Journal of Technology Research
The Journal of Technology Research (JTR) publishes original, unpublished manuscripts related to contemporary issues in information technology. Any topic related to technology implementation, development, financial justification, or functional evaluation in a business environment is appropriate for publication consideration in the journal. Manuscripts related to enterprise systems (ERP, CRM, SCM, etc.), IT security, big data, cloud computing, etc. are encouraged. Please consider the Journal of Instructional Pedagogies for instructional technology or pedagogical technology applications. This journal is double-blind peer reviewed with an acceptance rate of less than 35%.
Coeditor: Dr. Terry Howard, University of Detroit Mercy.
Curriculum Vitae. Contact: Howard.editor@aabri.com.

Coeditor: Dr. Gregory Ulferts, University of Detroit Mercy
Curriculum Vitae. Contact: Ulferts.editor@aabri.com.
Journal of Technology Research - Review Board
ISSN Online: 1941-3416, Print: 2327-5359

See AABRI Journal Submission Procedures for instructions to authors.

See AABRI Publication Policies and Procedures for information regarding acceptance rates, archiving, review procedures, etc.

The journal is listed in the Cabell's Directory of Publishing Opportunities.
AABRI authors retain copyright to their manuscripts. See the AABRI Copyright Policy for complete details.
JTR is published by the Academic and Business Research Institute. Please see www.aabri.com/procedures.html for AABRI journal submission procedures.
Click on the manuscript name below to read the articles from the Journal of Behavioral Studies in Business. All articles are published in PDF format and require a PDF reader. Download free Adobe PDF reader.

Click to view APA referencing procedures for online journal articles,


Click to order printed editions of AABRI journals. Journal volumes below that are not dated are not yet in print. Do not order.

Volume 11:
Automation adoption decision: A snapshot of attitudes in the USA; Moncef Belhadjali, Norfolk State University; Sami M. Abbasi, Norfolk State University; Gary Whaley, Norfolk State University.

Blockchain implementation: Framework for maintaining digital thread; Carolyn LaMacchia, Bloomsburg University of Pennsylvania.

Drilling down on inter-organizational complexities potentially associated with AIS/IS sophistication An addendum; Michael S. Luehlfing, Louisiana Tech University; M. George Durler, Emporia State University.

Business Data Analytics Framework for Digital Health Informatics; Charles Willow, Monmouth University.

The Comprehensive Big Data Paradigm : Challenges, solutions and the future ; Richard Fulton, Troy University; Diane Fulton, Clayton State University; Nate Hayes, Modal Corporation; Susan Kaplan, Modal Corporation.

The Importance of Data Accuracy and Management in Healthcare; Terry L. Howard, University of Detroit Mercy; Gregory W. Ulferts, University of Detroit Mercy; Mary White, University of Detroit Mercy; Kate A. Kohn-Parrott, University of Detroit Mercy; Mithu Bhattacharya, University of Detroit Mercy; Vaishnavi Srivatsan, University of Detroit Mercy.

Psychological Motivators in the Post-TAM Environment: Convenience and Technology Super-users; James P Downey, University of Central Arkansas; Alexander Chen, University of Central Arkansas; Michael E. Ellis, University of Central Arkansas.


Volume 10 - May 2022:
Big data and analytics programs in the US: A pedagogical analysis; Someswar Kesh, University of Central Missouri; Prasad Rudramuniyaiah, University of Central Missouri; Sam Ramanujan, University of Central Missouri.

A case for network optimization with R; Jerzy Letkowski, Western New England University.

Predicting SaaS virality: A diffusion model; Daphne Simmonds, Metropolitan University of Denver; Ken McDonald, Metropolitan University of Denver; Katia Campbell, Metropolitan University of Denver.

Extending the social network site adoption model; Kevin M. Elliott, Minnesota State University, Mankato; Songpol Kulviwat, Hofstra University; Juan G. Meng, Minnesota State University, Mankato.

Contracts in Agile Software Development Projects; Shekhar Rathor, University of Central Oklahoma; Prasad Rudramuniyaiah, University of Central Missouri.

How intelligent computer systems help us make not-so-good decisions; C.W. Von Bergen, Southeastern Oklahoma State University; Martin S. Bressler, Southeastern Oklahoma State University; Kitty Campbell, Southeastern Oklahoma State University.

Americans and digital knowledge: a snapshot of privacy and security; Moncef Belhadjali, Norfolk State University; Sami M. Abbasi, Norfolk State University.

Role of Technology in Increasing Productivity: As Evidenced by the Current Pandemic; Terry L. Howard, University of Detroit Mercy; Gregory W. Ulferts, University of Detroit Mercy.


Volume 9 - May 2020:
Using conjoint analysis to assess website information utility; Joseph P. Hasley, Metropolitan State University of Denver; Dawn Gregg, University of Colorado Denver.

Factors for cloud computing technology adoption: An exploration of scaling strategies; Christopher B. Davison, Ball State University; Ryan Sims, Ball State University; Brady Sheridan, Ball State University; Silvia Sharna, Ball State University; Justin Bates, Ball State University.

Using the Oklahoma Educational Technology Trust (OETT) Grant to support technology professional development; Jennifer Blackford, Connors State College; Marcia Griffiths-Prince, Walden University; Sunddip Panesar Aguilar, University of St. Augustine.

GDPR: The importance of consent and data protection; Nicole Zluky, Holy Family University; Bernice M. Purcell, Holy Family University.

The tuning of data platform boundary resources: insights from Twitter; Joseph Rubleske, Northern Kentucky University.

How do leaders support data mining and analytics projects?; Richard A. Huebner, Houghton Mifflin Harcourt.

Measuring consumer trust and perceived risk in e-commerce; Joseph P. Hasley, Metropolitan State University of Denver; Andrea J. Hester; Dawn Gregg, University of Colorado Denver.

Are banking customers concerned about cyber security with their financial institution?; James B. Bexley, Sam Houston State University; Karen Sherrill, Sam Houston State University.

Using a Roadmap in the Back Alleys of Dark Data; Vicky Seehusen, Metropolitan State University of Denver; Edgar Maldonado, Metropolitan State University of Denver.


Volume 8 - January 2019:
Twitter-based reporting system for public infrastructure in Saudi Arabia; Abdullah Alsaedi, University of Southampton; Roobae Alroobaea, Taif University, Taif, Saudi Arabia.

Entrepreneurial Growth: Growing Your Online Business in the Digital Era; Todd A. Finkle, Gonzaga University.

An Assessment of Ghana's global E-government UN ranking; Dennis K. Agboh, Morgan State University.

Improving scalability of privacy preserving algorithms ; Carolyn LaMacchia, Bloomsburg University of Pennsylvania.

Technology entrepreneurship: Creating your own online business; Todd A. Finkle, Gonzaga University.

ERP Implementation Satisfaction - A Data Quality Approach; Hongjiang Xu, Butler University.

Beware the evil bots: e-commerce thieves and spreaders of fake news ; Linda A. Bressler, Southeastern Oklahoma State University; Martin S. Bressler, Southeastern Oklahoma State University.


Volume 7 - June 2017:
Predicting consumers attitude toward their Facebook experience: the influence of cognitive and affective factors ; Mark Hall, Minnesota State University, Mankato; Kevin Elliott, Minnesota State University, Mankato; Juan (Gloria) Meng, Minnesota State University, Mankato.

Maintaining professionalism in a social media era; Ricardo Perez, Texas A&M University-Kingsville; LaVonne Fedynich, Texas A&M University-Kingsville.

Health data breaches: The need for information assurance strategy; Emmanuel U Amadi, University of Phoenix.

Exploring efficient privacy preserving technique for association rule data mining; Carolyn LaMacchia, Bloomsburg University of Pennsylvania.

Legal issues in delivering healthcare IT solutions; Archana Indran, H&R Block, Kansas City; Sam Ramanujan, University of Central Missouri; Someswar Kesh, University of Central Missouri.

Social media in the online classroom; Jillian R. Yarbrough, Texas Tech University.

Exploratory aspect-based sentiment analysis approach gauging novel performance from online reviews; Robin Jindal, Indian Institute of Technology Delhi; Nicolle Clements, Saint Joseph s University; Vipul Gupta, Saint Joseph s University.

Choice waves and strategic interaction; Rutherford Cd. Johnson, University of Minnesota Crookston.

Programming case: A methodology for programmatic web data extraction; John N. Dyer, Georgia Southern University.

Beware the unfriendly skies: how drones are being used as the latest weapon in cybercrime; Martin S. Bressler, Southeastern Oklahoma State University; Linda Bressler, Southeastern Oklahoma State University.


Volume 6 - January, 2015:
Teaching undergraduate business IT: Using ERPSIM to provide a real-world perspective; John B. Isett, University of Tampa; Raymond Papp, University of Tampa.

Electronic health record implementation success: lessons learned and best practice, Emmanuel Amadi, University of Phoenix.

Co-occurrence analysis as a framework for data mining, Jan W. Buzydlowski, Holy Family University.

Perceived risk agents in e-commerce environments, C. Michael Powell, University of North Georgia; Christopher A. Conca, Mount Olive College.

Doing database design with MySQL, Jerzy Letkowski, Western New England University.

Drivers and challenges of ICT adoption by SMES in Accra metropolis, Ghana, Dennis K. Agboh, Morgan State University.

Information differences between closed-ended and open-ended survey questions for high-technology products, William Bleuel, Pepperdine University.

Fighting cybercrime calls for developing effective strategy, Richard McMahon, University of Houston-Downtown; Darlene Serrato, Houston Baptist University; Linda Bressler, University of Houston-Downtown; Martin Bressler, Southeastern Oklahoma State University - Durant, TX.

AIS/IS sophistication and inter-organizational complexities, M. George Durler, Emporia State University; Michael S. Luehlfing, Louisiana Tech University.

Nonprofit adaptation to Web 2.0 and digital marketing strategies, Julia C. Krueger, Florida Gulf Coast University; Diana L. Haytko, Florida Gulf Coast University.

Online hotel's sales strategies with emphasis on web booking, Ljubica Pilepic, University of Rijeka, Opatija, Croatia; Maja imunic, Liburnia Riviera Hotels, Opatija, Croatia; Tomislav Car, University of Rijeka, Opatija, Croatia.

Shifting technology paradigm for the film and entertainment industry: Interface modalities, Diane Fulton, Clayton State University; Richard Fulton, Troy University; Thomas Garsombke, Clayton State University.


Volume 5 - October, 2014:
Big data using cloud computing, Bernice M. Purcell, Holy Family University.

The outcomes of user interactions with retail websites: semantics and nomenclature, Joseph Hasley, Metro State University of Denver; Dawn G. Gregg, University of Colorado Denver.

M-Commerce Development in China - Users Perspectives, Hongjiang Xu, Butler University.

The adoption of social media in government agencies: Gulf Cooperation Council case study, Ali H. Al-Badi, Sultan Qaboos University.

Exploring project manager insights about IT project success using Q-methodology, Michael J. Doherty, Marian University.

A comparison of the marketing capabilities of SME websites in Australian and U.S. domains, Stewart Adam, Deakin University, Australia; Michael Featherstone, Jacksonville State University: Kenneth W. H. Day, Jacksonville State University.

Security vulnerabilities of the top ten programming languages: C, Java, C++, Objective-C, C#, PHP, Visual Basic, Python, Perl, and Ruby, Stephen Turner, Known-Quantity.com, part of Turner & Associates, Inc.

Capitalizing on Big Data: Governing information with automated metadata, Stephen Turner, Known-Quantity.com, part of Turner & Associates, Inc.

The impact of multiple master patient index records on the business performance of health care organizations , Cynthia L. Banton, University of Phoenix; David L. Filer, University of Phoenix.

Shared leadership: A critical component in IT Project Management, Chet Stagnaro, Freed Associates; Chris Piotrowski, University of West Florida.

A path analysis model for web application success, Monica Lam, California State University, Sacramento.

Organizational attraction factors: A technology perspective, Linda C. Isenhour, Eastern Michigan University; Kimberly M. Lukaszewski, Wright State University; Dianna L. Stone, University of Texas at San Antonio.


Volume 4 - July, 2013:
Technology leaders vs. laggards, evidence from the credit union industry, Fred H. Hays, University of Missouri-Kansas City; Sidne Gail Ward, University of Missouri-Kansas City.

Use of social media by college students: Relationship to communication and self-concept , Megan Sponcil, Youngstown State University; Priscilla Gitimu, Youngstown State University.

The emergence of big data technology and analytics, Bernice Purcell, Holy Family University.

Investigating the usability of e-catalogues systems: modified heuristics vs. user testing, Amen Ali Alrobai, King Abdulaziz University; Roobaea Salim AlRoobaea, Taif University & University of East Anglia, Norwich, UK; Ali H. Al-Badi, Sultan Qaboos University, Oman & University of East Anglia, Norwich, UK; Pam J. Mayhew, University of East Anglia, Norwich, UK.

The influence of identity characteristics on E-Shopping enjoyment and E-Loyalty among women online shoppers, Tonjia S. Coverdale; University of the Virgin Islands; Allison J. Morgan, Howard University.

E-CRM applications of soccer teams as a strategic tool: a content analysis of English Premier League and Turkish Super League, Metin Argan, Anadolu University; Mehpare Tokay Argan, Bilecik University; H seyin K se, Anadolu University; Sevda G kce, Gaziosmanpasa University.

Managing content for information centers and large repositories using the DITA framework, Alice S. Etim, Winston Salem State University.

Computers and young workers wages in Europe, Dulce Contreras, University of Valencia; Rosario S nchez, University of Valencia; Delfina Soria, University of Valencia.

Improving data security in small businesses, Kent N. Schneider, East Tennessee State University.

A review of biometric experts evaluations of the biometric modalities most likely to effectively combat identity fraud, Galaxy Samson Edo, Capella University.

The process and characteristics of phishing attacks - A small international trading company case study , Qingxiong Ma, University of Central Missouri.

Benefits and risks of cloud computing, Stephen Turner, Known-Quantity.com and Holy Family University.


Volume 3 - July, 2012:
Technology ease of use through social networking media, Michelle Lane, Western Kentucky University; Phillip Coleman, Western Kentucky University.

IPv6 and deep packet inspection, Thomas B. Martin, Holy Family University.

Data differences XBRL versus Compustat, Pavani Tallapally, Slippery Rock University; Michael S. Luehlfing, Louisiana Tech University; Madhu Motha, Butler County Community College.

Nonprofit websites: Adoption and type in census district 8, Dave McMahon, Pepperdine University; Samuel Seaman, Pepperdine University; John Buckingham, Pepperdine University.

Cloud computing and computer forensics for business applications, Ludwig Slusky, California State University; Parviz Partow-Navid, California State University; Mohit Doshi, California State University.

Methodologies, tools, and techniques in practice for Web application development, Monica Lam, California State University, Sacramento.

The mediating effect of perceived media characteristics on shyness and text messaging in cell phone relationships , Yutaka Ueda, Seikei University; Miho Nojima, Seikei University.

Software security assurance a matter of global significance: product life cycle propositions, Doreen (Dee) Sams, Georgia College and State University; Phil Sams, Sr. Load & Performance Engineering Consultant, Milledgeville, Georgia USA.

Using online social networking: Students purposes of Facebook usage at the University of Turkey, Muge Akyildiz, Anadolu University; Metin Argan, Anadolu University.

Concealed Internet traffic and exfiltration: the insider threat and resolution, Thomas B. Martin, Holy Family University & Forensics Inc.; Stephen Leibholz, Forensics Inc.

A qualitative study of an animated representation of firms operating health, Lin Zhao, Purdue University Calumet.

U.K. banking experts as decision-makers: a historical view on banking technologies, Georgios Samakovitis, University of Greenwich.


Volume 2 - September, 2011:   (order printed edition)
Comparing standard toughness through weighted and unweighted scores by three standard setting procedures, Tsai-Wei Huang, National Chiayi University, Taiwan; Ayres G. D Costa, Ohio State University.

Assessing password threats: Implications for formulating university password policies, Melissa Walters, The University of Tampa; Erika Matulich, The University of Tampa.

The perceptions of business students regarding management information systems (MIS) programs, Patrick Hogan, Turner College of Business and Computer Science; Lei Li, Turner College of Business and Computer Science.

Virtual worlds and social networking: reaching the millennials, Raymond Papp, The University of Tampa.

Demographic and psychographic variables and the effect on online student success, Linda Bressler, University of Houston-Downtown; Martin Bressler, Houston Baptist University; Mark Bressler, University of Houston-Clear Lake.

The impact of classroom technology on student behavior, Angeline Lavin, University of South Dakota; Leon Korte, University of South Dakota; Thomas Davies, University of South Dakota.

Factors affecting the adoption of consumer oriented information technology biometrics solutions by the credit union industry, Kevin Scott, Midwestern State University; Charles Johnston, Midwestern State University.

The organizational dynamics of knowledge and IT-enabled innovations, Mahmoud Watad, William Paterson University.

Green data center: how green can we perform?, Ramon Mata-Toledo, James Madison University; Pranshu Gupta, Kansas State University.

Cross-cultural reliability and validity of a scale to measure information technology capability, Man Zhang, Bowling Green State University; Michelle Brodke, Bowling Green State University; Jim McCullough, University of Puget Sound.

Aligning business service management to goals: an integrated approach at BMC Software, Brenda Richardson, BMC Software, Inc.; Ahmed Mahfouz, Prairie View A&M University.

Which is a better choice for student-faculty interaction: synchronous or asynchronous communication?, Lei Li, Columbus State University; John Finley, Columbus State University; Jennifer Pitts, Columbus State University; Rong Guo, Columbus State University.


Volume 1 - April, 2009:   (order printed edition)
CRM in Russia and U.S. - Case Study from AMerican Financial Service Industry, Tom Griffin, Nova Southeastern University;, Tamila Curtis, Nova Southeastern University; Donald Barrere, Nova Southeastern University.

TRUSTWORTHINESS IN COMPUTER-MEDIATED TRANSACTIONS: A CONTENT ANALYSIS OF TRUSTOR FEEDBACK, J. Harold Pardue,University of South Alabama;Jeffrey P. Landry,University of South Alabama;Christopher E. Shaw, University of South Alabama.

The Use of Infrastructure Variables in Explaining CIS Program Satisfaction/Return, Stuart Van Auken, Florida Gulf Coast University;Mark Simkin, University of Nevada Reno; Earl Chrysler, California State University; Ludmilla G. Wells, Florida Gulf Coast University.

Innovative Technological Advances In Modern Club Operations, Denis P. Rudd, Robert Morris University.

Fine-Tuning Useful E-Commerce Practices, Kaylene Williams, California State University, Stanislaus; Edward Hernandez, California State University, Stanislaus; Alfred Petrosky, California State University, Stanislaus; Robert Page, Southern Connecticut State University.

Exploring the Use of E-CRM Elements and Effective Website Design as Tools for Reducing Consumer Post-Purchase Cognitive Dissonance , Paul Clark, Indiana State University; Neel Das, Appalachian State University.

Causes of Conflicts for Local Information Technology Managers in Multinational Companies, Jongtae Yu, Mississippi State University; Jong-Wook Ha, Columbus State University; Dong-Yop Oh, University of Alabama.

IT Strategic Audit Plan, Marc Ackerman, Jacksonville University; Beth Rucker, Jacksonville University; Anecia Wells, Jacksonville University; Joseph Wilson, Jacksonville University; Randy Wittmann, Jacksonville University.

Factor Analysis of the Performance Indices of Information and Communications Technology Projects in the Public Sector of the Nigerian Economy, Charles Akinyokun, Federal University of Technology, Akure, Nigeria; Cleopas Angaye, National Information Technology Development Agency, Abuja, Nigeria; Moses Ubaru, National Information Technology Development Agency, Abuja, Nigeria.

Information Fatigue: The Case of Activity-based Information (ABI) in Decision-making, Aretha Hill, North Carolina A&T State University; Shawnta Friday-Stroud, Florida A&M University.

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors, Hongjiang Xu, Butler University.

The Hypothesis Testing of Decision Making Styles in the Decision Making Process, Nabie Conteh, Shenandoah University.

AABRI Home  | Journals  | Submission Information  | Conferences  | Contact Us | Search AABRI

Academic and Business Research Institute
P.O. Box 2235, Ponte Vedra Beach, FL, 32004, USA
editorial.staff@aabri.com
Phone - (904)435-4330
Dr. Russell Baker, AABRI Executive Director