The Journal of the Southern Association for Information Systems
The editors of the Journal of the Southern AIS are pleased to announce the publication of Volume 9 Issue 1.
The February 2022 issue of JSAIS comprises four regular research papers.
The first research paper entitled Generation Z, Learning Preferences, and Technology: An Academic Technology Framework Based on Enterprise Architecture is by Curtis C. Cain, Allison Morgan Bryant, Carlos D. Buskey, Yuvay Meyers Ferguson of Howard University.
This work provides an overview of Generation X, Y (Millennials), and Z and their characteristics in academia. We present the ways that mobile technology is infused into their lifestyle. We reference how Generation Y and Z in particular expect technology to be integrated into their educational experience, as well as how it helps faculty to facilitate both synchronous and asynchronous learning. Furthermore, an overview is provided of how technology currently contributes to learning and provides a framework for how educators can better engage current students. The conceptual academic technology framework (ATF) put forth in this work will provide an immediate impact in several key areas. This framework enhances structure during course design, which may be based directly on learning outcomes and department/school objectives. It will also directly improve consistency in faculty/student communication by closely monitoring how changes in communication methods have evolved. Finally, we describe how to integrate technology in a meaningful way, in a manner that does not distract students while preparing them for careers in business.
The second paper is entitled Toward Remaking Software Development to Secure It by Jonathan Jenkins of Middle Georgia State University.
Modern software development depends on tools and techniques to represent implied information processing logic to the human engineer, relying chiefly on effortful human reasoning to best determine critical properties of the software system. Current conceptualization, visualization and contextualization of software in development amounts to a significant under-utilization of already limited development resources directed to optimization, prevention, and addressing fundamental security properties of the software system. As a step toward increasing such utilization as a basis for a global ecosystem of secure software, this work explores and evaluates an alternative representation of software source code for the sake of secure development, manifesting universal, critical properties of the system to enhance control of security-determinative factors while the bulk of the properties of the system are being determined and the costly skills of the developer are directed to the many aspects of the task.
The third paper is from Brandis Phillips and Belinda Shipps of North Carolina A&T State University.
As technology becomes more pervasive, it is more accessible to use anytime, anywhere. Although technology has been a savior in many respects, there is a need for awareness of the potential for excessive and problematic technology use (PTU). Prompted by an increase in anxiety, stress, and feelings of isolation, some individuals may be more prone to PTU than others. If not recognized, PTU may become associated with obesity, sleeplessness, a decline in social skills, and deficient performance at school and work. The information systems literature has indicated that a variety of information technology artifacts can lead to PTU. The focus of this research will be to examine the antecedents of PTU, with an emphasis on IS continued use and personality traits. The value of this study is in addressing awareness, recognition, and prevention of PTU and proposing possible factors to consider in regulating the use of technology. The results suggest a significant and positive association between PTU and Information Systems continuance, habit, and personality traits of introversion and neuroticism.
The fourth paper is Mobile Learning Via Mobile Devices in Nigeria Higher Education: Usage Analysis Based on the UTAUT Model from Olumuyiwa Alaba, Olarere Abass and Ebenezer Igwe of the Tai Solarin University of Education.
The recent influx of various technologies has affected all sectors of the human life including education. Mobile learning has emerged with the evolution of mobile devices that has enhanced knowledge sharing via distance education systems. In Nigeria, it has been observed that under-utilization of the technology in higher education institutions (HEIs) is still prevalent. This study investigated the factors hindering the use of mobile devices for mobile-learning by students. Four research questions were formulated based on UTAUT model with nine variables and 391 survey questionnaires were administered on the students in two institutions in Ogun State. Data obtained were analyzed using two multiple regression and path analysis on SPSS 23. Findings showed that the facilitating factor of the mobile device leads other variables on direct effect on the attitude of students towards usage of mobile devices for m-learning. The management of HEIs should provide technical infrastructure supports on the use of mobile devices
Michael Cuellar, Editor
Generation Z, Learning Preferences, and Technology: An Academic Technology Framework Based on Enterprise Architecture
Curtis C. Cain, Allison Morgan Bryant, Carlos D. Buskey, and Yuvay Meyers Ferguson
Toward Remaking Software Development to Secure It
Problematic Technology Use: The impact of personality and continued use
Brandis Phillips and Belinda Shipps
Mobile Learning via Mobile Devices in Nigeria Higher Education: Usage Analysis Based on Utaut Model
Olumuyiwa Alaba, Olalere Abass, and Ebenezer Igwe