Journal of Technology Research
The Journal of Technology Research (JTR) publishes original, unpublished manuscripts related to contemporary issues in information technology. Any topic related to technology implementation, development, financial justification, or functional evaluation in a business environment is appropriate for publication consideration in the journal. Manuscripts related to enterprise systems (ERP, CRM, SCM, etc.), IT security or cloud computing are encouraged. Please consider the Journal of Instructional Pedagogies for instructional technology or pedagogical technology applications.
Editor: Dr. Phillip D. Coleman, Western Kentucky University.
Curriculum Vitae. Contact: email@example.com.
Journal of Technology Research - Review Board
ISSN Online: 1941-3416, Print: 2327-5359
See AABRI Journal Submission Procedures for instructions to authors.
See AABRI Publication Policies and Procedures for information regarding acceptance rates, archiving, review procedures, etc.
The journal is listed in the Cabell's Directory of Publishing Opportunities and indexed by ProQuest and EBSCOhost.
AABRI authors retain copyright to their manuscripts. See the AABRI Copyright Policy for complete details.
JTR is published by the Academic and Business Research Institute. Please see www.aabri.com/procedures.html for AABRI journal submission procedures.
Click on the manuscript name below to read the articles from the Journal of Behavioral Studies in Business. All articles are published in PDF format and require a PDF reader. Download free Adobe PDF reader.
Click to view APA referencing procedures for online journal articles,
Click to order printed editions of AABRI journals.
Volume 7 - June 2017:
Predicting consumers’ attitude toward their Facebook experience: the influence of cognitive and affective factors
; Mark Hall, Minnesota State University, Mankato; Kevin Elliott, Minnesota State University, Mankato; Juan (Gloria) Meng, Minnesota State University, Mankato.
Maintaining professionalism in a social media era; Ricardo Perez, Texas A&M University-Kingsville;
LaVonne Fedynich, Texas A&M University-Kingsville.
Health data breaches: The need for information assurance strategy; Emmanuel U Amadi, University of Phoenix.
Exploring efficient privacy preserving technique for association rule data mining; Carolyn LaMacchia, Bloomsburg University of Pennsylvania.
Legal issues in delivering healthcare IT solutions; Archana Indran, H&R Block, Kansas City; Sam Ramanujan, University of Central Missouri; Someswar Kesh, University of Central Missouri.
Social media in the online classroom; Jillian R. Yarbrough, Texas Tech University.
Exploratory aspect-based sentiment analysis approach gauging novel performance from online reviews; Robin Jindal, Indian Institute of Technology Delhi; Nicolle Clements, Saint Joseph’s University; Vipul Gupta, Saint Joseph’s University.
Choice waves and strategic interaction; Rutherford Cd. Johnson, University of Minnesota Crookston.
Programming case: A methodology for programmatic web data extraction; John N. Dyer, Georgia Southern University.
Beware the unfriendly skies: how drones are being used as the latest weapon in cybercrime; Martin S. Bressler,
Southeastern Oklahoma State University; Linda Bressler, Southeastern Oklahoma State University.
Volume 6 - January, 2015:
Teaching undergraduate business IT: Using ERPSIM to provide a real-world perspective; John B. Isett, University of Tampa; Raymond Papp, University of Tampa.
Electronic health record implementation success: lessons learned and best practice, Emmanuel Amadi, University of Phoenix.
Co-occurrence analysis as a framework for data mining, Jan W. Buzydlowski, Holy Family University.
Perceived risk agents in e-commerce environments, C. Michael Powell, University of North Georgia; Christopher A. Conca, Mount Olive College.
Doing database design with MySQL, Jerzy Letkowski, Western New England University.
Drivers and challenges of ICT adoption by SMES in Accra metropolis, Ghana, Dennis K. Agboh, Morgan State University.
Information differences between closed-ended and open-ended survey questions for high-technology products, William Bleuel, Pepperdine University.
Fighting cybercrime calls for developing effective strategy, Richard McMahon, University of Houston-Downtown; Darlene Serrato, Houston Baptist University; Linda Bressler, University of Houston-Downtown; Martin Bressler, Southeastern Oklahoma State University - Durant, TX.
AIS/IS sophistication and inter-organizational complexities, M. George Durler, Emporia State University; Michael S. Luehlfing, Louisiana Tech University.
Nonprofit adaptation to Web 2.0 and digital marketing strategies, Julia C. Krueger, Florida Gulf Coast University; Diana L. Haytko, Florida Gulf Coast University.
Online hotel's sales strategies with emphasis on web booking, Ljubica Pilepic,
University of Rijeka, Opatija, Croatia; Maja Šimunic, Liburnia Riviera Hotels, Opatija, Croatia; Tomislav Car, University of Rijeka, Opatija, Croatia.
Shifting technology paradigm for the film and entertainment industry: Interface modalities, Diane Fulton, Clayton State University; Richard Fulton, Troy University; Thomas Garsombke, Clayton State University.
Volume 5 - October, 2014:
Big data using cloud computing, Bernice M. Purcell, Holy Family University.
The outcomes of user interactions with retail websites: semantics and nomenclature, Joseph Hasley, Metro State University of Denver; Dawn G. Gregg, University of Colorado Denver.
M-Commerce Development in China - Users’ Perspectives, Hongjiang Xu, Butler University.
The adoption of social media in government agencies: Gulf Cooperation Council case study, Ali H. Al-Badi, Sultan Qaboos University.
Exploring project manager insights about IT project success using Q-methodology, Michael J. Doherty, Marian University.
A comparison of the marketing capabilities of SME websites in Australian and U.S. domains, Stewart Adam,
Deakin University, Australia; Michael Featherstone, Jacksonville State University: Kenneth W. H. Day, Jacksonville State University.
Security vulnerabilities of the top ten programming languages: C, Java, C++, Objective-C, C#, PHP, Visual Basic, Python, Perl, and Ruby, Stephen Turner, Known-Quantity.com, part of Turner & Associates, Inc.
Capitalizing on Big Data:
Governing information with automated metadata, Stephen Turner, Known-Quantity.com, part of Turner & Associates, Inc.
The impact of multiple master patient index records on the business performance of health care organizations
, Cynthia L. Banton, University of Phoenix; David L. Filer, University of Phoenix.
Shared leadership: A critical component in IT Project Management, Chet Stagnaro, Freed Associates; Chris Piotrowski, University of West Florida.
A path analysis model for web application success, Monica Lam, California State University, Sacramento.
Organizational attraction factors: A technology perspective, Linda C. Isenhour, Eastern Michigan University; Kimberly M. Lukaszewski, Wright State University; Dianna L. Stone, University of Texas at San Antonio.
Volume 4 - July, 2013:
Technology leaders vs. laggards, evidence from the credit union industry, Fred H. Hays, University of Missouri-Kansas City; Sidne Gail Ward, University of Missouri-Kansas City.
Use of social media by college students: Relationship to communication and self-concept
, Megan Sponcil, Youngstown State University; Priscilla Gitimu, Youngstown State University.
The emergence of “big data” technology and analytics, Bernice Purcell, Holy Family University.
Investigating the usability of e-catalogues systems: modified heuristics vs. user testing, Amen Ali Alrobai, King Abdulaziz University; Roobaea Salim AlRoobaea, Taif University & University of East Anglia, Norwich, UK; Ali H. Al-Badi, Sultan Qaboos University, Oman & University of East Anglia, Norwich, UK; Pam J. Mayhew, University of East Anglia, Norwich, UK.
The influence of identity characteristics on E-Shopping enjoyment and E-Loyalty among women online shoppers, Tonjia S. Coverdale; University of the Virgin Islands; Allison J. Morgan, Howard University.
E-CRM applications of soccer teams as a strategic tool: a content analysis of English Premier League and Turkish Super League, Metin Argan, Anadolu University; Mehpare Tokay Argan, Bilecik University; Hüseyin Köse, Anadolu University; Sevda Gökce, Gaziosmanpasa University.
Managing content for information centers and large repositories using the DITA framework, Alice S. Etim, Winston Salem State University.
Computers and young workers’ wages in Europe, Dulce Contreras, University of Valencia; Rosario Sánchez, University of Valencia; Delfina Soria, University of Valencia.
Improving data security in small businesses, Kent N. Schneider, East Tennessee State University.
A review of biometric experts’ evaluations of the biometric modalities most likely to effectively combat identity fraud, Galaxy Samson Edo, Capella University.
The process and characteristics of phishing attacks - A small international trading company case study
, Qingxiong Ma, University of Central Missouri.
Benefits and risks of cloud computing, Stephen Turner, Known-Quantity.com and Holy Family University.
Volume 3 - July, 2012:
Technology ease of use through social networking media, Michelle Lane, Western Kentucky University; Phillip Coleman, Western Kentucky University.
IPv6 and deep packet inspection, Thomas B. Martin, Holy Family University.
Data differences —XBRL versus Compustat, Pavani Tallapally, Slippery Rock University; Michael S. Luehlfing, Louisiana Tech University; Madhu Motha, Butler County Community College.
Nonprofit websites: Adoption and type in census district 8, Dave McMahon, Pepperdine University; Samuel Seaman, Pepperdine University; John Buckingham, Pepperdine University.
Cloud computing and computer forensics for business applications, Ludwig Slusky, California State University; Parviz Partow-Navid, California State University; Mohit Doshi, California State University.
Methodologies, tools, and techniques in practice for
Web application development, Monica Lam, California State University, Sacramento.
The mediating effect of perceived media characteristics on shyness and text messaging in cell phone relationships , Yutaka Ueda, Seikei University; Miho Nojima, Seikei University.
Software security assurance a matter of global significance: product life cycle propositions, Doreen (Dee) Sams, Georgia College and State University; Phil Sams, Sr. Load & Performance Engineering Consultant, Milledgeville, Georgia USA.
Using online social networking: Students’ purposes of Facebook usage at the University of Turkey, Muge Akyildiz, Anadolu University; Metin Argan, Anadolu University.
Concealed Internet traffic and exfiltration: the insider threat and resolution, Thomas B. Martin, Holy Family University & Forensics Inc.; Stephen Leibholz, Forensics Inc.
A qualitative study of an animated representation of firms’ operating health, Lin Zhao, Purdue University Calumet.
U.K. banking experts as decision-makers: a historical view on banking technologies, Georgios Samakovitis, University of Greenwich.
Volume 2 - September, 2011: (order printed edition)
Comparing standard toughness through weighted and unweighted scores by three standard setting procedures, Tsai-Wei Huang, National Chiayi University, Taiwan; Ayres G. D’Costa, Ohio State University.
Assessing password threats: Implications for formulating university password policies, Melissa Walters, The University of Tampa; Erika Matulich, The University of Tampa.
The perceptions of business students regarding management information systems (MIS) programs, Patrick Hogan, Turner College of Business and Computer Science; Lei Li, Turner College of Business and Computer Science.
Virtual worlds and social networking: reaching the millennials, Raymond Papp, The University of Tampa.
Demographic and psychographic variables and the effect on online student success, Linda Bressler, University of Houston-Downtown; Martin Bressler, Houston Baptist University; Mark Bressler, University of Houston-Clear Lake.
The impact of classroom technology on student behavior, Angeline Lavin, University of South Dakota; Leon Korte, University of South Dakota; Thomas Davies, University of South Dakota.
Factors affecting the adoption of consumer oriented information technology biometrics solutions by the credit union industry, Kevin Scott, Midwestern State University; Charles Johnston, Midwestern State University.
The organizational dynamics of knowledge and IT-enabled innovations, Mahmoud Watad, William Paterson University.
Green data center: how green can we perform?, Ramon Mata-Toledo, James Madison University; Pranshu Gupta, Kansas State University.
Cross-cultural reliability and validity of a scale to measure information technology capability, Man Zhang, Bowling Green State University; Michelle Brodke, Bowling Green State University; Jim McCullough, University of Puget Sound.
Aligning business service management to goals: an integrated approach at BMC Software, Brenda Richardson, BMC Software, Inc.; Ahmed Mahfouz, Prairie View A&M University.
Which is a better choice for student-faculty interaction: synchronous or asynchronous communication?, Lei Li, Columbus State University; John Finley, Columbus State University; Jennifer Pitts, Columbus State University; Rong Guo, Columbus State University.
Volume 1 - April, 2009: (order printed edition)
CRM in Russia and U.S. - Case Study from AMerican Financial Service Industry, Tom Griffin, Nova Southeastern University;, Tamila Curtis, Nova Southeastern University; Donald Barrere, Nova Southeastern University.
TRUSTWORTHINESS IN COMPUTER-MEDIATED TRANSACTIONS: A CONTENT ANALYSIS OF TRUSTOR FEEDBACK, J. Harold Pardue,University of South Alabama;Jeffrey P. Landry,University of South Alabama;Christopher E. Shaw, University of South Alabama.
The Use of Infrastructure Variables in Explaining CIS Program Satisfaction/Return, Stuart Van Auken, Florida Gulf Coast University;Mark Simkin, University of Nevada Reno; Earl Chrysler, California State University; Ludmilla G. Wells, Florida Gulf Coast University.
Innovative Technological Advances In Modern Club Operations, Denis P. Rudd, Robert Morris University.
Fine-Tuning Useful E-Commerce Practices, Kaylene Williams, California State University, Stanislaus; Edward Hernandez, California State University, Stanislaus; Alfred Petrosky, California State University, Stanislaus; Robert Page, Southern Connecticut State University.
Exploring the Use of E-CRM Elements and Effective Website Design as Tools for Reducing Consumer Post-Purchase Cognitive Dissonance , Paul Clark, Indiana State University; Neel Das, Appalachian State University.
Causes of Conflicts for Local Information Technology Managers in Multinational Companies, Jongtae Yu, Mississippi State University; Jong-Wook Ha, Columbus State University; Dong-Yop Oh, University of Alabama.
IT Strategic Audit Plan, Marc Ackerman, Jacksonville University; Beth Rucker, Jacksonville University; Anecia Wells, Jacksonville University; Joseph Wilson, Jacksonville University; Randy Wittmann, Jacksonville University.
Factor Analysis of the Performance Indices of Information and Communications Technology Projects in the Public Sector of the Nigerian Economy, Charles Akinyokun, Federal University of Technology, Akure, Nigeria; Cleopas Angaye, National Information Technology Development Agency, Abuja, Nigeria; Moses Ubaru, National Information Technology Development Agency, Abuja, Nigeria.
Information Fatigue: The Case of Activity-based Information (ABI) in Decision-making, Aretha Hill, North Carolina A&T State University; Shawnta Friday-Stroud, Florida A&M University.
Data quality issues for accounting information systems’ implementation: Systems, stakeholders, and organizational factors, Hongjiang Xu, Butler University.
The Hypothesis Testing of Decision Making Styles in the Decision Making Process, Nabie Conteh, Shenandoah University.
AABRI Home | Journals | Submission Information | Conferences | Contact Us | Search AABRI
Academic and Business Research Institute
P.O. Box 2235, Ponte Vedra Beach, FL, 32004, USA
Phone - (904)435-4330
Dr. Russell Baker, AABRI Executive Director