143 research outputs found
The Role of the Internet in Intelligence Gathering and Spreading Propaganda
The analysis of American intelligence as an academic discipline exhibits an excellent level of integration regarding subject matter and methods from military history and strategic studies. The knowledge and information revolution steered a different online culture of sharing and oversharing. While the study of intelligence has primarily been associated with historical methods thus far, opportunities for innovation are also afforded by advances in theoretical and conceptual thinking about intelligence. Such revolutions can help intelligence history while concurrently enlightening the disputes on intelligence in the twentyfirst century. The takings from the information age consist of low cost for access to data and significant dependence on the Internet. Intelligence agencies profit from the Internet equally through open sources and concealed data gathering from networked computers (Haines, 2004). In addition, Information gathering through Twitter, Facebook, Snapchat, Instagram, blogs, and several social media sites, to name a few, facilitated intelligence gathering all over the world. While some researchers may argue that social media may be an intelligence-gathering tool, several reports revealed that it could also be used for propaganda and misinformation or is intelligence in support of secret operations. This project will investigate how the Internet and the use of Social Media in particular, along with the military strategy of a country, can affect the design of its market intelligence processes
Rethinking Credentials for Aviation Sustainability: A DACUM Approach
The pandemic of COVID-19 Millennials aren\u27t the youngest working generation anymore, and Gen Zers are the new kids on the block. This group of individuals, born between 1995 and 2019, already makes up 5% of the total U.S. labor force, roughly 9 million people. However, the skills gap is real and exists, one in which research shows that new college graduates either do not have all the skills employers want, or they are not doing an excellent job of demonstrating those skills in their resumes.
Sustainability programs consistently encounter challenges that threaten the future as a viable academic discipline. It is exceptionally critical that academicians recognize these challenges, their implications and thus devise particular approaches to address them. Therefore, this research aims to identify what constitutes aviation and aerospace sustainability job skills to align better, improve, and fortify course content to support undergraduate and graduate students\u27 future employment. Furthermore, this research intends to reinforce a present research effort to bridge the skills gap between industry needs for sustainability in aviation and aerospace workforce and university curricula
Ethical Attitudes of Business Information Systems Students: An Empirical Investigation
This paper discusses attitudes toward ethical issues in information systems. Approximately 150 subjects were drawn from two populations: full-time undergraduate business information systems students and full-time master’s students. The subjects read a subset of six ethical scenarios. Hypotheses were tested for significant differences between the undergraduate students’ beliefs and those of graduate students, and female and male students who responded to the same scenarios
Measuring Faculty Perceptions of Blackboard Using the Technology Acceptance Model
Web-based education offers the combination of self-paced learning and interactivity. We are just now beginning to empirically assess the differences between online education and traditional classroom based instruction. The Technology Acceptance Model (TAM) has been widely used in Information Systems research to analyze user perceptions of technology. This paper describes the results of an empirical study of faculty perception of Blackboard usage, utilizing TAM as its theoretical basis
Extended Technology Acceptance of Mobile Technology in Higher Ed: A Reliability & Validity Test of a Scale
The objective of this research study is to study the mobile technology acceptance of educators in the higher education industry in the United States. This study utilized the Chen et al. (2013) extended technology acceptance model, that extended the original Davis (1989) TAM. The study incorporated path analysis to determine estimates of the magnitude and significance of hypothesized causal connections between sets of the study variables. The researchers investigated the reliability of the survey instrument for the sample with Cronbach’s alpha. There were five variables of interest in the study, perceived resources, perceived ease of use, perceived usefulness, attitude toward use, behavioral intention, and technology use with two dimensions, incorporating frequency of use and duration of use. The research question, hypotheses, and current state of research are presented and discussed
Factors Influencing Users’ Attitudes Towards Using Brain Computer Interface (BCI) for Non Medical Uses: An Application of the Technology Acceptance Model (TAM)
While brain-computer interfaces (BCI) are gaining popularity in assisting people with illnesses, there is also increased technical research on incorporating BCI into healthy people’s lives. So far, not much research has focused on user attitudes, although some research has pointed out privacy and trust issues. Understanding potential users’ attitudes, expectations, and concerns early in the technology development stage is crucial for the novelty\u27s success. For this reason, this study aims to understand the general publics’ attitude towards BCI for nonmedical uses using the technology acceptance model (TAM). The study will offer insights into how external factors including technology optimism, familiarity, and perceived enjoyment influence perceived usefulness (PU), perceived ease of use (PEOU), and perceived trust affect BCI uses. It is hypothesized that each independent variable is positively correlated with the dependent variable in the proposed TAM. Two hundred participants between the ages of 20 and 50 were recruited to participate in the survey. The data were analyzed using structural equation modeling (SEM), including a series of goodness-of-fit (GOF) tests and path analysis. The path coefficient for each path is analyzed with a t-test and tested at a 95% confidence level. Suppose the p-value is determined to be lower than 0.05. In that case, the null hypotheses can be confidently rejected, suggesting the model accurately represents 95% of the variances of the positive correlation observed in the population
Cyberspace: A Venue for Terrorism
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace
Enterprise Architecture Transformation Process from a Federal Government Perspective
The need for information technology organizations to transform enterprise architecture is driven by federal government mandates and information technology budget constraints. This qualitative case study aimed to identify factors that hinder federal government agencies from driving enterprise architecture transformation processes from a compliancy to a flexible process. Common themes in interviewee responses were identified, coded, and summarized. Critical recommendations for future best practices, including further research, were also presented
Mobile Technology in Higher Education: An Extended Technology Acceptance Perspective
There is a lack of research that provides institutions with information on educators’ acceptance of mobile technology in higher education within the United States. This study utilized the Chen et al. (2013) extended technology acceptance model, that extended the original Davis (1989) TAM. In this research study, Chen et al. (2013) survey instrument provided the necessary tool to collect data from educators in higher education within the United States before COVID-19. The results showed statistical significance exists in relationships across the assessed factors of perceived usefulness, perceived ease of use, perceived attitude toward use, and behavioral intention, which contribute to the acceptance of mobile technology in higher education. The study implies that institutions face a challenging task to understand the technology acceptance of educators as they incorporate the use of mobile technology to support their work and improve instructional practices
How Education on Climate Change Affects Consumers\u27 Willingness to Participate in Carbon Offsetting Programs?
If airlines could have a better understanding of how to induce sustainable behavior in their customers, they can use these methods when building sustainable initiatives such as voluntary carbon offsetting programs. The purpose of the study was to determine if education on the consequences of climate change affects how consumers behave related to their interaction with carbon offsetting programs. Regional Scenarios were introduced with a natural disaster comparable to the region under review. A multistage sampling technique was utilized in this study. Firstly, using a cluster sample, groups were used rather than individual units of the target population. The results indicate that education significantly influences behavior compared to behavior before education. Based on the results of this study, we recommend that airlines modify their sustainability initiatives by educating the consumer on the purpose behind the initiative before asking for participation
- …