Template-Type: ReDIF-Article 1.0 Author-Name: Vinay Singh Author-X-Name-First: Vinay Author-X-Name-Last: Singh Author-Name: Garima Singh Author-X-Name-First: Garima Author-X-Name-Last: Singh Title: Citizen centric assessment framework for e-governance services quality Abstract: Citizen-centric e-governance services are essential to enhance the quality of life of citizens while ensuring citizen empowerment. The present study proposes a framework of assessing quality of e-governance services from the citizens' perspective to find out the degree of its quality impacting citizen satisfaction. The framework is validated through primary data collected from 213 respondents. Confirmatory factor analysis and structured equation modelling are employed to validate the model. The results depict quality of e-governance service and the information being disseminated to the citizens' impact on their satisfaction significantly. The study contributes a parsimonious model that can significantly contribute in future theoretical advances in e-governance quality assessment. The findings can bridge the gap between government initiatives and citizens' needs. Thus, designing high quality e-governance services while keeping the needs and expectations of citizen in focus translates its functional efficacy. Journal: Int. J. of Business Information Systems Pages: 1-20 Issue: 1 Volume: 27 Year: 2018 Keywords: citizen centric e-governance; e-governance services; citizen satisfaction; quality assessment; information quality; service quality; governance quality. File-URL: http://www.inderscience.com/link.php?id=88568 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:1-20 Template-Type: ReDIF-Article 1.0 Author-Name: Aparna Raman Author-X-Name-First: Aparna Author-X-Name-Last: Raman Author-Name: Sangeeta Shah Bharadwaj Author-X-Name-First: Sangeeta Shah Author-X-Name-Last: Bharadwaj Author-Name: Jaydeep Mukherjee Author-X-Name-First: Jaydeep Author-X-Name-Last: Mukherjee Title: Developing SOA-enabled service agility capabilities: case studies in services industry Abstract: The research paper explores how information technology, specifically service-oriented architecture (SOA)-enabled service agility capabilities, were developed. The paper defines the service agility capabilities (sensing and responding) using dynamic capabilities theory and service dominant logic. In this research, we present two case studies, based on the services sector. This paper explains, 'how' these capabilities were developed by responding organisations. Based on the research results, the propositions were proposed. Further, the model was supported through thematic analysis. The study contributes towards the knowledge base of agility and reveals how SOA-enabled capabilities are developed to achieve agile services. Journal: Int. J. of Business Information Systems Pages: 21-44 Issue: 1 Volume: 27 Year: 2018 Keywords: service agility; capabilities; service-oriented architecture; SOA; environmental turbulence; dynamic capabilities theory. File-URL: http://www.inderscience.com/link.php?id=88569 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:21-44 Template-Type: ReDIF-Article 1.0 Author-Name: Jagannath Singh Author-X-Name-First: Jagannath Author-X-Name-Last: Singh Author-Name: Pabitra Mohan Khilar Author-X-Name-First: Pabitra Mohan Author-X-Name-Last: Khilar Author-Name: Durga Prasad Mohapatra Author-X-Name-First: Durga Prasad Author-X-Name-Last: Mohapatra Title: Code refactoring using slice-based cohesion metrics and aspect-oriented programming Abstract: Software restructuring is essential for maintaining software quality. It is a usual practice that we first design the software and then go for coding. After coding, if there is any change in the requirement or if the output is incorrect, then we have to modify the code again. For each small code modification, it is not feasible to alter the design. These minor changes made to the code causes decay in the software design. Software refactoring is used to restructure the code to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods that require refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we use the concept of <i>aspects</i> to alter the code structure in a manner that does not change the external behaviour of the original module. Journal: Int. J. of Business Information Systems Pages: 45-68 Issue: 1 Volume: 27 Year: 2018 Keywords: software refactoring; program slicing; AOP; cohesion metrics; code restructure; AspectJ. File-URL: http://www.inderscience.com/link.php?id=88570 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:45-68 Template-Type: ReDIF-Article 1.0 Author-Name: K. Lakshmi Madhuri Author-X-Name-First: K. Lakshmi Author-X-Name-Last: Madhuri Author-Name: V. Suma Author-X-Name-First: V. Author-X-Name-Last: Suma Author-Name: Uma Mohan Mokashi Author-X-Name-First: Uma Mohan Author-X-Name-Last: Mokashi Title: A triangular perception of scope creep influencing the project success Abstract: Project management strategies are a part of every organisation as developing high quality customer satisfied software is always one of the challenges for any software organisation. Though the scope creep is known to be one of the factors which influence project success, existing project management strategies do not effectively measure or predict the scope creep. This paper focuses on effective scope creep management which is achievable through a comprehensive analysis of the scope creep and its impact on project success. The paper further presents a case study conducted in one of the leading software companies to investigate the significance and impact of scope creep in the project success. An investigation was carried out on several empirical projects and a three-dimensional visualisation of scope creep on success of project was brought out. This trio visualisation comprises of historical data perspective which leads to visualise the inferences in a pictorial representation perspective. Facts, thus, gained from historical and pictorial data perspectives lead one towards visualisation of scope creep and its management using a mathematical modelling perspective. This mode of visualising the scope creep and its implications on project success ensures one to effectively modulate their strategies in order to develop software products which attain total customer satisfaction. Journal: Int. J. of Business Information Systems Pages: 69-85 Issue: 1 Volume: 27 Year: 2018 Keywords: software engineering; software quality; software metrics; scope creep management; total customer satisfaction. File-URL: http://www.inderscience.com/link.php?id=88571 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:69-85 Template-Type: ReDIF-Article 1.0 Author-Name: Nripendra P. Rana Author-X-Name-First: Nripendra P. Author-X-Name-Last: Rana Author-Name: Yogesh K. Dwivedi Author-X-Name-First: Yogesh K. Author-X-Name-Last: Dwivedi Title: An empirical examination of antecedents determining students' usage of clickers in a digital marketing module Abstract: As more and more educational institutions are integrating new technology such as clickers into their learning system, it becomes increasingly essential to have an understanding of students' perceptions about such technology on their overall learning process. The incorporation of clickers into teaching instructions has created implications for teaching practices and student satisfaction. The purpose of this research is to understand student use and satisfaction with clickers in a large undergraduate digital marketing class in a British university. To do so, we propose a conceptual model based on information systems (IS) success models to understand student's usage behaviour and satisfaction with clickers. The data were analysed based on 138 valid responses gathered from the students, where clickers are effectively used for teaching and learning purposes. The results provided a strong support for all eight hypothesised relationships and adequate variance on its key dependent variables in the proposed research model. Journal: Int. J. of Business Information Systems Pages: 86-104 Issue: 1 Volume: 27 Year: 2018 Keywords: clickers; higher education; IS success models; student; usage; UK. File-URL: http://www.inderscience.com/link.php?id=88572 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:86-104 Template-Type: ReDIF-Article 1.0 Author-Name: Shruti Nagpal Author-X-Name-First: Shruti Author-X-Name-Last: Nagpal Author-Name: Ashok Kumar Author-X-Name-First: Ashok Author-X-Name-Last: Kumar Author-Name: Sunil Kumar Khatri Author-X-Name-First: Sunil Kumar Author-X-Name-Last: Khatri Title: Relative importance of CSF in ERP implementation strategy: a multi-participant AHP approach Abstract: Enterprise resource planning (ERP) systems have found a wide acceptability among organisations, albeit with a pinch of salt. ERP systems appropriately bring about uniformity in the software across the organisation by bringing all the processes under one umbrella. But the low adoption rates and greater time to value are often reasons for low ERP implementation success rates and even ERP implementation failures. Researchers have chronicled various critical success factors (CSF) that determine a successful ERP implementation. This paper utilises multi-participant analytic hierarchy process (AHP) to determine the relative importance of CSF in various ERP implementation strategies. The paper contributes to the existing knowledge of CSF in ERP implementations by showcasing that CSF have varying importance across ERP implementation strategies. Journal: Int. J. of Business Information Systems Pages: 105-122 Issue: 1 Volume: 27 Year: 2018 Keywords: enterprise resource planning; ERP; critical success factors; CSF; analytic hierarchy process; AHP. File-URL: http://www.inderscience.com/link.php?id=88573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:105-122 Template-Type: ReDIF-Article 1.0 Author-Name: Somesh Gaur Author-X-Name-First: Somesh Author-X-Name-Last: Gaur Author-Name: Bala Krishnamoorthy Author-X-Name-First: Bala Author-X-Name-Last: Krishnamoorthy Title: Emergence of multipresence - a theoretical underpinning Abstract: 'Anytime anywhere' and 'immersive' information and communication technologies have penetrated all spheres of our life. Because of these technologies, an individual can be present in multiple environments either real or virtual at a given time or in a time frame. Such technology driven multipresence has emerged as a prominent behavioural phenomenon today. Multipresence might have significant influence on an individual's behaviour as well as on team, organisation and society. Despite being such a prevalent and important behavioural phenomenon, there has been limited research and literature in this area. In this conceptual paper, we explore and refine the concept of multipresence. We start with the exploration of concept of presence, which forms the basis for understanding multipresence. We further discuss various aspects of multipresence from the literature. We also introduce a new revised definition and new concepts about multipresence. Finally, we discuss possible implications of such behaviour on performance of an individual and suggest potential future research opportunities in this area. Journal: Int. J. of Business Information Systems Pages: 123-134 Issue: 1 Volume: 27 Year: 2018 Keywords: presence; multipresence; multitasking; polychronicity; attention sharing; attention switching; technology affordance. File-URL: http://www.inderscience.com/link.php?id=88574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:1:p:123-134 Template-Type: ReDIF-Article 1.0 Author-Name: Nacha Chondamrongkul Author-X-Name-First: Nacha Author-X-Name-Last: Chondamrongkul Title: ERP implementation in university: a case study in Thailand Abstract: Enterprise resource planning (ERP) is considered a proven solution that enhances the organisation's structure, which results in better productivity. Nowadays, universities have many reasons to improve efficiency in administrative operations. Therefore, there are a number of universities that aim to enhance administrative efficiency by implementing an ERP system. However ERP system implementation in the university has a high failure rate because of its unique characteristic. Even though a number of critical success factors have been proposed, there is rare example of how to put them into practice. This paper presents a case study in a Thai university that implements ERP system, which shows how selected critical success factors are taken into practice throughout implementation process. A combination of semi-structured interviews and survey questionnaires are used as research methods to observe and analyse implementation process in the university environment. The study shows software learnability as a significant challenge that causes problems in the post-implementation phase. Also, the study highlights an ERP system as the foundation for the development of forthcoming IT system. Journal: Int. J. of Business Information Systems Pages: 177-192 Issue: 2 Volume: 27 Year: 2018 Keywords: enterprise resource planning; ERP; university; critical success factor; CSF; Thailand. File-URL: http://www.inderscience.com/link.php?id=89109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:177-192 Template-Type: ReDIF-Article 1.0 Author-Name: Bhim Sain Singla Author-X-Name-First: Bhim Sain Author-X-Name-Last: Singla Author-Name: Himanshu Aggarwal Author-X-Name-First: Himanshu Author-X-Name-Last: Aggarwal Title: Evaluation of Indian universities' websites in terms of information quality: differences in the perspectives of end users segments based on their socio-demographic characteristics Abstract: Today, with the advent of web technologies, there has been a sea of change in the business scenario of not only the commercial organisations but also the higher education institutions. The organisational goals can be achieved more easily and efficiently by reaching out to a vast population through this medium. The educational institutes can provide quick and reliable services to the stakeholders of these websites within the shortest span of time and limited financial resources. However, the benefits to be derived from such websites rest more on their content quality in accordance with the requirements and expectations of the end users. Thus, this study is a modest attempt to evaluate the content quality of Indian universities' websites through the perspectives of end users based on their demographic variables such as gender, age, education and status. The study is based on primary data which has been collected through a well-structured and pre-tested questionnaire from the respondents. The findings are extremely significant for the Indian universities as the improved quality of their websites would help them to attract more and more number of students for admission, and in improving their ranking. Journal: Int. J. of Business Information Systems Pages: 135-176 Issue: 2 Volume: 27 Year: 2018 Keywords: content categories; customer satisfaction; effective website; end users; importance versus performance; information quality; India; service quality; universities' websites; website quality. File-URL: http://www.inderscience.com/link.php?id=89110 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:135-176 Template-Type: ReDIF-Article 1.0 Author-Name: Govindarajan Saravanan Author-X-Name-First: Govindarajan Author-X-Name-Last: Saravanan Author-Name: M.J.S. Rangachar Author-X-Name-First: M.J.S. Author-X-Name-Last: Rangachar Title: Data mules-oriented particle swarm optimisation-based mobile sink data gathering techniques with analytical data analysis using linear regression Abstract: Wireless sensor networks with converge-cast nature poses great challenge on data collection strategies. In order to cut down the issues on constrained resources of wireless nodes, a sink-based (PSOMSDG) particle swarm optimisation-based mobile sink data gathering had been proposed. This PSOMSDG is a rendezvous-based protocol which uses three metrics for data gathering based on the nodes position as; when the nodes are in inertia; when they change to optimistic position (based on current scenario); finally when they change to swarms' optimistic position. These three metrics avoid long detour path by providing global optimal length constrained trajectory. In addition, residual energy consumption of protocol was achieved in a balanced manner. The performance is noticed with increasing data rates and compared with biased sink mobility with adaptive stop times (BSMAST). Then data was obtained with NS2 simulation which was developed into a linear regression model. Finally, the analytical study states that there is a strong relationship between data rate and energy consumption. The analysis of variance (ANOVA)-based analysis shows that there is a strong influence between groups. Journal: Int. J. of Business Information Systems Pages: 193-204 Issue: 2 Volume: 27 Year: 2018 Keywords: PSOMSDG; residual energy consumption; ANOVA regression. File-URL: http://www.inderscience.com/link.php?id=89111 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:193-204 Template-Type: ReDIF-Article 1.0 Author-Name: Kiran Bala Nayar Author-X-Name-First: Kiran Bala Author-X-Name-Last: Nayar Author-Name: Vikas Kumar Author-X-Name-First: Vikas Author-X-Name-Last: Kumar Title: Cost benefit analysis of cloud computing in education Abstract: Application of cloud computing in education not only relieves the educational institutions from the burden of handling the complex IT infrastructure management as well as maintenance activities, but also leads to huge cost savings. Along with many industry sectors, education sector would be largely benefited by adopting cloud services. Cloud promises to deliver affordable, reliable and flexible computing solutions to the education sector and enable it to compete more effectively with bigger organisations. The motive of this paper is to analyse the approach that has been followed to identify the benefits and limitations of cloud computing. Specific case of a lab setup has been taken to illustrate the financial aspects. A comparative analysis of cloud-based hosting versus conventional (on-premise) application deployment has also been presented. Journal: Int. J. of Business Information Systems Pages: 205-221 Issue: 2 Volume: 27 Year: 2018 Keywords: cloud computing challenges; information and communication technology; ICT; total cost of investment; TCO; return of investment; ROI; cost factors; ROI factors. File-URL: http://www.inderscience.com/link.php?id=89112 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:205-221 Template-Type: ReDIF-Article 1.0 Author-Name: Wasim Qazi Author-X-Name-First: Wasim Author-X-Name-Last: Qazi Author-Name: Syed Ali Raza Author-X-Name-First: Syed Ali Author-X-Name-Last: Raza Author-Name: Nida Shah Author-X-Name-First: Nida Author-X-Name-Last: Shah Title: Acceptance of e-book reading among higher education students in a developing country: the modified diffusion innovation theory Abstract: This study explores the students' intention towards the e-book adoption in Pakistan by using the modified diffusion innovation theory. Student attitude, awareness, perceived innovation characteristics (PIC) are taken as independent variables; actual usage is taken as a dependent variable, whereas intention plays the role of the mediator in the relationship. The data is collected through five-point Likert questionnaire from 620 university students. The confirmatory factor analysis (CFA), partial least square structure equation modelling (PLS-SEM) has been applied. The results show that compatibility, complexity, observability, trialability, attitude and awareness has a significant positive effect on behavioural intention, whereas, relative advantage has an insignificant effect on behavioural intention. Moreover, behavioural intention creates a significant positive effect on actual usage. This study will be useful in understanding the factors associated with the adoption of e-book reading. This work will help the managers to understand the role of PIC in adoption of new product or technology. Journal: Int. J. of Business Information Systems Pages: 222-245 Issue: 2 Volume: 27 Year: 2018 Keywords: e-book reading; modified innovation diffusion theory; actual usage; Pakistan. File-URL: http://www.inderscience.com/link.php?id=89113 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:222-245 Template-Type: ReDIF-Article 1.0 Author-Name: Purnendu Mandal Author-X-Name-First: Purnendu Author-X-Name-Last: Mandal Title: Decision modelling in evaluating information management strategy in manufacturing industry Abstract: Information technologies are exerting ever increasing influences on corporate growth and profitability. However, very little is understood of the mechanisms through which information technologies impact upon long-term organisational growth. We hypothesised several relationships between information technologies and organisational financial performance. We then analysed those relationships through a structural equation model (SEM) using data collected for a national survey of US manufacturing companies. The major findings of the research are: an organisation's financial performance is dependent on its information management and technology management strategies; knowledge management strategies indirectly influence financial performance. These findings are important in framing long-term strategies for sustainable development. Journal: Int. J. of Business Information Systems Pages: 246-263 Issue: 2 Volume: 27 Year: 2018 Keywords: organisational performance; information management strategy; IMS; technology management strategy; TMS; knowledge management strategy; PLS analysis; mediating effect. File-URL: http://www.inderscience.com/link.php?id=89114 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:246-263 Template-Type: ReDIF-Article 1.0 Author-Name: Emmanuel C. Ogu Author-X-Name-First: Emmanuel C. Author-X-Name-Last: Ogu Author-Name: Amos Benita Author-X-Name-First: Amos Author-X-Name-Last: Benita Author-Name: Edy-Ewoh Uduakobong Author-X-Name-First: Edy-Ewoh Author-X-Name-Last: Uduakobong Title: Cognisant computing and 'lean' practices: interactions with 21st century businesses and implications Abstract: Cognisant computing and 'lean' practices portend great promises for savvy businesses of the 21st century, with the potential to create huge savings and returns, guarantee global competitiveness, enhance efficiency of manufacturing and process chain operations, and boost financial performance, productivity and products' market performance. Until now, the nexus between these twain paradigms remained blurred, with very little knowledge of how both can be combined and harnessed to ensure business success in the 21st century. The dawn of the Industry 4.0 revolution necessitates that these twain concepts be re-investigated to uncover a possible nexus between them that could guarantee the success, competitive advantage and sustainability of businesses in the industrial revolution. This study utilises the exploratory research methodology due to the relatively new and emergent nature of the domain of discourse. Cognisant computing is introduced, illuminating prospects for businesses, and how 'lean' practices could be integrated to guarantee business success. Journal: Int. J. of Business Information Systems Pages: 264-275 Issue: 2 Volume: 27 Year: 2018 Keywords: cognisant computing; business operations; Industry 4.0 revolution; business information technology; lean manufacturing; lean practices; computing; businesses; 21st century; sustainability; productivity; process chain. File-URL: http://www.inderscience.com/link.php?id=89115 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:2:p:264-275 Template-Type: ReDIF-Article 1.0 Author-Name: Behrouz Zarei Author-X-Name-First: Behrouz Author-X-Name-Last: Zarei Author-Name: Kasra Amanati Author-X-Name-First: Kasra Author-X-Name-Last: Amanati Author-Name: Amir Hossein Ghapanchi Author-X-Name-First: Amir Hossein Author-X-Name-Last: Ghapanchi Title: Investigating drivers of user acceptance of electronic treasury: a case study Abstract: Using information technology to increase efficiency and transparency in public expenditure management can have a great impact on production, collection, processing and providing reliable reports for policy-makers. Thus, it is very important to identify factors which impact the adoption of this technology. The conceptual model of this study is based on the trust and risk model in electronic government (e-government) adoption. In this study, the constructs of perceived ease of use from technology acceptance model (TAM) and optimism bias have been added to the trust and risk model. Using a 'descriptive-survey' method, a sample of 36 top budget managers has been examined. A questionnaire was used to collect the required data. Structural equation modelling using partial least squares was used to test the model. Based on the results, disposition to trust, trust of the e-treasury system, perceived ease of use and optimism bias explained the adoption of electronic treasury system among top budget managers. Disposition to trust and perceived ease of use also affected trust positively. Journal: Int. J. of Business Information Systems Pages: 277-297 Issue: 3 Volume: 27 Year: 2018 Keywords: e-treasury; trust; risk; optimism bias; ease of use. File-URL: http://www.inderscience.com/link.php?id=89858 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:277-297 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad Hamdi Al Khasawneh Author-X-Name-First: Mohammad Hamdi Al Author-X-Name-Last: Khasawneh Author-Name: Ahmed Shuhaiber Author-X-Name-First: Ahmed Author-X-Name-Last: Shuhaiber Title: Developing and validating a comprehensive model of factors influencing consumer acceptance of SMS advertising: empirical evidence using SEM-PLS Abstract: This study examined consumers' acceptance of SMS advertising, as one of the mobile marketing instruments that is increasingly popular in accessing consumers through their mobile devices, by empirically investigating the factors that influence consumers' attitudes towards and acceptance of SMS advertising. A comprehensive model was developed and tested with a sample size of 321 Jordanian mobile phone users, and analysed quantitatively using structural equation modelling-partial least squares (SEM-PLS) method. The findings indicated that SMS advertising values (entertainment and credibility) and SMS content (clarity and relevancy) as well as subjective norm and consumer control have a positive significant influence on consumer attitude and acceptance of SMS advertising. The results represent novel findings that hold important implications and recommendations for future marketing research and practice. Journal: Int. J. of Business Information Systems Pages: 298-330 Issue: 3 Volume: 27 Year: 2018 Keywords: consumer acceptance; mobile marketing; SMS advertising; SMS messages. File-URL: http://www.inderscience.com/link.php?id=89859 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:298-330 Template-Type: ReDIF-Article 1.0 Author-Name: Arif Abdelwhab Ali Author-X-Name-First: Arif Abdelwhab Author-X-Name-Last: Ali Author-Name: P.D.D. Dominic Author-X-Name-First: P.D.D. Author-X-Name-Last: Dominic Title: The influence of technological factors on individual's intention towards knowledge sharing practice Abstract: Knowledge sharing has been receiving the highest concern among knowledge management processes. In fact, the practice of knowledge sharing in an organisation is influenced by employees' intention for sharing knowledge. This paper investigates the influence of knowledge sharing systems and Web 2.0 on the individual's intention for knowledge sharing. Likewise, this paper examines the impact of knowledge sharing intention on the practice of knowledge sharing in organisations, particularly in oil and gas industry. Accordingly, a model was proposed, and research hypotheses were developed. Data were collected using a survey method. Measurements were verified through reliability analysis. Preliminary statistical analysis were completed. Then, structural equation modelling approach was used to evaluate the research model and test the hypotheses. The findings indicated that both knowledge sharing systems and Web 2.0 platform positively influence knowledge sharing intention. Besides, the intention to share knowledge has a positive influence on the knowledge sharing practice within organisations. Journal: Int. J. of Business Information Systems Pages: 331-348 Issue: 3 Volume: 27 Year: 2018 Keywords: knowledge sharing; knowledge sharing intention; knowledge sharing practice; knowledge sharing systems; Web 2.0 technology. File-URL: http://www.inderscience.com/link.php?id=89860 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:331-348 Template-Type: ReDIF-Article 1.0 Author-Name: S. Umamaheswaran Author-X-Name-First: S. Author-X-Name-Last: Umamaheswaran Author-Name: N. Suresh Kumar Author-X-Name-First: N. Suresh Author-X-Name-Last: Kumar Author-Name: K. Ganesh Author-X-Name-First: K. Author-X-Name-Last: Ganesh Author-Name: S. Nagarajan Author-X-Name-First: S. Author-X-Name-Last: Nagarajan Title: New local sedec pattern descriptor for improving the retrieval efficiency in content-based image retrieval Abstract: In this paper, a novel content-based image retrieval (CBIR) method is proposed using the local sedec pattern (LScP). The local binary pattern (LBP) and the local ternary pattern (LTP), encode the relationship between the referenced pixel and its surrounding pixels, by computing gray-level difference, but in a different way. The proposed methods encode the relationship between the centre pixel and its neighbours, based on directions such as vertical, horizontal and diagonal. Calculation based on first order derivatives is used here. Second order derivative is also applied to obtain LScP. The performance of the proposed method is compared with the LTrP and other local pattern (LBP, LDP and LTP) which results are obtained using benchmark image databases viz., Corel 1000 database (DB1), Brodatz texture database (DB2). Performance of the LScP shows improvement in retrieval from 75.9%/48.7% to 86.52%/54.4% in DB1, for average precision/average recall as compared with LTrP and other local patterns. A similar comparison shows improvement from 85.30% to 91.5% in terms of average retrieval rate on database DB2. Journal: Int. J. of Business Information Systems Pages: 349-366 Issue: 3 Volume: 27 Year: 2018 Keywords: content-based image retrieval; CBIR; local sedec patterns; LScPs; local tetra patterns; LTrPs. File-URL: http://www.inderscience.com/link.php?id=89861 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:349-366 Template-Type: ReDIF-Article 1.0 Author-Name: Santhi Venkatraman Author-X-Name-First: Santhi Author-X-Name-Last: Venkatraman Author-Name: R. Prasanthini Author-X-Name-First: R. Author-X-Name-Last: Prasanthini Title: Optimal sentence clustering for web database using hierarchical fuzzy relational clustering integrated with artificial bee colony algorithm Abstract: Sentence clustering plays a vital role in text mining and text processing activities. The proposed work is a novel hierarchical fuzzy relational clustering algorithm (HFRECA) capable of identifying sub clusters. It has features of both hierarchical clustering and fuzzy clustering in which it uses page rank to form multiple clusters present in text documents containing hierarchical structure. To enhance the quality of the clusters formed, an optimisation algorithm which is called artificial bee colony (ABC) algorithm is used along with it. The proposed algorithm identifies the sub clusters and finely tunes the cluster to show a better optimised result. Journal: Int. J. of Business Information Systems Pages: 367-382 Issue: 3 Volume: 27 Year: 2018 Keywords: sentence clustering; page rank; fuzzy relational clustering algorithm; FRECA; artificial bee colony algorithm. File-URL: http://www.inderscience.com/link.php?id=89862 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:367-382 Template-Type: ReDIF-Article 1.0 Author-Name: Sahar Afshan Author-X-Name-First: Sahar Author-X-Name-Last: Afshan Author-Name: Arshian Sharif Author-X-Name-First: Arshian Author-X-Name-Last: Sharif Author-Name: Nazneen Waseem Author-X-Name-First: Nazneen Author-X-Name-Last: Waseem Author-Name: Reema Frooghi Author-X-Name-First: Reema Author-X-Name-Last: Frooghi Title: Internet banking in Pakistan: an extended technology acceptance perspective Abstract: The growing attractiveness of internet banking is contributing well in the success and growth process of banking sector around the world (Xu et al., 2009). This study examines the integrative framework of internet banking (IB) in Pakistan using technology acceptance model (TAM) with the integration of several risk dimensions and initial trust model. The techniques of both exploratory and confirmatory factor analyses are employed to assess the reliability and validity of the measurement model. The structural equation modelling method was also applied to investigate the hypothetical framework with the help of literature's recommended goodness-of-fit measurements. The findings of the study found significant contribution of personal propensity to trust, structural assurance, and familiarity with bank in influencing initial trust of people to accept IB. The findings are beneficial for banks that are pursuing IB in formulating strategies of enhancing user's acceptance of internet banking in Pakistan. Journal: Int. J. of Business Information Systems Pages: 383-410 Issue: 3 Volume: 27 Year: 2018 Keywords: internet banking; technology acceptance model; TAM; risk dimensions; initial trust; Pakistan. File-URL: http://www.inderscience.com/link.php?id=89863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:3:p:383-410 Template-Type: ReDIF-Article 1.0 Author-Name: Vinay Singh Author-X-Name-First: Vinay Author-X-Name-Last: Singh Author-Name: Anurag Singh Author-X-Name-First: Anurag Author-X-Name-Last: Singh Author-Name: Divya Jain Author-X-Name-First: Divya Author-X-Name-Last: Jain Author-Name: Vimal Kumar Author-X-Name-First: Vimal Author-X-Name-Last: Kumar Author-Name: Pratima Verma Author-X-Name-First: Pratima Author-X-Name-Last: Verma Title: Patterns affecting structural properties of social networking site 'Twitter' Abstract: Online social networking platforms are kind of complex networks where users are treated as nodes for interactions among them. Understanding such complex network is critical to enhance their existing frameworks and important to incorporate new future applications. Thus, a mixing network pattern is possible due to the diversified geographic locations on user. The present study is focused on measuring assortativity coefficient of network complexity and its effect on the structural properties of the network. We examined crawled users data (group wise) gathered from 'Twitter' by using open source API. Among the group, all the users are ranked according to their followers count. As part of algorithmic process, the assortativity coefficient is calculated in various steps by removing few nodes randomly from the existing network group. It is found that network is resilient to the deletion of highest degree nodes and assortativity is indeed present in network. Journal: Int. J. of Business Information Systems Pages: 411-432 Issue: 4 Volume: 27 Year: 2018 Keywords: mixing patterns; assortativity coefficient; robustness; dynamics of a network; homophily. File-URL: http://www.inderscience.com/link.php?id=90286 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:411-432 Template-Type: ReDIF-Article 1.0 Author-Name: Guilherme B.M. Salles Author-X-Name-First: Guilherme B.M. Author-X-Name-Last: Salles Author-Name: Marcelo Fantinato Author-X-Name-First: Marcelo Author-X-Name-Last: Fantinato Author-Name: Vitor Almeida Barros Author-X-Name-First: Vitor Almeida Author-X-Name-Last: Barros Author-Name: João Porto De Albuquerque Author-X-Name-First: João Porto De Author-X-Name-Last: Albuquerque Title: Evaluation of the StrAli-BPM approach: strategic alignment with BPM using agreements in different levels Abstract: Business process modelling languages do not usually represent non-functional requirements, focusing only on the functional ones. In order to fill this gap, the StrAli-BPM (strategic alignment with BPM) approach was presented. StrAli-BPM is divided in BLA@BPMN and BLA2SLA: the former extends BPMN to embody non-functional requirements through business level agreements (BLAs); the latter supports the creation of a set of service level agreements (SLAs) based on a particular BLA. This paper describes the results obtained with the evaluation of StrAli-BPM. The approach was evaluated by a proof of concept, based on prototype tools, which enabled us to verify its technical applicability. Moreover, a survey was conducted, in qualitative terms, with a panel of experts. As a result, StrAli-BPM was well accepted by the experts who judged it as important and necessary to completely cover the BPM lifecycle. Some lessons learned from both evaluations are presented. Journal: Int. J. of Business Information Systems Pages: 433-465 Issue: 4 Volume: 27 Year: 2018 Keywords: strategic alignment; business process management; BPM; business process model and notation; BPMN; non-functional requirements; business level agreement; BLA; key performance indicator; KPI; service level agreement; SLA; service-oriented architecture; SOA; WS-Agreement. File-URL: http://www.inderscience.com/link.php?id=90287 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:433-465 Template-Type: ReDIF-Article 1.0 Author-Name: Plavini Punyatoya Author-X-Name-First: Plavini Author-X-Name-Last: Punyatoya Author-Name: Anurag Satpathy Author-X-Name-First: Anurag Author-X-Name-Last: Satpathy Author-Name: Arjun Agrawal Author-X-Name-First: Arjun Author-X-Name-Last: Agrawal Title: Factors driving consumer loyalty intention towards e-tailers: an integrated model Abstract: Online shopping has emerged as one of the most important e-commerce applications in recent years. However, there is limited empirical research which has examined factors driving Indian consumers' loyalty intention towards e-tailers. Thus, this study proposed and tested a model that examines the effect of perceived website quality, security and privacy policy, shared value, and perceived e-tailer reputation on online consumer's trust, perceived risk, satisfaction, and loyalty intention in India. Data were collected from Indian online consumers and analysed using structural equation modelling. The results showed that perceived website quality has a strong positive effect on customer satisfaction. Data further demonstrate that security and privacy policy, and perceived e-tailer reputation directly influence e-trust. Online shopper's previous satisfaction with an e-tailer also builds e-trust and thus, decreases perceived risk. When a consumer is more satisfied with an e-tailer and has stronger trust on the same, this will lead to higher loyalty intention towards the e-tailer. These findings have interesting implications for website designers and online retailers. Finally, we discuss some limitations of our study and directions for future research. Journal: Int. J. of Business Information Systems Pages: 466-492 Issue: 4 Volume: 27 Year: 2018 Keywords: e-tailer; perceived website quality; PWQ; security and privacy policy; SPP; shared value; perceived e-tailer reputation; PETR; customer satisfaction; e-trust; perceived risk; customer loyalty intention; India. File-URL: http://www.inderscience.com/link.php?id=90288 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:466-492 Template-Type: ReDIF-Article 1.0 Author-Name: Vinaysingh Chawan Author-X-Name-First: Vinaysingh Author-X-Name-Last: Chawan Title: Enhancing revenue management systems performance with CRM systems data Abstract: Revenue management systems (RMS) and customer relationship management (CRM) systems are widely used in today's data enriched environments to improve a firm's profitability. Though these systems are used to improve business profitability, their approach and evolution are different, as a result of which these systems are being used separately. In case of RMS, the focus is on short term tactical revenue optimisation, whereas in case of CRM the focus is on developing long term customer relationships. This paper discusses some ways of enhancing performance of revenue management systems by using CRM data. Synergies and conflicts that may arise with the simultaneous use of these systems are discussed, and numerous applications that help in enhancing RMS performance are suggested. Journal: Int. J. of Business Information Systems Pages: 493-511 Issue: 4 Volume: 27 Year: 2018 Keywords: revenue management; customer relationship management; CRM; enhancing performance; CRM metrics. File-URL: http://www.inderscience.com/link.php?id=90289 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:493-511 Template-Type: ReDIF-Article 1.0 Author-Name: Ziad Khamis Rashid El-Tah Author-X-Name-First: Ziad Khamis Rashid Author-X-Name-Last: El-Tah Author-Name: Mohammed-Issa Riad Mousa Jaradat Author-X-Name-First: Mohammed-Issa Riad Mousa Author-X-Name-Last: Jaradat Title: The big five personality traits and their relationship with the intensity of using Facebook: a developing country perspective Abstract: There is a remarkable increase in the usage of the social networking sites worldwide especially among young people, which has become a lifestyle. This study examines the role of the big five personality traits and their relationship with the intensity of using Facebook in a developing country perspective like Jordan. A paper-based questionnaire was used to collect the data and the WarpPLS 5.0 software was utilised to test the data using a population sample (N = 260). The results show that the intensity of using Facebook is negatively affected by the three personality traits (neuroticism, agreeableness and conscientiousness) and positively affected by extraversion, meanwhile openness has no significant effect in the current analysis. This study also examines the moderating influence of gender, academic study level, college type and age on the relationships between the big five personality traits and the intensity of using Facebook. Furthermore, with respect to the addictive tendencies, the results revealed that the amount of average usage per day exceeds the benchmark of Facebook addiction. Journal: Int. J. of Business Information Systems Pages: 512-537 Issue: 4 Volume: 27 Year: 2018 Keywords: Facebook; big five personality traits; gender; academic study level; college; age; intensity of using Facebook; Facebook addiction; Jordan. File-URL: http://www.inderscience.com/link.php?id=90290 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:512-537 Template-Type: ReDIF-Article 1.0 Author-Name: Abdel-Rahman Al-Ghuwairi Author-X-Name-First: Abdel-Rahman Author-X-Name-Last: Al-Ghuwairi Author-Name: Zaher Salah Author-X-Name-First: Zaher Author-X-Name-Last: Salah Author-Name: Ayoub Alsarhan Author-X-Name-First: Ayoub Author-X-Name-Last: Alsarhan Author-Name: Shatha Al Qudah Author-X-Name-First: Shatha Al Author-X-Name-Last: Qudah Author-Name: Ghadeer Al Qahmous Author-X-Name-First: Ghadeer Al Author-X-Name-Last: Qahmous Author-Name: Aladdin Baarah Author-X-Name-First: Aladdin Author-X-Name-Last: Baarah Author-Name: Ahmad Al-Oqaily Author-X-Name-First: Ahmad Author-X-Name-Last: Al-Oqaily Title: Monitoring and modelling service level agreement of multiple virtual machines in cloud computing Abstract: Service level agreement (SLA) is a contract between cloud computing customer and provider. Improving the customers' trust with cloud computing requires monitoring and ensuring the quality of the provided services continuously. Therefore, this paper provides a model for monitoring the SLA which belongs to the same customer and a specific provider of multiple virtual machines (VMs) in the same environment. The core foundations for this model are: SLA, quality of service (QoS) parameters, multiple VMs and violations' penalty assessment. The proposed model monitors the QoS parameters within multiple VMs environment dynamically and checks for any violation. Moreover; the penalty for each violation will be calculated and informed to the customer and provider at the same time. The proposed model depends on the time factor while running the VMs in sequentially manner with a short period of time as a gap between each VM. This model prevents any interception between VMs and can maintain synchronisation. Journal: Int. J. of Business Information Systems Pages: 538-553 Issue: 4 Volume: 27 Year: 2018 Keywords: cloud computing; service level agreement; SLA; quality of service; QoS; multiple virtual machines; VM's; violation penalty; monitoring; modelling; information systems; business. File-URL: http://www.inderscience.com/link.php?id=90293 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:27:y:2018:i:4:p:538-553 Template-Type: ReDIF-Article 1.0 Author-Name: Chaitali Uikey Author-X-Name-First: Chaitali Author-X-Name-Last: Uikey Author-Name: D.S. Bhilare Author-X-Name-First: D.S. Author-X-Name-Last: Bhilare Title: RBACA: role-based access control architecture for multi-domain cloud environment Abstract: Cloud computing is an emerging area as a new arrangement of wide-area distributed computing. Sharing of resources and services over the network are heterogeneous, dynamic, and multi-domain. Security issue is also a serious problem in a cloud computing environment. Similarly, access control and authorisation are an important aspect of the security. The paper proposes a scalable access control architecture and authorisation, for cloud computing environment. A new access control architecture is proposed which is based on traditional access control, role-based access control (RBAC) model. The paper provides a flexible framework for policy announcement management approach for a multi-domain cloud environment. A policy language (XACML) is used for the demonstration of access control policies. This provides a general and standard provision of different resources and services. Journal: Int. J. of Business Information Systems Pages: 1-17 Issue: 1 Volume: 28 Year: 2018 Keywords: cloud computing; multi-domain architecture; role based access control; control architecture. File-URL: http://www.inderscience.com/link.php?id=91160 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:1-17 Template-Type: ReDIF-Article 1.0 Author-Name: Nawfal El Moukhi Author-X-Name-First: Nawfal El Author-X-Name-Last: Moukhi Author-Name: Ikram El Azami Author-X-Name-First: Ikram El Author-X-Name-Last: Azami Author-Name: Aziz Mouloudi Author-X-Name-First: Aziz Author-X-Name-Last: Mouloudi Title: Towards a new method for designing multidimensional models Abstract: Designing a data warehouse as a support of the decision-making process remains a complex task and a major challenge for companies and organisations. This complexity is principally due to data sources that are heterogeneous and to the absence of a conventional method for modelling the data warehouse. This paper analyses the most important data warehouse design methods; it enumerates key strengths, limitations for each method, and presents a new design approach that allows to construct multidimensional schemas from relational models by using the model driven architecture (MDA) techniques. This new approach will be able to produce good quality multidimensional schemas in an automated and standardised way. Journal: Int. J. of Business Information Systems Pages: 18-41 Issue: 1 Volume: 28 Year: 2018 Keywords: decision support system; DSS; data warehouse; data warehousing; relational models; multidimensional models; design methods; designing data warehouses; model driven architecture; MDA. File-URL: http://www.inderscience.com/link.php?id=91161 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:18-41 Template-Type: ReDIF-Article 1.0 Author-Name: Alok Khatri Author-X-Name-First: Alok Author-X-Name-Last: Khatri Author-Name: D. Garg Author-X-Name-First: D. Author-X-Name-Last: Garg Author-Name: G.S. Dangayach Author-X-Name-First: G.S. Author-X-Name-Last: Dangayach Title: An empirical investigation of agility factors in select Indian manufacturing industries Abstract: In the era of dynamic and customised demand, the organisations cannot be rigid. Rigidity can be reduced by adopting agile manufacturing paradigm. The objective of this study was to identify chief predictors of agile manufacturing and to distinguish agile developers and enablers. The survey-based study has been conducted to identify and pinpoint factors of agility to help managers to identify the areas to be focused. A hypothetical agile manufacturing framework has been proposed. The study indicates that nine hypothesised factors have statistically significant relationship with agility. Linear regression model has been developed to recognise agile manufacturing predictors. Linear regression model equation of agile manufacturing has been compared and tested with the mean value of agility. The results obtained from linear regression model and survey was found to be in close proximity. Further using principal component analysis, proposed empirical framework has been restructured as per empirical results of study. Journal: Int. J. of Business Information Systems Pages: 42-66 Issue: 1 Volume: 28 Year: 2018 Keywords: agile manufacturing; agility enabler; agility developer; hypothesis testing linear regression model; principal component analysis; India. File-URL: http://www.inderscience.com/link.php?id=91162 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:42-66 Template-Type: ReDIF-Article 1.0 Author-Name: Pradeep Kumar Author-X-Name-First: Pradeep Author-X-Name-Last: Kumar Title: Sequence clustering approach for clustering web user session Abstract: Clustering web usage data is useful to discover interesting patterns pertaining to user traversals, behaviour and their usage characteristics. It is also useful for trend discovery as well as for building personalisation and recommendation engines. Since web is dynamic, clustering web user transactions results in arbitrary shapes. Moreover, users accesses web pages in an order in which they are interested and hence incorporating sequence nature of their usage is crucial for clustering web transactions. In this paper, we present an approach to cluster web usage sequence data and removing noise using DBSCAN algorithm. We also study the impact of clustering process when both sequence and content information is incorporated while computing similarity measure. We use sequence and set similarity (S<SUP align="right"><SMALL>3</SMALL></SUP>M) measure to capture both the order of occurrence of page visits and the page information itself, and compared the results with Euclidean distance and Jaccard similarity measures. The inter-cluster and intra-cluster distances are computed using average Levensthein distance (ALD) to demonstrate the usefulness of the proposed approach in the context of web usage mining. Journal: Int. J. of Business Information Systems Pages: 67-78 Issue: 1 Volume: 28 Year: 2018 Keywords: sequence clustering; web usage data; similarity measures; average Levensthein distance; ALD. File-URL: http://www.inderscience.com/link.php?id=91163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:67-78 Template-Type: ReDIF-Article 1.0 Author-Name: M. Santhanakumar Author-X-Name-First: M. Author-X-Name-Last: Santhanakumar Author-Name: C. Christopher Columbus Author-X-Name-First: C. Christopher Author-X-Name-Last: Columbus Author-Name: K. Jayapriya Author-X-Name-First: K. Author-X-Name-Last: Jayapriya Title: Multi term based co-term frequency method for term weighting in information retrieval Abstract: Nowadays, World Wide Web (WWW) has become the only source of all kind of information. Retrieving the relevant web pages based on user queries from WWW is an exigent task. Term frequency inverse document frequency (TF-IDF) is the most frequently used method for term weighting based on the occurrences and presence of a term inside the document. Retrieved document based on a single query term may not relate to the user search. This may lead the user to process the unwanted information. So, this paper proposes a new term weighting method named co-term frequency, in which the weight is assigned according to the multi terms which commonly occur in all documents. From the measures of precision, recall and F-score of the proposed method, it is clearly evident that the proposed framework retrieves the most relevant web pages when compared to other term weighting methods. Journal: Int. J. of Business Information Systems Pages: 79-94 Issue: 1 Volume: 28 Year: 2018 Keywords: inverse document frequency; IDF; co-term frequency; CTF; term weighting; World Wide Web; WWW; precision; term frequency; F-score; recall. File-URL: http://www.inderscience.com/link.php?id=91164 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:79-94 Template-Type: ReDIF-Article 1.0 Author-Name: Amer Alzaidi Author-X-Name-First: Amer Author-X-Name-Last: Alzaidi Author-Name: Shahzad Qamar Author-X-Name-First: Shahzad Author-X-Name-Last: Qamar Title: Factors affecting the adoption of internet banking: a systematic literature review Abstract: Recent developments and trends in information and communication technology (ICT) have significant impact on financial institutions such as banks. Internet banking (IB) referred to the use of ICT by customers for performing different banking related tasks. The objective of this study is to identify the factors, which are affecting the adoption of IB. A systematic literature review (SLR) methodology is adopted for conducting this research work. Our SLR included 122 papers selected from six digital libraries, i.e., Google Scholar, Emerald Insight, Science Direct, IEEE Xplore, Springer Link and ACM, published between 1999 and 2015. We classified 122 papers in the years, in which they were published, country in which research was conducted and the methodologies used in the papers. Based on the analysis of 122 papers, we identified 44 factors affecting the adoption of IB. Ease of use, security, ease of usefulness, trust and prior IT knowledge are consider critical among 44 factors. IB adoption is still a hot topic for research because the interest of researchers is still there to work on the factors affecting the adoption of IB. Journal: Int. J. of Business Information Systems Pages: 95-124 Issue: 1 Volume: 28 Year: 2018 Keywords: internet banking; adoption factors; systematic literature review; SLR. File-URL: http://www.inderscience.com/link.php?id=91165 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:1:p:95-124 Template-Type: ReDIF-Article 1.0 Author-Name: Ricardo Santa Author-X-Name-First: Ricardo Author-X-Name-Last: Santa Author-Name: Mario Ferrer Author-X-Name-First: Mario Author-X-Name-Last: Ferrer Author-Name: Liliyana Makarova Jørsfeldt Author-X-Name-First: Liliyana Makarova Author-X-Name-Last: Jørsfeldt Author-Name: Annibal Scavarda Author-X-Name-First: Annibal Author-X-Name-Last: Scavarda Title: The impact of the quality of the service from IS/IT departments on the improvement of operational performance: the point of view of users of technological innovations Abstract: The purpose of this article is to examine how the provision of services from information systems/information technology (IS/IT) departments helps organisations to achieve reliable operations and improvements in operational performance in the view of the users. Structural equation modelling (SEM) was used to examine structural relationships between the set of observed variables and the set of continuous latent variables from responses of a sample of 138 individuals from large service organisations in Australia that had recently implemented enterprise information systems (EIS). The results suggest that there is no direct influence of the quality of the service from IS/IT departments on the improvement of operational performance, but there is an indirect relationship through the achievement of operational effectiveness. The findings also suggest that focusing solely on the effectiveness of the technological innovation is detrimental to long-term operational benefits. Journal: Int. J. of Business Information Systems Pages: 125-146 Issue: 2 Volume: 28 Year: 2018 Keywords: service quality; system effectiveness; operational effectiveness; improvement of operational performance; enterprise systems. File-URL: http://www.inderscience.com/link.php?id=91860 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:125-146 Template-Type: ReDIF-Article 1.0 Author-Name: Ashutosh Pandey Author-X-Name-First: Ashutosh Author-X-Name-Last: Pandey Author-Name: Rajendra Sahu Author-X-Name-First: Rajendra Author-X-Name-Last: Sahu Author-Name: Manoj Kumar Dash Author-X-Name-First: Manoj Kumar Author-X-Name-Last: Dash Title: Social media marketing impact on the purchase intention of millennials Abstract: During the last decade we have seen an enormous growth of new channel of interaction i.e., social media such as Facebook, Twitter and YouTube, where people can share their feelings, likes, dislikes publicly in the forum. Social media is emerging as a new sophisticated and uncontrollable element influencing consumer behaviour. They have also changed the way now businesses and consumers communicate with each other by instigating a power shift from business towards consumers. Due to a widespread use of social media, publicly as a medium of marketing communication, it is the need of time to examine the social media marketing (SMM) empirically. From past relevant studies three constructs namely eWOM, attitude toward social media advertising and peer communication has been identified and through it, an attempt has been made to find out the effect of all these mediums of SMM on purchase intention of millennial consumers. Journal: Int. J. of Business Information Systems Pages: 147-162 Issue: 2 Volume: 28 Year: 2018 Keywords: social media; marketing; eWOM; peer communication; purchase intention. File-URL: http://www.inderscience.com/link.php?id=91861 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:147-162 Template-Type: ReDIF-Article 1.0 Author-Name: Rekha Pal Author-X-Name-First: Rekha Author-X-Name-Last: Pal Author-Name: Tanvi Anand Author-X-Name-First: Tanvi Author-X-Name-Last: Anand Author-Name: Sanjay Kumar Dubey Author-X-Name-First: Sanjay Kumar Author-X-Name-Last: Dubey Title: Evaluation and performance analysis of classification techniques for thyroid detection Abstract: Thyroid is one of the most common disease found in people nowadays which occur due to disorder of thyroid gland that include hypothyroidism (inactive thyroid gland) and hyperthyroidism (hyperactive thyroid gland) that can take place at any age and in either sex. Therefore their prior diagnosis and detection is very crucial and helpful for the betterment of human life. Large amount of complex data is collected by the healthcare sector in order to identify hidden patterns for effective identification, detection and decision making. Data mining has become a current trend for achieving effective diagnostic result from massive dataset by classifying applicable and unique patterns in data. The aim of the paper is to present an extensive analysis of different classification techniques viz. naive Bayes, SVM, and K-nearest neighbour (K-NN) on the basis of dimensionality reduction for detection of thyroid disease. Results are provided to select best thyroid disease detection technique. The analysis reflected that K-NN is performing better than other classifier on the basis of various parameters. This analysis will help to identify the best algorithm for such diseases and give better preventive options in advance. Journal: Int. J. of Business Information Systems Pages: 163-177 Issue: 2 Volume: 28 Year: 2018 Keywords: classification techniques; disease; data mining; dimension reduction. File-URL: http://www.inderscience.com/link.php?id=91862 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:163-177 Template-Type: ReDIF-Article 1.0 Author-Name: Richa Das Author-X-Name-First: Richa Author-X-Name-Last: Das Author-Name: Chandan Bhar Author-X-Name-First: Chandan Author-X-Name-Last: Bhar Title: System dynamics-based approach to manpower planning: a study of Indian microfinance institutions Abstract: The purpose of this paper is to analyse the manpower planning process of Indian microfinance institutions (MFIs). The paper describes a model that can assist management of MFIs to deal with the challenges microfinance organisations face in case of manpower planning. In this study, a system dynamics-based model has been developed for manpower planning and the model estimates the requirement of staff members and executives at different levels under various scenarios that will help the organisation in designing effective strategy to successfully manage their human resource strategically. The research methodology is in accordance with the principles of system dynamics. The model has been developed using iThink software and has been validated by computing root mean square error between the actual values of the variables and the model generated values. The study will help the microfinance organisations to plan, manage and strategically focus on manpower planning in its desired direction. Journal: Int. J. of Business Information Systems Pages: 178-195 Issue: 2 Volume: 28 Year: 2018 Keywords: system dynamics; simulation; manpower planning; microfinance institutions; staffs; executives. File-URL: http://www.inderscience.com/link.php?id=91863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:178-195 Template-Type: ReDIF-Article 1.0 Author-Name: Vijay V. Raghavan Author-X-Name-First: Vijay V. Author-X-Name-Last: Raghavan Author-Name: Ben Martz Author-X-Name-First: Ben Author-X-Name-Last: Martz Author-Name: Morgan Shepherd Author-X-Name-First: Morgan Author-X-Name-Last: Shepherd Title: Comprehending visualisations of dense rank order data: a comparison of alternate presentation formats Abstract: This study compared two tabular presentations and one graphical presentation of the same rank order data to study differences in participant comprehension. Hypothetical raw voting data by ten different judges ranking ten states on the desirability of each state as a preferred place for retirement was used. Three sets of the data were constructed for the voting scenario with low, high and moderate levels of consensus. The summary data was a table (TABULAR) representing the total count of votes for each rank (first place through tenth place) for all ten states. It was also presented as a 3D cone infographic (GRAPHICAL) and raw voting data (RAW). Participants were asked to estimate the level of agreement (0.00 to 1.00) indicated by each presentation. The results showed that the graphical and tabular presentations differed in participant comprehension for low and moderate levels of agreement but not for high levels of agreement. Journal: Int. J. of Business Information Systems Pages: 196-213 Issue: 2 Volume: 28 Year: 2018 Keywords: analytics; rank-order data; visualisations; pedagogy; experiential learning. File-URL: http://www.inderscience.com/link.php?id=91864 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:196-213 Template-Type: ReDIF-Article 1.0 Author-Name: Mahmoud Mohammad Migdadi Author-X-Name-First: Mahmoud Mohammad Author-X-Name-Last: Migdadi Author-Name: Abdel Raouf Dado Author-X-Name-First: Abdel Raouf Author-X-Name-Last: Dado Author-Name: Othman Al Safadi Author-X-Name-First: Othman Al Author-X-Name-Last: Safadi Author-Name: Hisham Shadid Author-X-Name-First: Hisham Author-X-Name-Last: Shadid Title: Online car parking booking system: the case of Jordan Abstract: With the increase in population and economic development of modern society of world, more and more people have cars of their own. The result is that traffic jam is more often than ever before. What is worse, in the increasingly crowded cities is the possibility of not finding safe parking lot especially in such crowded areas which could be a frustrating experiment. As parking facilities grow large, drivers need advanced methods of parking to reduce inefficiencies in finding spaces. A solution to reduce the drivers' searching time for vacant car-park lots will greatly save time, reduce cost and improve the traffic flow in the car park areas. To this end, the researchers has created a web-based application (including PHP and MySQl server) which aims at providing its users (the drivers) several benefits-when they utilise it - such as provide real-time parking spot availability information in order to book a safe parking space any time and from any place, save them time and efforts, subscribe and pay electronically. In addition, the system allows parking owners and/or mangers to manage their own parking spaces bookings and subscriptions more efficiently. Journal: Int. J. of Business Information Systems Pages: 214-245 Issue: 2 Volume: 28 Year: 2018 Keywords: car parking; parking space management; web-based application; system analysis and design; Jordan. File-URL: http://www.inderscience.com/link.php?id=91865 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:214-245 Template-Type: ReDIF-Article 1.0 Author-Name: V.P. Sumathi Author-X-Name-First: V.P. Author-X-Name-Last: Sumathi Author-Name: Kittusamy Kousalya Author-X-Name-First: Kittusamy Author-X-Name-Last: Kousalya Author-Name: V. Vanitha Author-X-Name-First: V. Author-X-Name-Last: Vanitha Author-Name: J. Cynthia Author-X-Name-First: J. Author-X-Name-Last: Cynthia Title: Crowd estimation at a social event using call data records Abstract: Segregating attendees of the event from other regular visitor, paves way for new applications such as measuring event success and outdoor advertising. Traditional methods of crowd estimation at points of interests such as shopping malls, cinema halls, stadium and exhibitions using sample analysis of visitor through participant count obtained by number of tickets sold. In unstructured (free-to-view) event, the above said method does not help in accurate crowd estimation and social analysis. The objective of this paper is using call data records to estimate the crowd at an unstructured event in a city. The study was conducted at Indian Institute of Science (IISc) campus, Bengaluru on a special event day. To avoid breach of privacy, anonymised call data records have been used. The crowd estimated using call data records shows positive correlation with ground truth-value. Journal: Int. J. of Business Information Systems Pages: 246-261 Issue: 2 Volume: 28 Year: 2018 Keywords: social analysis; crowd estimation; call data records; CDRs; unstructured event; free-to-view event; attendance estimation. File-URL: http://www.inderscience.com/link.php?id=91866 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:2:p:246-261 Template-Type: ReDIF-Article 1.0 Author-Name: Zeeshan Ali Siddiqui Author-X-Name-First: Zeeshan Ali Author-X-Name-Last: Siddiqui Author-Name: Kirti Tyagi Author-X-Name-First: Kirti Author-X-Name-Last: Tyagi Title: Identification and classification of parameters affecting service selection efforts in SOA-based applications Abstract: In recent past, service-oriented architecture (SOA) has evolved as a standard approach of software application development in the business world of information technology. The reason for its popularity lies in its ability to adopt the traditionally developed software applications and provide their functionality as services. Selection of a service from a pool of services, that can fulfil users' capabilities requirements from different service providers, is a challenging core task. Selection of a service is eventually been decided by evaluation of quality of service (QoS) parameters based on user's business requirements, and budget available. This paper presents identification and classification of significant parameters, based on previous literature, that affect service selection in SOA-based applications (SOABAs) along with their definition and relation with service selection effort under the research question, "what are the significant parameters that affect service selection efforts in SOABA?". Journal: Int. J. of Business Information Systems Pages: 236-283 Issue: 3 Volume: 28 Year: 2018 Keywords: service-oriented architecture; SOA; service selection; parameters; factors; efforts; effort estimation. File-URL: http://www.inderscience.com/link.php?id=92526 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:236-283 Template-Type: ReDIF-Article 1.0 Author-Name: Nahlah M. Shatnawi Author-X-Name-First: Nahlah M. Author-X-Name-Last: Shatnawi Title: Bees algorithm and support vector machine for Malaysian license plate recognition Abstract: Nowadays the increasing use of vehicles in modern life raises the problem of designing techniques that support effective traffic monitoring and vehicle identification. License plate recognition is an advanced machine vision technology used to identify vehicles by their license plates without direct human intervention. License plate recognition system major steps include image capturing, preprocessing, segmentation, feature extraction and classification. In this paper, a complete system for Malaysian license plate recognition is proposed to handle special Malaysian license plates under different conditions. In the proposed system, peak signal to noise ratio (PSNR) and bees algorithm is used in preprocessing and segmentation stages, Sobel method for edge detection, and support vector machine for classification. The proposed system is applied to dataset that is consisted of 1,216 grey scale images, and is compared with different methods in segmentation and classification. Results show the robustness of the proposed system, making them suitable for more real world applications. Journal: Int. J. of Business Information Systems Pages: 284-298 Issue: 3 Volume: 28 Year: 2018 Keywords: image processing; segmentation; plate recognition; bees algorithm; support vector machine; SVM. File-URL: http://www.inderscience.com/link.php?id=92527 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:284-298 Template-Type: ReDIF-Article 1.0 Author-Name: Vinay Singh Author-X-Name-First: Vinay Author-X-Name-Last: Singh Author-Name: Dheeraj Kumar Purohit Author-X-Name-First: Dheeraj Kumar Author-X-Name-Last: Purohit Author-Name: Vimal Kumar Author-X-Name-First: Vimal Author-X-Name-Last: Kumar Author-Name: Pratima Verma Author-X-Name-First: Pratima Author-X-Name-Last: Verma Author-Name: Ankita Malviya Author-X-Name-First: Ankita Author-X-Name-Last: Malviya Title: Predictive auto-completion for query in search engine Abstract: The main goal of this research is to model an approach to give top-k predictive search results in search engine by the use of a combination of algorithmic and probabilistic approach and compare their processing time. Modified edit distance algorithm is used for spell auto-correction and prefix tree is used for auto-completion. Intersecting union list algorithm is also used for multi-query predictive results. Wikipedia dictionary words are used for a single word query dataset and Internet Movie Database (IMDB) movie list is crawl by a python crawler, which is built for this research. And the rating of the movie provided by IMDB and frequency of each word is used to rank words. Journal: Int. J. of Business Information Systems Pages: 299-314 Issue: 3 Volume: 28 Year: 2018 Keywords: auto-complete; prefix tree; hashing; auto-correction; internet movie database; IMDB; query auto-completion; QAC; prefix; search engine. File-URL: http://www.inderscience.com/link.php?id=92528 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:299-314 Template-Type: ReDIF-Article 1.0 Author-Name: Oscar Avila Author-X-Name-First: Oscar Author-X-Name-Last: Avila Author-Name: Kelly Garcés Author-X-Name-First: Kelly Author-X-Name-Last: Garcés Title: Preventing business and information technology misalignment when introducing technology changes Abstract: Organisations introduce changes in order to adapt themselves to the extremely changing context. These changes often impact information technology (IT) and business domains. In most of the cases, the scope of the organisational elements in these domains requiring adaptation is not well defined, leaving out elements, which can lead to misalignment. Thus, it is important to know the impact scope with the purpose of performing a full adaptation. When reviewing the literature in the business-IT alignment research field, we found that there are no works dealing with this aspect. However, several works in adjacent areas have studied change management. In this paper, we report a systematic review of related work in these areas and extract a set of clues applicable to the business-IT alignment domain which results in a change analysis framework and a set of rules to estimate impact scope and potential adaptation. Framework elements and rules are illustrated by means of an industrial case study. Journal: Int. J. of Business Information Systems Pages: 315-341 Issue: 3 Volume: 28 Year: 2018 Keywords: change management; information technology; business-IT alignment; strategic alignment; prevent misalignment.. File-URL: http://www.inderscience.com/link.php?id=92529 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:315-341 Template-Type: ReDIF-Article 1.0 Author-Name: Masood Ul Hassan Author-X-Name-First: Masood Ul Author-X-Name-Last: Hassan Author-Name: Asghar Iqbal Author-X-Name-First: Asghar Author-X-Name-Last: Iqbal Author-Name: Zeeshan Iqbal Author-X-Name-First: Zeeshan Author-X-Name-Last: Iqbal Title: Factors affecting the adoption of internet banking in Pakistan: an integration of technology acceptance model and theory of planned behaviour Abstract: The use of internet banking in Pakistan is third largest mode in e-banking after real time online banking (RTOB) and automated teller machine (ATM) and it is evolving with an impressive pace and creates its space among other mode of e-banking. Therefore, this study examined the factors that affect the adoption of internet banking in Pakistan through the theoretical lenses of technology acceptance model (TAM) and theory of planned behaviour (TPB). Structural equation modelling (SEM) with the help of smart-PLS was used to examine the hypothesised relationships among the proposed constructs. A questionnaire survey was used for data collection. The study results confirmed the applicability of TAM and TPB frameworks in predicting the adoption of internet banking by Pakistani bank costumers. Practically, this study guides the strategic decision makers of banking industry especially of Pakistan to develop strategies that will help to increase the adoption of internet banking in Pakistan. Journal: Int. J. of Business Information Systems Pages: 342-370 Issue: 3 Volume: 28 Year: 2018 Keywords: technology acceptance model; TAM; theory of planned behaviour; TPB; behaviour; Pakistani banks; structural equation modelling; SEM. File-URL: http://www.inderscience.com/link.php?id=92530 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:342-370 Template-Type: ReDIF-Article 1.0 Author-Name: Vikas Kumar Author-X-Name-First: Vikas Author-X-Name-Last: Kumar Author-Name: Prasann Pradhan Author-X-Name-First: Prasann Author-X-Name-Last: Pradhan Title: Comprehensive three-layer trust management model for public cloud environment Abstract: Public cloud offerings are gaining a lot of popularity as they offer consistent savings to the users by their pay-as-you-go model. Parties involved in public cloud transactions may be unknown to each other, however the users need to access the services of unknown cloud providers or third parties and even handover their significant data. Then the genuineness of the service providers or users becomes the most important concern. An established trust between the parties can help in creating sustainable transactions as well as long lasting business relations. To manage and build the trust, there is a strong need of trust management mechanism, which can fulfil the requirements from both the customer and provider perspective. Present work proposes a three-layer trust management model in public cloud environment, which can accomplish the expectations from both the viewpoints and can also support in building a long-term trustworthy relationships between them. Journal: Int. J. of Business Information Systems Pages: 371-391 Issue: 3 Volume: 28 Year: 2018 Keywords: cloud computing; trust; trust management. File-URL: http://www.inderscience.com/link.php?id=92531 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:3:p:371-391 Template-Type: ReDIF-Article 1.0 Author-Name: Neesha Jothi Author-X-Name-First: Neesha Author-X-Name-Last: Jothi Author-Name: Wahidah Husain Author-X-Name-First: Wahidah Author-X-Name-Last: Husain Author-Name: Nur'Aini Abdul Rashid Author-X-Name-First: Nur'Aini Abdul Author-X-Name-Last: Rashid Author-Name: Lee Ker Xin Author-X-Name-First: Lee Ker Author-X-Name-Last: Xin Title: Predicting generalised anxiety disorder among women using decision tree-based classification Abstract: Mental health presents as one of the greatest challenges to the current generation. It has been reported that about 5% of the population in developed countries are affected by generalised anxiety disorder (GAD) with women twice as likely to be affected as compared to men. Predicting GAD among women is no longer an arduous task especially with the assistance of data mining technology. In this paper, a methodology encompassing data collection, data pre-processing, data analysis and data mining process using random forest approach is drawn for an effective prediction. The random forest approach is one of the classification data mining techniques which is embedded with good predictive characteristic. The result of this study in term of accuracy, sensitivity and specificity conforming to its high predictive performance in GAD prediction based on depressive symptoms. Besides that, several popular machine learning techniques are also applied to the resultant dataset of this study and the comparison result attests to random forest algorithm outperformed other methods. The generated prediction model is expected to provide an effective screening process to detect generalised anxiety disorder earlier among women in Malaysia. Journal: Int. J. of Business Information Systems Pages: 75-91 Issue: 1 Volume: 29 Year: 2018 Keywords: data mining; data mining in healthcare; generalised anxiety disorder; GAD; random forest. File-URL: http://www.inderscience.com/link.php?id=93998 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:75-91 Template-Type: ReDIF-Article 1.0 Author-Name: Ashraf H. Aljammal Author-X-Name-First: Ashraf H. Author-X-Name-Last: Aljammal Author-Name: Hani Bani-Salameh Author-X-Name-First: Hani Author-X-Name-Last: Bani-Salameh Author-Name: Ahmad Qawasmeh Author-X-Name-First: Ahmad Author-X-Name-Last: Qawasmeh Author-Name: Ayoub Alsarhan Author-X-Name-First: Ayoub Author-X-Name-Last: Alsarhan Author-Name: Ahmed Fawzi Otoom Author-X-Name-First: Ahmed Fawzi Author-X-Name-Last: Otoom Title: A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment Abstract: As the cloud datacentres are exposed to various types of attacks, data theft/leakage is considered one of the vital attacks that may affect datacentres credibility. In this paper, a new technique is proposed to store the user's data in an encrypted form in the cloud datacentre via a third party encryption server. Therefore, the attackers and the datacentre authorities will be able to deal only with an encrypted form of the data. Furthermore, to decrypt the data, they need to know the encryption algorithm as well as the encryption key which is in turn placed on a third party encryption server. In addition, using third party encryption server (TPED) will lead to reducing the workload on both the cloud servers and the data owner's machine. Journal: Int. J. of Business Information Systems Pages: 393-403 Issue: 4 Volume: 28 Year: 2018 Keywords: data encryption; cloud privacy preserving; network security; information security. File-URL: http://www.inderscience.com/link.php?id=93654 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:393-403 Template-Type: ReDIF-Article 1.0 Author-Name: Shree Ranjan Author-X-Name-First: Shree Author-X-Name-Last: Ranjan Author-Name: Vijay Kumar Jha Author-X-Name-First: Vijay Kumar Author-X-Name-Last: Jha Author-Name: Pralay Pal Author-X-Name-First: Pralay Author-X-Name-Last: Pal Title: Critical success factors in ERP implementation in Indian manufacturing enterprises: an exploratory analysis Abstract: Enterprise resource planning (ERP) implementation projects involve complex processes which influence operations and performance of companies. It is essential to identify critical success factors (CSFs) of ERP implementation projects out of several contributing factors. In most large original equipment manufacturer (OEM) organisations, ERP systems have replaced legacy information systems with integrated and maintainable software. In an attempt to understand what the CSFs are, why they are critical, and to what extent they are relevant to such OEM organisations this paper explores the existing literature empirically to research the CSFs that lead to the success of ERP, which is our basic objective. We conducted exploratory factor analysis (EFA) in the context of ERP implementation in large manufacturing organisation. The findings of the results provide valuable insights for the researchers, practitioners and managers interested in adopting ERP systems in similar environments, which is also an objective of our research. Journal: Int. J. of Business Information Systems Pages: 404-424 Issue: 4 Volume: 28 Year: 2018 Keywords: enterprise resource planning; ERP; critical success factors; CSF; exploratory factor analysis; EFA. File-URL: http://www.inderscience.com/link.php?id=93655 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:404-424 Template-Type: ReDIF-Article 1.0 Author-Name: Ranjeet Kumar Ranjan Author-X-Name-First: Ranjeet Kumar Author-X-Name-Last: Ranjan Author-Name: N. Parimala Author-X-Name-First: N. Author-X-Name-Last: Parimala Title: A bottom-up approach for creating goal hierarchy using OLAP query recommendation technique Abstract: Traditionally, data warehouses have been designed guided by an analysis of the underlying data sources. On the other hand, goal-oriented approaches build a goal decomposition structure which is further mapped to a data warehouse model. Goal-oriented approaches address the requirements of the decision makers. In this paper, we propose to build a goal decomposition structure for traditional data warehouses. As a result it can be assessed whether the existing data warehouse model satisfies the decision makers' requirements. The approach is bottom-up wherein the tasks are identified first and the path to the strategic goal is built later. The tasks themselves are identified using OLAP query recommendation technique. Journal: Int. J. of Business Information Systems Pages: 425-446 Issue: 4 Volume: 28 Year: 2018 Keywords: data analysis; data warehousing; online analytical processing; OLAP; multidimensional expressions; MDX; goal decomposition; goal hierarchy; strategic rationale diagram; query recommendation; cosine similarity; similarity measure. File-URL: http://www.inderscience.com/link.php?id=93656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:425-446 Template-Type: ReDIF-Article 1.0 Author-Name: Sangharatna Godboley Author-X-Name-First: Sangharatna Author-X-Name-Last: Godboley Author-Name: Arpita Dutta Author-X-Name-First: Arpita Author-X-Name-Last: Dutta Author-Name: Durga Prasad Mohapatra Author-X-Name-First: Durga Prasad Author-X-Name-Last: Mohapatra Title: Reduced energy consumption for MC/DC testing Abstract: After deployment, testing and validation techniques have become an important requirement for the reliability of software. However, these techniques do not measure energy that they consume, which is also an important parameter for software systems with short energy budgets. In this paper, we propose a new energy conservation technique. This novel technique does not affect the coverage percentage, but reduces the energy consumption. Energy conservation is based on test case minimisation technique according to modified condition/decision coverage (MC/DC) requirements. Our experimental study shows that, as compared to existing work, our proposed approach achieves less energy consumption. On an average of five programs, we save 40.8% energy consumption. Journal: Int. J. of Business Information Systems Pages: 447-467 Issue: 4 Volume: 28 Year: 2018 Keywords: energy consumption; green software engineering; green software testing; modified condition/decision coverage; MC/DC. File-URL: http://www.inderscience.com/link.php?id=93657 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:447-467 Template-Type: ReDIF-Article 1.0 Author-Name: Pragati Priyadarshinee Author-X-Name-First: Pragati Author-X-Name-Last: Priyadarshinee Author-Name: Manoj Kumar Jha Author-X-Name-First: Manoj Kumar Author-X-Name-Last: Jha Author-Name: Rakesh D. Raut Author-X-Name-First: Rakesh D. Author-X-Name-Last: Raut Author-Name: Manoj G. Kharat Author-X-Name-First: Manoj G. Author-X-Name-Last: Kharat Title: To measure the business performance through cloud computing adoption in Indian scenario: structural equation modelling Abstract: The purpose of this research article is to measure the business performance through cloud computing adoption in Indian industries. Data collection was done through a questionnaire-based survey that was completed by 660 managers from Indian industries. The derived hypotheses were tested using structural equation modelling. The results show that six out of eight hypotheses were supported for cloud computing adoption to measure business performance. The research model has been tested empirically through three phases: exploratory factor analysis (EFA), confirmatory factor analysis (CFA) and structural equation modelling (SEM). The findings are: 1) trust is having a major impact on cloud computing adoption followed by perceived IT security risk, technology innovation, risk analysis, management style; 2) usage of technology and industry use are having very insignificant effect on cloud adoption rate. This research identified 'trust' as a major factor influencing the cloud adoption rate. Journal: Int. J. of Business Information Systems Pages: 468-503 Issue: 4 Volume: 28 Year: 2018 Keywords: cloud computing adoption; business performance; exploratory factor analysis; EFA; confirmatory factor analysis; CFA; structural equation modelling; SEM; Indian industries. File-URL: http://www.inderscience.com/link.php?id=93658 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:468-503 Template-Type: ReDIF-Article 1.0 Author-Name: K. Sridharan Author-X-Name-First: K. Author-X-Name-Last: Sridharan Author-Name: P. Sivakumar Author-X-Name-First: P. Author-X-Name-Last: Sivakumar Title: A systematic review on techniques of feature selection and classification for text mining Abstract: Nowadays, there is a quick development in the use of internet. The large amount of structured, unstructured and semi-structured forms like videos, images, audio or texts, can be shared and used on the internet by users. The main analysis of text mining is as follows: pre-processing, feature dimension reduction (feature selection or feature extraction) and text classification, clustering on the final features. In this paper, pre-processing is a step, context sensitive stemmer used to remove the stop words, different suffixes by means to reduce the words count. The unsupervised and supervised feature selection methods like document frequency, term strength, chi-square and information gain are compared to produce the best method for the web document feature selection. The classification techniques like latent semantic analysis, genetic algorithm, Rocchio's algorithm and neural networks are also compared with systematic reviews. Journal: Int. J. of Business Information Systems Pages: 504-518 Issue: 4 Volume: 28 Year: 2018 Keywords: information gain; IG; document frequency; DF; term strength; TS; artificial neural network; latent semantic analysis; LSA; text mining; stemming. File-URL: http://www.inderscience.com/link.php?id=93659 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:28:y:2018:i:4:p:504-518 Template-Type: ReDIF-Article 1.0 Author-Name: Wan Nooraishya Wan Ahmad Author-X-Name-First: Wan Nooraishya Wan Author-X-Name-Last: Ahmad Author-Name: Nazlena Mohamad Ali Author-X-Name-First: Nazlena Mohamad Author-X-Name-Last: Ali Title: A user study on trust perception in persuasive technology Abstract: A wide range of persuasive technologies has been developed for many different issues to assist people in changing their attitude or behaviour. However, whether or not users trust persuasive technology and which trust perception affects them more in making trust decision are yet to be found out. Therefore, this study aimed to examine users' trust level and its trust perceptions using two types of persuasive technologies, for example, health application and educational games on the environmental issues. The questionnaire is used as an instrument to measure trust level and trust perceptions. A pre-and-post-test approach is used to study 25 participants who are required to use both types of persuasive technology concurrently for six weeks. The finding shows that the users' trust is at low-level, indicating a significant lack of trust problem. Cognitive trust dominates the trust decision-making though it is correlated with affective trust. Journal: Int. J. of Business Information Systems Pages: 4-22 Issue: 1 Volume: 29 Year: 2018 Keywords: trust; cognitive; affective; persuasive technology. File-URL: http://www.inderscience.com/link.php?id=93999 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:4-22 Template-Type: ReDIF-Article 1.0 Author-Name: Deborah Libu Paris Author-X-Name-First: Deborah Libu Author-X-Name-Last: Paris Author-Name: Mahadi Bahari Author-X-Name-First: Mahadi Author-X-Name-Last: Bahari Author-Name: Noorminshah A. Iahad Author-X-Name-First: Noorminshah A. Author-X-Name-Last: Iahad Title: Business to customer (B2C) e-commerce implementation process: a case study experience in fashion and apparel business in Malaysia Abstract: Despite various studies conducted on the implementation of business-to-customer (B2C) e-commerce, prior studies presumed that the B2C e-commerce implementation as a 'plug and play' exercise rather than a process-based. This paper presents a framework for the implementation process of B2C e-commerce in a fashion and apparel business. Based on qualitative research approach using a case study and summary of experience, a framework for the implementation process of B2C e-commerce is proposed. The model describes the characteristics of 14 implementation factors that occurred during Lewin's and Kotter's phases of implementation. Although the model's generalisability is limited, it offers a guideline for the existing and future senior managers of B2C e-commerce in fashion and apparel business. This model helps managers to identify the highlights in each phase of the B2C e-commerce implementation process. Journal: Int. J. of Business Information Systems Pages: 92-105 Issue: 1 Volume: 29 Year: 2018 Keywords: implementation process; business-to-customer (B2C); e-commerce; Kotter's model; Lewin's model; case study; Malaysia. File-URL: http://www.inderscience.com/link.php?id=94000 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:92-105 Template-Type: ReDIF-Article 1.0 Author-Name: Alimatu-Saadia Yussiff Author-X-Name-First: Alimatu-Saadia Author-X-Name-Last: Yussiff Author-Name: Wan Fatimah Wan Ahmad Author-X-Name-First: Wan Fatimah Wan Author-X-Name-Last: Ahmad Author-Name: Emy Elyanee Mustapha Author-X-Name-First: Emy Elyanee Author-X-Name-Last: Mustapha Title: E-collaborative learning experience, interdependencies of presences and learning outcomes: evidence of mediating and moderating effects Abstract: Researchers have reported mixed-findings regarding the impact of individual instruction, the class as a whole, and the use of small-group on learning outcomes. The purpose of this study was to investigate the impact of e-collaborative teaching and learning on students learning outcomes with the mediating and moderating effects of three presences. An experimental research design consisting of experimental and control groups were conducted. Three set of survey instruments used are the Community of Inquiry Survey Instrument, effectiveness for teamwork survey, pre-test and post-test questions. Partial-least-square approach to structural equation modelling was employed to analyse the data based on a hypothesised relationship model. The results demonstrated that the constructs in the hypothesised model are reliable and valid. In addition, findings also indicated that e-collaborative learning experience strongly predict learning outcomes indirectly through the mediating and moderating effects of the three presences. This research offers significant contributions to practice, research and theory. Journal: Int. J. of Business Information Systems Pages: 23-41 Issue: 1 Volume: 29 Year: 2018 Keywords: learning outcome; collaborative learning; mediating effect; moderating effect; reliability; validation; social presence; cognitive presence; teaching presence; Community of Inquiry; CoI. File-URL: http://www.inderscience.com/link.php?id=94001 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:23-41 Template-Type: ReDIF-Article 1.0 Author-Name: Shahla Asadi Author-X-Name-First: Shahla Author-X-Name-Last: Asadi Author-Name: Ab Razak Che Hussin Author-X-Name-First: Ab Razak Che Author-X-Name-Last: Hussin Author-Name: Halina Mohamed Dahlan Author-X-Name-First: Halina Mohamed Author-X-Name-Last: Dahlan Title: Toward Green IT adoption: from managerial perspective Abstract: The environmental issues had drawn attention from governments, societies as well as business organisations. Indeed, organisations have put effort on challenging the environment issues. One of the most important logical efforts that organisations put to deal with environmental issues is Green IT which, in turn, leads to enhancement in the organisation's performance and improvement. Using Green IT by organisations will be advantageous to the society. There is plethora of research on Green IT in organisations and the adoption of Green IT from managers' pro-environmental intention was only explored by a small number of them. The norm activation theory and the theory of planned behaviour have been used in this study. The study provides the available recent knowledge about information system which is necessary to monitoring the decision maker's intention for adoption of Green IT and sustainability by developing a research model which recognises the important aspects for Green IT adoption. Journal: Int. J. of Business Information Systems Pages: 106-125 Issue: 1 Volume: 29 Year: 2018 Keywords: adoption; Green IT; Green IS; norm activation model; theory of planned behaviour; TPB. File-URL: http://www.inderscience.com/link.php?id=94002 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:106-125 Template-Type: ReDIF-Article 1.0 Author-Name: Suziah Sulaiman Author-X-Name-First: Suziah Author-X-Name-Last: Sulaiman Author-Name: Hector Chimeremeze Okere Author-X-Name-First: Hector Chimeremeze Author-X-Name-Last: Okere Author-Name: Dayang Rohaya Awang Rambli Author-X-Name-First: Dayang Rohaya Awang Author-X-Name-Last: Rambli Author-Name: Oi-Mean Foong Author-X-Name-First: Oi-Mean Author-X-Name-Last: Foong Title: Validation of a multimodal interaction model for foot reflexology virtual reality stress therapy application Abstract: Multimodal interactivity when supported in a foot reflexology virtual reality environment has the potential to relieve stress. Current works leading to the development of such an environment have focused on creating models involving human to human (H-to-H) interactions which later could be used as design requirements. The goal is to translate these requirements and lay foundation for the future foot reflexology virtual reality stress therapy (VRST) application. Despite the intention, the development missed an important activity that is feedback from those experts in the domain. This paper closes the gap by presenting an expert review to the multimodal H-to-H interaction model as a form of validation. Eight experts from the human computer interaction (HCI) domain or related field reviewed and provided feedback on the model. The reviews were utilised to reconstruct the multimodal H-to-H interaction model, consequently yielding a final validated model for foot reflexology VRST application. Journal: Int. J. of Business Information Systems Pages: 126-138 Issue: 1 Volume: 29 Year: 2018 Keywords: expert review; foot reflexology; FR; virtual reality; VR; virtual reality stress therapy; VRST; interaction model; validation. File-URL: http://www.inderscience.com/link.php?id=94003 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:126-138 Template-Type: ReDIF-Article 1.0 Author-Name: Hasimah Hj Mohamed Author-X-Name-First: Hasimah Hj Author-X-Name-Last: Mohamed Author-Name: Muhammad Rafie Hj Mohd Arshad Author-X-Name-First: Muhammad Rafie Hj Mohd Author-X-Name-Last: Arshad Author-Name: Muhammad Dzulhilmi Azmi Author-X-Name-First: Muhammad Dzulhilmi Author-X-Name-Last: Azmi Title: Mobile decision support system with dynamic knowledge base using decision tree and case-based reasoning Abstract: Muslims from around the world performing Hajj and Umrah every year. While performing the ritual, pilgrims might encounter some problems that need an immediate solution, especially those related to do's and do not's in the ihram. The best way to get the solution is by referring to the Hajj Guider. However, they're limited and not available all the time. We proposed a dynamic knowledge-based approach that can capture possible problems and solutions from the expert on mobile platform. The knowledge is stored digitally that enable the pilgrims to refer it anytime and anywhere. Users can query both simple and advance questions to the system. The system has been implemented using an artificial intelligence method of decision tree and case-based reasoning methodology. We use case-based reasoning to retrieve similar cases (question and answer). Decision tree with dynamic knowledge based is being used to predict the solutions for problems inquired by users. Journal: Int. J. of Business Information Systems Pages: 42-58 Issue: 1 Volume: 29 Year: 2018 Keywords: case-based reasoning; CBR; decision-tree; Hajj ritual; dynamic knowledge base; interactive question-answering; dumm imposition; rule-based system. File-URL: http://www.inderscience.com/link.php?id=94004 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:42-58 Template-Type: ReDIF-Article 1.0 Author-Name: Faiz Aiman Azhar Author-X-Name-First: Faiz Aiman Author-X-Name-Last: Azhar Author-Name: Jaspaljeet Singh Dhillon Author-X-Name-First: Jaspaljeet Singh Author-X-Name-Last: Dhillon Title: An investigation of factors influencing the intention to use mHealth apps for self-care Abstract: This paper reports determines factors that are essential to be considered in the design mHealth apps for self-care. Self-care is an emerging area that refers any intentional actions people take to care for their physical, mental and emotional health. Encouraging people to practice self-care is a challenge and it is known to be an important part of a healing process. There are numerous health support applications in the market that can be downloaded via smartphones. These apps are typically designed to enable healthcare consumers to improve their health or maintain their good health. However, recent research indicates that with the exception of physical activity, more consumers are currently tracking key health factors on paper or in their heads than with mobile applications. We have identified factors that influence the intention to use mHealth apps for self-care via a systematic literature review approach. The factors obtained were further investigated quantitatively by involving 203 consumers. These factors when considered in the design of future mHealth apps could address the requirements and expectation of consumers towards mHealth apps in general and could possibly motivate them to use mHealth continuously in achieving their health goals. Journal: Int. J. of Business Information Systems Pages: 59-74 Issue: 1 Volume: 29 Year: 2018 Keywords: mHealth; consumer health informatics; CHI; self-care; mobile health applications. File-URL: http://www.inderscience.com/link.php?id=94005 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:1:p:59-74 Template-Type: ReDIF-Article 1.0 Author-Name: Rakhi Tripathi Author-X-Name-First: Rakhi Author-X-Name-Last: Tripathi Title: 'From information to interaction': website and social media usage and trends in top Indian higher education institutions Abstract: The purpose of this study is to examine Web 2.0 usage in terms of website development and social media of top 300 higher education institutions (HEI) in India in terms of website and social media. Top 300+ institutions were selected from National Institutional Ranking Framework, India. Content analysis was used in terms of quantitative approach. All the selected institutions have website and one third of the institutions are on social media. One-fourth has unofficial accounts on social media. In totality no trend has been noticed in Web 2.0 usage of higher education institutions in India. This study is completely based on publicly available data regarding presence on website and social media. Outcomes suggest that HEI are using Web 2.0 applications but at a slow pace. This is the first research that draws an overall picture of the top institutions' Web 2.0 usage in India. The study provides academics with helpful information to better meet their user needs by effectively applying digital strategies. Journal: Int. J. of Business Information Systems Pages: 139-154 Issue: 2 Volume: 29 Year: 2018 Keywords: Web 2.0; website; interaction; transaction; higher education; social networking site; India. File-URL: http://www.inderscience.com/link.php?id=94690 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:139-154 Template-Type: ReDIF-Article 1.0 Author-Name: Kamsuriah Ahmad Author-X-Name-First: Kamsuriah Author-X-Name-Last: Ahmad Author-Name: Mohannad Moufeed Ayyash Author-X-Name-First: Mohannad Moufeed Author-X-Name-Last: Ayyash Author-Name: Omar Mohammad Ali Al-Qudah Author-X-Name-First: Omar Mohammad Ali Author-X-Name-Last: Al-Qudah Title: The effect of culture values on consumer intention to use Arabic e-commerce websites in Jordan: an empirical investigation Abstract: A number of studies on the issues of technology acceptance model (TAM), Hofstede's cultural values, risk and trust, have been done. However, the studies in combining all these issue are still limited especially in defining the relationship between them. Hence, this study attempts to examine the relationship between the variable through a developed model that is expected to improve the intention of consumers to use Arabic e-commerce websites. This study employs the quantitative method for data collection with the help of a questionnaire. The tested variables are significantly influenced the consumer intention behaviour, where intention to use factor positively impacted the utilisation of Arabic e-commerce website. The findings showed support for the premise advocated by TAM and Hofstede's cultural dimensions theory as both were revealed to demonstrate the consumer's intention towards using Arabic websites. The study enumerates the theoretical and practical implications, limitations as well as recommendations for future direction of studies. Journal: Int. J. of Business Information Systems Pages: 155-182 Issue: 2 Volume: 29 Year: 2018 Keywords: culture values; consumer intention; intention to use; Arabic e-commerce websites; trust; risk; Arabic language; Jordan. File-URL: http://www.inderscience.com/link.php?id=94691 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:155-182 Template-Type: ReDIF-Article 1.0 Author-Name: Iman Raeesi Vanani Author-X-Name-First: Iman Raeesi Author-X-Name-Last: Vanani Author-Name: Seyed Mohammad Jafar Jalali Author-X-Name-First: Seyed Mohammad Jafar Author-X-Name-Last: Jalali Title: A comparative analysis of emerging scientific themes in business analytics Abstract: The purpose of this research is to investigate the emerging scientific themes in business analytics through the utilisation of burst detection, text-clustering and word occurrence analysis in top information systems journals in order to provide an insight about the future scientific trends of business analytics for scholars and practitioners in the field. Researchers have gathered a rich set of business analytics articles from top journals which are indexed in the well-known scientific database of web of science (WoS) core collection. The study provides clues, directions, and knowledge-based guidelines on the recent business analytics scientific trends through the utilisation of mentioned algorithms over paper abstracts, titles, and keywords. This study also highlights the most important areas of research and the future research directions that might be interesting to business analysts through an in-depth analytical discussion. Journal: Int. J. of Business Information Systems Pages: 183-206 Issue: 2 Volume: 29 Year: 2018 Keywords: business analytics; burst detection; text clustering; words occurrence; decision support. File-URL: http://www.inderscience.com/link.php?id=94692 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:183-206 Template-Type: ReDIF-Article 1.0 Author-Name: Bensattalah Aissa Author-X-Name-First: Bensattalah Author-X-Name-Last: Aissa Author-Name: Faiçal Azouaou Author-X-Name-First: Faiçal Author-X-Name-Last: Azouaou Author-Name: Fahima Nader Author-X-Name-First: Fahima Author-X-Name-Last: Nader Author-Name: Rachid Chalal Author-X-Name-First: Rachid Author-X-Name-Last: Chalal Title: EI-Annotate: an adaptive collective memory based on annotation ontology and context for decision making in economic intelligence Abstract: In the decision support process, the economic intelligence actors use mental efforts and considerable cognitive activities to solve decisional problems; they deal with a large mass of digital documents during their activities. To facilitate their activities, they use different types of annotations on the manipulated document. To exploit the benefits of these annotations, we propose in this paper, EI-Annotate, an annotation tool dedicated to economic intelligence actors, which enables them to create an adaptive collective memory. The adaptive collective memory based on annotation ontology and context suitable for economic intelligence. This memory is a knowledge management tool that can support economic intelligence actors in their decision process. The EI-Annotate annotation module is implemented as extensions using different technologies; it enables to annotate resources in different formats (document, picture, videos). We present the results of an evaluation study of the proposed architecture of an adaptive collective memory conducted with a research laboratory context, regarding their annotation experience using EI-Annotate. Journal: Int. J. of Business Information Systems Pages: 207-232 Issue: 2 Volume: 29 Year: 2018 Keywords: economic intelligence; decision support process; unstructured decision problem; ontology; semantic annotation; context; adaptation; annotation tool. File-URL: http://www.inderscience.com/link.php?id=94693 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:207-232 Template-Type: ReDIF-Article 1.0 Author-Name: V.M.M. Thilak Author-X-Name-First: V.M.M. Author-X-Name-Last: Thilak Author-Name: S.R. Devadasan Author-X-Name-First: S.R. Author-X-Name-Last: Devadasan Author-Name: M. Vinod Author-X-Name-First: M. Author-X-Name-Last: Vinod Author-Name: D.T. Sunil Author-X-Name-First: D.T. Author-X-Name-Last: Sunil Title: Prioritisation of agile characteristics in products using fuzzy AHP approach through the referencing of the features of mobile phones Abstract: In order to face the intensification of competition, modern companies are required to implement agile manufacturing paradigm. Since mobile phone manufacturers have implemented the characteristics of agile manufacturing paradigm, the mobile phone industry thrives in this competitive world by frequently bringing out several models of mobile phones with amazing features. In the context of this observation, the research reported in this paper was carried out. In this research, 30 features that ascribe the agile characteristics of mobile phones were identified. Subsequently, fuzzy analytic hierarchy process (AHP) technique was applied to prioritise the features and characteristics that infuse agility in mobile phones. The outcome of this research revealed that functional characteristic has been playing major role in enhancing the agility of the mobile phones. This result indicates that modern companies are required to prioritise the infusing of functional characteristic in products for exercising speedy implementation of agile manufacturing paradigm. Journal: Int. J. of Business Information Systems Pages: 233-267 Issue: 2 Volume: 29 Year: 2018 Keywords: agile manufacturing; analytic hierarchy process; AHP; fuzzy AHP; fuzzy logic; mobile phone. File-URL: http://www.inderscience.com/link.php?id=94694 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:233-267 Template-Type: ReDIF-Article 1.0 Author-Name: Amit Kumar Agrawal Author-X-Name-First: Amit Kumar Author-X-Name-Last: Agrawal Author-Name: Asha Nagendra Author-X-Name-First: Asha Author-X-Name-Last: Nagendra Author-Name: Rajiv Divekar Author-X-Name-First: Rajiv Author-X-Name-Last: Divekar Author-Name: Pravin Kumar Bhoyar Author-X-Name-First: Pravin Kumar Author-X-Name-Last: Bhoyar Title: An empirical examination of customer experience co-creation model in banking self service technologies Abstract: The aim of the paper is to develop and validate customer experiences co-creation model in banking SSTs. Primary data collection was done through the field survey method using a self-administered questionnaire. The study is descriptive in nature. Structural equation modelling is used to analyse the data collected through the questionnaires. The study result reflects that customer propensity towards SSTs leads to co-creation of experiences which are responsible for satisfaction of customers with technological products. The present research is performed in the context of banking SSTs and cross sectional in nature which could be further replicated in other SSTs adoption context. The finding of the study would motivate manager to work on newer ways to intensify customer experiences through SST adoption in value cocreation process. The study is the first of its kind to examine SST adoption model that integrates customer experiences. Further study should undertake the quality of customer experiences as a tool for customer retention. Journal: Int. J. of Business Information Systems Pages: 268-280 Issue: 2 Volume: 29 Year: 2018 Keywords: value co-creation; experiences; customer participation; banking; self service technologies; SSTs. File-URL: http://www.inderscience.com/link.php?id=94695 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:2:p:268-280 Template-Type: ReDIF-Article 1.0 Author-Name: Rateb J. Sweis Author-X-Name-First: Rateb J. Author-X-Name-Last: Sweis Author-Name: Ruba Abuhussein Author-X-Name-First: Ruba Author-X-Name-Last: Abuhussein Author-Name: Dana Jandali Author-X-Name-First: Dana Author-X-Name-Last: Jandali Author-Name: Mohammad Mashaleh Author-X-Name-First: Mohammad Author-X-Name-Last: Mashaleh Author-Name: Mutaz Al-Debei Author-X-Name-First: Mutaz Author-X-Name-Last: Al-Debei Title: Factors affecting ERP projects from a project management perspective: a literature review Abstract: The purpose of this paper is to identify the factors affecting ERP projects and to classify them based on their project management knowledge areas. Previous studies were reviewed in order to identify the factors affecting ERP project performance. Next, the factors were categorised based on their project management knowledge areas. Finally, the knowledge areas were ranked according to their occurrence in literature. The results showed that, the four knowledge areas that affect ERP project performance the most are communication, human resource, time management and risk management. Understanding the factors that affect ERP projects has been a subject of considerable interest to many academics. Despite the many studies providing clear evidence on factors affecting ERP projects, vast majority of the literature has tended to approach the topic in a general manner while ignoring the issue of categorisation of such factors. In this paper, we seek close such gap. Journal: Int. J. of Business Information Systems Pages: 281-296 Issue: 3 Volume: 29 Year: 2018 Keywords: ERP projects; project management; communication management; human resource management; time management; risk management. File-URL: http://www.inderscience.com/link.php?id=95564 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:281-296 Template-Type: ReDIF-Article 1.0 Author-Name: Hadeel Alharbi Author-X-Name-First: Hadeel Author-X-Name-Last: Alharbi Author-Name: Kamaljeet Sandhu Author-X-Name-First: Kamaljeet Author-X-Name-Last: Sandhu Title: Explaining and predicting continuance usage intention of e-learning recommender systems: an empirical evidence from Saudi Arabia Abstract: This paper examines the factors that may influence students' acceptance and the continuance usage intention of e-learning recommender systems in higher education institutions in Saudi Arabia. A questionnaire was developed based on an extended technology acceptance model (TAM). A total sample of 353 university students from various universities in Saudi Arabia participated in this study. The findings of this study revealed that perceived usefulness (PU) and perceived ease of use (PEOU) are significant determinants of e-learning recommenders' system initial acceptance. The results also showed that the service quality, a newly added external construct, has significant impact on perceived recommender system ease of use. User experience of recommender system, the second newly added construct, was found to have a significant effect on perceived recommender system usefulness. Finally we found that students' acceptance of e-learning recommender systems positively and directly influences their continuance usage intention. Journal: Int. J. of Business Information Systems Pages: 297-323 Issue: 3 Volume: 29 Year: 2018 Keywords: Saudi Arabia; e-learning; recommender system; technology acceptance model; TAM; adoption. File-URL: http://www.inderscience.com/link.php?id=95565 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:297-323 Template-Type: ReDIF-Article 1.0 Author-Name: N. Nurhadi Author-X-Name-First: N. Author-X-Name-Last: Nurhadi Author-Name: Margo Purnomo Author-X-Name-First: Margo Author-X-Name-Last: Purnomo Title: Predicting e-commerce adoption in small hotel: the role of technology-organisation-environment framework Abstract: This study aims at explaining the determinants of e-commerce adoption at firm level based on the technology-organisation-environment framework. The population of this explanatory research included small hotels in Bali Indonesia which had implemented e-commerce system for at least a year. The result of the analysis showed that the four variables (relative advantage, organisational readiness, management commitment and external pressure) had a significant effect to the adoption of e-commerce system, whereas statistically, the effect of the compatibility was not significant. Future researchers are expected to take more than one respondent as the informants in each of the selected hotel as the unit of the analysis. The result of this study proposed a practical implication suggesting that hotels need to consider the aspects of financial, technology, and human resources as an organisational readiness in implementing an e-commerce system. Journal: Int. J. of Business Information Systems Pages: 324-341 Issue: 3 Volume: 29 Year: 2018 Keywords: e-commerce adoption; technology-organisation-environment framework; small hotel; relative advantage; compatibility; organisational readiness; management commitment; external pressure. File-URL: http://www.inderscience.com/link.php?id=95567 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:324-341 Template-Type: ReDIF-Article 1.0 Author-Name: Sridevi Saralaya Author-X-Name-First: Sridevi Author-X-Name-Last: Saralaya Author-Name: Rio G. D'Souza Author-X-Name-First: Rio G. Author-X-Name-Last: D'Souza Author-Name: Vishwas Saralaya Author-X-Name-First: Vishwas Author-X-Name-Last: Saralaya Title: An event-driven dynamic cross-layer business process compliance monitoring and analysis framework Abstract: Any business process life-cycle should be monitored for adherence to compliance, so as to detect, analyse and recover from anomalies. Whenever a business process implemented as service-based system (SBS) deviates from compliance obligations, it is imperative to overcome anomalies so that the process is not adversely affected. This necessitates a monitoring and root-cause analysis process. Performance of the SBS is determined by factors such as goals and objectives of business layer; output data, execution time and number of services in service layer; processing load, storage capacity of the infrastructure layer. Current approaches are considered inadequate as they observe and verify adherence to properties in any one of the layers of the SBS. We propose a monitoring and root-cause analysis framework capable of congregating and correlating events from all layers of the SBS. The prototypical implementation based on event paradigm is non-invasive and introduces no overhead to the system under consideration. Journal: Int. J. of Business Information Systems Pages: 342-386 Issue: 3 Volume: 29 Year: 2018 Keywords: cross-layer monitoring; root-cause analysis; event-based monitoring; hierarchical service-based systems; dependencies. File-URL: http://www.inderscience.com/link.php?id=95568 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:342-386 Template-Type: ReDIF-Article 1.0 Author-Name: Tina Esther Trueman Author-X-Name-First: Tina Esther Author-X-Name-Last: Trueman Author-Name: P. Narayanasamy Author-X-Name-First: P. Author-X-Name-Last: Narayanasamy Title: A three-pronged technique for the intelligent ranking of cloud service providers Abstract: Small and medium enterprise systems need to be preserved which is a necessity for our country as the growth is at the grass roots levels. Cloud computing can be a solution to help preserve the small and medium enterprises by promoting their services through the web as they can avoid huge infrastructure costs. However, most of the enterprise practitioners are not technology savvy, and it will be a daunting task to choose the best select service provider from the vast number of cloud service providers present. Hence, in this paper a comprehensive three-pronged technique which will facilitate the easy selection of cloud service providers is proposed. An interval valued fuzzy soft sets algorithm is used to rank the cloud service providers based on the user ratings of the cloud service providers. The information regarding the cloud service providers has been collected to create ontology to match the service providers with user requirements. This suite of tools can be used by the enterprise owners to select the best cloud service provider for their requirements with minimum IT knowledge. Journal: Int. J. of Business Information Systems Pages: 387-402 Issue: 3 Volume: 29 Year: 2018 Keywords: multi-criteria decision making; CSP ranking; fuzzy soft systems; ontology creation; user reviews on cloud providers. File-URL: http://www.inderscience.com/link.php?id=95569 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:387-402 Template-Type: ReDIF-Article 1.0 Author-Name: K. Balasubramanian Author-X-Name-First: K. Author-X-Name-Last: Balasubramanian Author-Name: V. Selladurai Author-X-Name-First: V. Author-X-Name-Last: Selladurai Title: Achieving operational excellence in ERP manufacturer industries: through operation transformations Abstract: Enterprise resource planning (ERP) provides a strong opportunity to suit in a manufacturing organisation as the realised technology solution to deliver expected operational benefits. The ERP application will initiate to support the processes challenge and to carry out the company operations and inventory controls of the manufacturing industry. Consequently, the implemented ERP system in manufacturing companies has not completely integrated shop floor operations along with workflow. This system skip-off critical operations and metric benefits within the manufacturing organisation. However, this paper proposes a manufacturing operation transformation model which the design describes as a methodology based on a critical risk factor including manufacturing operation and advance manufacturer architecture, thus achieving operational excellence in the future to the organisation. The conceptual model obtains greater control across the functional department's system at every stage of production and operation performance driving through transformation brings system in full benefits. The findings are useful for manufacturing organisations considering an ERP system to achieve better understanding of the company's needs and expectation. Journal: Int. J. of Business Information Systems Pages: 403-420 Issue: 3 Volume: 29 Year: 2018 Keywords: enterprise resource planning; manufacturing organisation; operational excellence; manufacturing operations transformation. File-URL: http://www.inderscience.com/link.php?id=95570 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:3:p:403-420 Template-Type: ReDIF-Article 1.0 Author-Name: Hamad Balhareth Author-X-Name-First: Hamad Author-X-Name-Last: Balhareth Title: The relationship between business-IT alignment and organisational performance: an empirical investigation from multilevel view Abstract: The previous studies have significantly showed that the business-IT alignment is practically very important for the performance of the organisation. Its value is being derived from the influence of strategy on the outputs of the business. Hence, business-IT alignment is recognised as very important for the profitability of the organisation. On the other hand, the previous studies have a limited focus on the two approaches: strategy content and strategy process, as impacting to the organisational performance. Therefore, this research study attempts to fill the gap in the literature and to test the relationship between business-IT alignment and performance. The survey was conducted in universities along with assessing the contribution of strategy content and strategy process in the effects of strategic alignment on the performance. The data collected from the survey is used in the context of Saudi Arabia. The findings of the study show that the positive effects on the performance in the strategic alignment are statistically significant, where the effects can be varied in the absence of either strategic content or process. Journal: Int. J. of Business Information Systems Pages: 421-435 Issue: 4 Volume: 29 Year: 2018 Keywords: strategy process; strategy content; performance; business and IT alignment; strategic alignment; misalignment; PLS analysis; empirical investigation. File-URL: http://www.inderscience.com/link.php?id=96031 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:421-435 Template-Type: ReDIF-Article 1.0 Author-Name: Hossein Sayyadi Tooranloo Author-X-Name-First: Hossein Sayyadi Author-X-Name-Last: Tooranloo Author-Name: Arezoo Sadat Ayatollah Author-X-Name-First: Arezoo Sadat Author-X-Name-Last: Ayatollah Author-Name: Mohsen Karami Author-X-Name-First: Mohsen Author-X-Name-Last: Karami Title: Analysis of causal relationship between factors affecting the successful implementation of enterprise resource planning using intuitionistic fuzzy DEMATEL Abstract: The present study aimed is analysis of causal relationship between factors affecting the successful implementation of enterprise resource planning using intuitionistic fuzzy DEMATEL using case studies in Esfahan Steel Company. Effective factors on successful implementation of enterprise resource planning were determined by reviewing literature and similar studies and interviewing company experts. Accordingly, the eight factors were identified. On the basis of determinate factors, a questionnaire was designed based on DEMATEL technique and administered to all experts to explain the relationships between those factors. After data were collected, the importance of assessments provided by experts was explained and comments from them were addressed using intuitionistic fuzzy entropy. Finally intuitionistic fuzzy based DEMATEL technique was used to show causal relationships. Journal: Int. J. of Business Information Systems Pages: 436-458 Issue: 4 Volume: 29 Year: 2018 Keywords: enterprise resource planning; DEMATEL; entropy; intuitionistic fuzzy. File-URL: http://www.inderscience.com/link.php?id=96032 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:436-458 Template-Type: ReDIF-Article 1.0 Author-Name: Abbas Keramati Author-X-Name-First: Abbas Author-X-Name-Last: Keramati Author-Name: Arash Apornak Author-X-Name-First: Arash Author-X-Name-Last: Apornak Author-Name: Helya Abedi Author-X-Name-First: Helya Author-X-Name-Last: Abedi Author-Name: Farnoush Otrodi Author-X-Name-First: Farnoush Author-X-Name-Last: Otrodi Author-Name: Maryam Roudneshin Author-X-Name-First: Maryam Author-X-Name-Last: Roudneshin Title: The effect of service recovery on customers' satisfaction in e-banking: an empirical investigation Abstract: The purpose of this paper is to analyse the service recovery strategies associated with customers' satisfaction level of an Iranian private bank. Therefore, by providing an appropriate framework, the relationship between the service failure, service recovery, customers' satisfaction and their subsequent behaviour is examined. In this paper after a survey on different frameworks in a service failure recovery domain from reviewing of literature, the most appropriate framework based on an Iranian private bank situation has been chosen. Then, the conceptual framework is adapted to the mentioned bank by qualitative case study. Since the main motivation of this paper is to provide empirical knowledge about the service failure and recovery in e-banking, therefore, they are determined and listed based on the frequency rate and the effect on the customers respectively by literature review and field studies in an Iranian private bank. Moreover, by combining two suitable frameworks of service recovery literature and adapted to this bank, a conceptual framework is proposed. Due to the short duration of surveying customers' satisfaction in Iranian e-bank, this paper provides an appropriate framework in order to compensate e-bank errors based on the service recovery literature and field studies on an Iranian private bank. Journal: Int. J. of Business Information Systems Pages: 459-484 Issue: 4 Volume: 29 Year: 2018 Keywords: service failure; service recovery; customers' satisfaction; e-banking. File-URL: http://www.inderscience.com/link.php?id=96033 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:459-484 Template-Type: ReDIF-Article 1.0 Author-Name: Ossi Ylijoki Author-X-Name-First: Ossi Author-X-Name-Last: Ylijoki Author-Name: Jari Porras Author-X-Name-First: Jari Author-X-Name-Last: Porras Title: What managers think about big data Abstract: Digitisation progresses rapidly, producing vast amounts of big data. Companies can innovate their business models by using big data and related technologies. Some industries and companies are already on their way towards more data-driven businesses, but for most organisations this is an uncharted territory. The process is first and foremost a business transformation issue. Management leads the change and sets the pace; therefore the attitudes and intentions of executives towards big data are important in the transformation process. This survey concerns the behavioural intentions of Finnish executives with regard to big data. Building on a well-established technology acceptance model we explored the factors that explain the intentions. According to the results, executives intend to take actions that will promote the utilisation of big data. They have either experienced or expect big data to be beneficial to their business, especially with regard to current products or services, streamlining of processes and increasing customer understanding. In addition to the generally positive attitude towards big data, the results reveal significant differences between respondents with big data experience compared to the inexperienced ones. The role of IT management seems to play an important role in the differences. Journal: Int. J. of Business Information Systems Pages: 485-501 Issue: 4 Volume: 29 Year: 2018 Keywords: big data; behavioural intentions; business information systems; business transformation; business model; digitisation; Finland; innovation; management survey; management attitudes; technology acceptance model. File-URL: http://www.inderscience.com/link.php?id=96034 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:485-501 Template-Type: ReDIF-Article 1.0 Author-Name: Shampy Kamboj Author-X-Name-First: Shampy Author-X-Name-Last: Kamboj Author-Name: Zillur Rahman Author-X-Name-First: Zillur Author-X-Name-Last: Rahman Title: Reconceptualising service firm marketing capability: scale development and validation Abstract: The purpose of this study is to conceptualise, develop, and validate the multidimensional measure of marketing capabilities of service firms. This study is based on a series of pre-tests, and two large survey-based studies of Indian service firms. The 18 items scale developed through this study that can be used to measure marketing capability of service firms. Researchers and practitioners can use the scale developed through this study to effectively measure marketing capability of service firms. Although, there are scales to measure marketing capability of manufacturing and hi-tech industries, there is no scale that measures marketing capability of service firms. This research fills this gap by developing a scale with 18 items that effectively measures the marketing capability of service firms. Journal: Int. J. of Business Information Systems Pages: 502-534 Issue: 4 Volume: 29 Year: 2018 Keywords: customer; marketing capabilities; scale development; services; service firms. File-URL: http://www.inderscience.com/link.php?id=96035 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:502-534 Template-Type: ReDIF-Article 1.0 Author-Name: A.V. Santhosh Babu Author-X-Name-First: A.V. Santhosh Author-X-Name-Last: Babu Author-Name: P. Meenakshi Devi Author-X-Name-First: P. Meenakshi Author-X-Name-Last: Devi Author-Name: B. Sharmila Author-X-Name-First: B. Author-X-Name-Last: Sharmila Title: Efficient enhanced intrusion identification and response system for MANETs Abstract: Mobile ad hoc networks (MANETs) are the new generation of self organising networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to the diverse nature of MANET routing is the major challenge. Security for MANETS has become a difficult problem than the security in other networks. Authentication and encryption would be used as the primary defence. Second level of defence to detect and respond to the security problem called an intrusion identification system. In this paper, two phased enhanced intrusion identification and response (t-EIIAR) system for multi hop cluster based MANETs is proposed. The two phases of the proposed method: 1) cluster formation and cluster head selection; 2) the enhanced identification and response system. The fuzzy c means algorithm (FCM) is used to form the cluster and the Intuitionistic Fuzzy TOPSIS (IFT) method used to calculate the trust value for each node in the cluster, based on the trust value select the cluster head and identify the intrusion levels. Finally the intrusion response action is performed from the intrusion level classifications. In the performance analysis, t-EIIAR system maximises the intrusion detection ratio, network life time and minimum energy consumption in both transmitter and receiver side. Journal: Int. J. of Business Information Systems Pages: 535-546 Issue: 4 Volume: 29 Year: 2018 Keywords: two phased enhanced intrusion identification and response; t-EIIAR; intrusion detection and adaptive response; IDAR; fuzzy c means algorithm; FCM; Intuitionistic Fuzzy TOPSIS; IFT; clustering; cluster head. File-URL: http://www.inderscience.com/link.php?id=96036 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbisy:v:29:y:2018:i:4:p:535-546