implementation and Organizational Change: A
           Dissipative Structure Theoretical Lens

    • Authors: Alper Yayla et al.
      Abstract: Previous research on information technology (IT) implementation and organizational change postulates that neither technology nor human agency determines the new structure of the organization, but rather the new structure emerges as a result of the interplay between technology and human agency. A majority of these studies assume a linear relationship between contingencies and outcome during the emergence process. However, during the implementation process, the characteristics of organizations become non-linear, almost chaotic. Therefore, we postulate that approaching to IT-enabled change from complexity theory would be better suited to explain the emergence process. We propose a framework based on dissipative structure theory and specify four stages that organizations undergo during the implementation process. While the emergence process is considered unpredictable, we argue that with the help of certain organizational practices (i.e., organizational learning/unlearning) and managerial interventions (i.e., use of rhetoric), organizations can condition the emergence of the new structure for the success of the implementation.doi:10.17705/3JSIS.00011
      PubDate: Thu, 19 Mar 2020 08:10:22 PDT
      DOI: 10.17705/3JSIS.00011
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 35.173.35.14
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-