The ways people connect, interact, share, and communicate have changed due to recent developments in information technology. These developments, categorized as social media, have captured the attention of business executives, technologists, and education professionals alike, and have altered many business models. Additionally, the concept of social media impacts numerous sub-disciplines within business and has become an important issue with operational, tactical, and strategic considerations. Despite this interest, many business schools do not have courses involving social media technologies and applications. In those that do, the placement and focus of the course varies considerably. This article provides motivation and insight into the process of developing an approach for effectively teaching social media use in business. Additionally, it offers implementation examples of courses taught at three major universities. The article concludes with lessons-learned that will give instructors practical guidance and ensure that social media courses taught in a business school provide students with a solid basis for integrating social media into business practice.
The Two-Step normality transformation has been shown to reliably transform continuous variables toward normality. The procedure offers researchers a capable alternative to more prominent methods, such as winsorization, ranking, and power transformations. We demonstrate its utility in the context of the Productivity Paradox literature stream, which is renowned for inconsistent results. This paper demonstrates that the Two-Step normality transformation, which has not been used in Productivity Paradox research, may produce greater goodness-of-fit and affect theoretical understandings on the topic. We use a classic Productivity Paradox dataset to show that compared to the prominent normality transformations, the Two-Step produces unique findings, including 1) regression coefficients more closely resembling the original data, 2) different effect sizes and significance levels, and 3) strengthening evidence for fundamental theories in Productivity Paradox literature. We demonstrate results that challenge uncertainties about the relationship between IT investment and firm performance. Our results imply that the Two-Step procedure should be considered a viable transformation option in future information systems research.
Global Internet usage has fueled much of the technological innovation seen during the first decade of the twenty-first century. Unsurprisingly, this has led to a commensurate increase in consumption of bandwidth, the measure of how much information the Internet can transmit. However, bandwidth is not an inexhaustible resource. Wired communications require physical infrastructure, requiring considerable investment and construction to expand, and wireless communications require sections of electromagnetic spectrum, which has grown much more crowded. This article examines the current bandwidth situation in light of networking trends and events as of 2010. Findings indicate that, although there is no immediate bandwidth crisis, one may eventually come, especially in the wireless spectrum, and, although technological innovation may provide a considerable hedge against the crippling implications of such a shortage, care must be taken to manage growth in bandwidth usage to maintain it at acceptable levels while accounting for the needs of all concerned parties.
Steganography is the art and science of hiding information. In the digital realm, steganography (which literally means "covered writing"), involves hiding data or messages in digital files and other digital structures. The carriers holding the hidden content may appear to be innocuous, and would be ignored by a casual observer. The field of digital information hiding has grown significantly since the 1990s. Evidence of this growth can be seen at workshops on information hiding and in occasional reports of use by criminals and terrorists as reported in the popular press. In contrast to cryptography where the message is encoded, the purpose of steganography is to hide the fact that a message is being sent. Once encoded, a cryptographically altered message typically appears unrecognizable and would raise suspicions. The primary advantage of steganography over cryptography is that the carriers do not attract attention to themselves, to messengers, or to recipients. Modern information technology enables novice computer users to create steganographic messages, transmit, and unhide them without special expertise. This article presents an overview of steganography's history and the categories of steg methods, followed by a discussion of the application areas for steganography. We also present some technical details of the techniques and software for applying steganography, including some security-related attack issues. Our article concludes with a presentation of some key topics for the reader's consideration.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.