International Journal of Business Information Systems (99 papers in press)
- Electronic Government Procurement Implementation in India: A cross sectional study
by Prabir Panda, GP Sahu
- An empirical study on creating software product value In india an analytic hierarchy process approach
by Jessie T Latha, L Suganthi
- An empirical examination of a mediated model of strategic information systems planning success
by Gerald Elysee
- A comparative study of multi criteria decision making approaches for risks assessment in supply chain
by Mahesh Chand, Tilak Raj, Ravi Shankar
- Factors Impacting the Adoption of Social Network Sites for Emergency Notification Purposes in Universities
by Wencui Han, Serkan Ada, Raj Sharman, Robin Hattersley Gray, Anand Simha
- BareBone Cloud IaaS: Revitalization Disruptive Technology
by Joseph Ng Poh Soon, Ahmad Kamil Mahmood, Choo Peng Yin, Wong See Wan, Phan Koo Yuen, Lim Ean Heng
- TEXT DATA MINING: A PROPOSED FRAMEWORK AND FUTURE PERSPECTIVES
by SANAA A. ALWIDIAN, HANI A. BANI-SALAMEH, ALAA N. ALSLAITY
- A hybrid Grey-based K-means and Genetic Algorithm for project Selection
by Abbas Toloie Eshlaghy, Farshad Faezy Razi
- Variants, Meta-heuristic Solution Approaches and Applications for Image Retrieval in Business Comprehensive Review and Framework
by S. UMAMAHESWARAN, K. GANESH, N. SURESH KUMAR, P.V. RAJENDRA SETHUPATHI, S.P. ANBUUDAYASANKAR
- Green Supply Chain Management and SMEs: A Qualitative Study
by Suzan Hijaz, Omar Al-Hujran, Mutaz M. Al-Debei, Nour Abu-Khajil
- Analysis of Cloud Adoption Determinants by Using BOCR Analysis and DEMATEL
by Achmad Nizar Hidayanto, Nathan Abednego, Siti Aminah, Yudho Giri Sucahyo
- From ER Model to Star Model: A Systematic Transformation Approach
by Abid Sohail, P.D.D. Dominic
- Application of adaptive neuro-fuzzy inference system and artificial neural network in inventory level forecasting
by Sanjoy Kumar Paul, Abdullahil Azeem, Abhishek Kumar Ghosh
- User-centered design practice and adoption in smaller ICT companies in Eastern Finland: an interview study
by Roman Bednarik, Janne Krohns
- Electronic Data Interchange (EDI) Adoption from Technological, Organizational and Environmental Perspectives
by Lee Sai Leong, Sulaiman Ainin, Shahin Dezdar, Hisham Mallasi
- Web of Things: Readiness and Applications from a Business and Consumer Perspective
by Peter Sedgeman, Yanjun Zuo
- Query Answering Based View Selection
by T.V. Vijay Kumar, Mohammad Haider
- Development and Performance Evaluation of Nonlinear and Robust Adaptive Models for Prediction of Number of Customers of Mobile Phone Service Providers
by T. Rahul, Ritanjali Majhi
- An empirical examination of Web 2.0 technologies and its readiness for business
by Parag Kosalge
- Big Data: Web-crawling and Analyzing Financial News Using RapidMiner
by Jesse Lane, Hak J. Kim
- Examining the Relationship of Payment System Characteristics and Behavioural Intention in E-Payment Adoption: A Case of Indonesia
by Achmad Nizar Hidayanto, Luqman Syauqi Hidayat, Puspa Indahati Sandhyaduhita, Putu Wuri Handayani
- Exploring Factors Affecting Service Quality of ERP on Cloud: A Revelatory Case Study
by Sumedha Chauhan, Mahadeo Jaiswal
- Symptoms, Causes and Remedies for Failures in Enterprise Systems Implementation
by Sock H. Chung, S. Imtiaz Ahmad, Hung-Lian Tang
- Analysis of Strategic and Organizational Factors of Mobile Government By Using Fuzzy Approach
by Mehrafarin Bakhshimazdeh, Mohammad Alikhasi
- A data mining approach for turning potential customers into real ones in basket purchase analysis
by Abolfazl Kazemi, Mohammad Esmaeil Babaei, Mahsa Oroojeni Mohammad Javad
- SMEs Adoption of E-commerce using Social Media in a Saudi Arabian Context: A Systematic Literature Review
by Salma Abed, Yogesh Dwivedi, Michael Williams
Abstract: Through the analysis of a number of previous studies, this article aims to present an overview of extent literature on the adoption of e-commerce by Small- and Medium-sized Enterprises (SMEs) using social media in a Saudi Arabian context. An extensive literature review has been grouped and represented in six different categories including Information and Communications Technology (ICT) adoption, e-commerce adoption by organisations, consumer adoption of e-commerce, e-commerce adoption by SMEs including the use of social media to adopt e-commerce, and the use of social media by SMEs to adopt e-commerce in a Saudi Arabian context. The studies are analysed, literature gaps are highlighted, and further research directions within the field are proposed.
Keywords: E-commerce, Social Media, Small and Medium Size Enterprises, Saudi Arabia
- Investigating Knowledge Sharing Behavior on Virtual Community Members: Integration of Technological, Individual and Contextual Factors
by Achmad Hidayanto, Arieffender Limupa, Kasiyah M. Junus, Nur Fitriah Ayuning Budi
Abstract: Knowledge contributing behavior as well as knowledge collecting behavior is essential and necessary in optimizing knowledge sharing behavior. By integrating social cognitive theory (SCT) model and IS success model theory, this research identified and analyzed three dimensions of influential factors of knowledge sharing behavior, namely individual factors, technological factors and contextual factors. Data were collected from virtual community members of information technology in Indonesia, and subsequently analyzed by using partial least squares (PLS) method. The result showed that the information quality, the norm of reciprocity, the expectation outcomes, the enjoyment in helping others, and the interpersonal trust have significant influence in knowledge sharing behavior. In addition, the result also concluded that knowledge contributing behavior and knowledge utilization are particularly important for community promotion activities.
Keywords: Contextual factor, IS success model, individual factor, information quality, knowledge sharing behavior, online community, partial least square (PLS), service quality, social cognitive theory (SCT) model, system quality, virtual community.
- The Effect of Website Interface features on E-commerce: An Empirical Investigation using the Use and Gratification theory
by Afshan Azam
Abstract: Abstract: Based on uses and gratifications theory, this study explores influences of informativeness, entertainment, and irritation on website interface features and then attitude toward the website. This study tests a wide range of design elements to determine those that provide human elements and computer elements. These elements are linked through intermediaries using the uses and gratifications theory and attitude toward the website. This nomological model was tested with a structural equation modeling (SEM) approach. SEM results indicated that website interface features and the uses and gratifications theory explains well consumers' attitude toward the website. The possible implications, limitations and future work of this study is also discussed in the end.
Keywords: Keywords: Use and gratification theory; Website interface features; E-commerce; Human factors; Computer factors; Informativeness; Entertainment; Irritation; Attitude towards website; SEM.
- Materialized View Selection using Randomized Algorithms
by T.V. Vijay Kumar, Santosh Kumar
Abstract: A data warehouse stores historical data for the purpose of answering strategic and/or decision making queries. Such queries are usually exploratory and complex in nature and have a high response time when processed against a continuously growing data warehouse. This response time can be reduced by materializing the views in a data warehouse. These views containing pre-computed and summarized information, aim to provide answers to decision making queries in an efficient manner. All views cannot be materialized due to space constraints. Also, optimal view selection is shown to be an NP-Complete problem. Alternatively, several view selection algorithms exist, most being empirical or based on heuristics like greedy, evolutionary etc. In this paper, a randomized view selection two phase optimization algorithm (VS2POA), that selects the Top-T views from a multi-dimensional lattice, is presented. VS2POA selects views in two phases, In the first phase, iterative improvement technique is used to perform local optimization. Its output, i.e. the best local optimized Top-T views then becomes the initial solution state, comprising of the initial Top-T views, for the next phase, which is based on simulated annealing. VS2POA, in comparison to the well known greedy algorithm HRUA, selects comparatively better quality views for higher dimensional data sets.
Keywords: Data Warehouse, Materialized View Selection, Randomized Algorithms, Iterative Improvement, Simulated Annealing
- How to Measure Business Value of Business Model Ontologies? A Proposal
by Hichem Benaissa Anouar Badsi, Leila Zemmouchi-Ghomari, Abdessamed Réda Ghomari
Abstract: A business model is an attractive concept for business management. It can benefit from ontology paradigms that are described more formally and more precisely. However, case studies of ontologies describing enterprise business models have rarely been reported in the literature, although there are a few indications of the impact of these ontologies on business models; however these indications do not ease the assessment of the added value of this type of ontology. The aim of this paper is twofold; on one hand, we highlight the lack of task-based assessment of enterprise business model ontologies via some concrete case studies, and on the other hand, we aim to tackle this issue by proposing indicators intended for measuring the impact of business model ontologies in the framework of enterprise business models.
Keywords: ontology evaluation; task-based assessment of ontologies; business model representation; business model ontology; ontology impact in enterprise context
- A Survey on Data Mining and Knowledge Discovery Techniques for Spatial Data
by Majid Shishehgar, Seyed Nasirodin Mirmohammadi
Abstract: Spatial data lied in databases, specifically in Geographic Information Systems (GIS) data centers, can produce huge amounts of data. This great volume of information is including useful and non-useful data along with some hidden patterns which can be better managed and controlled by utilizing some novel artificial intelligence methods. In this research we have a brief survey on the application of statistical methods like data mining and knowledge discovery on spatial data. First, we present an overview of geospatial data mining and knowledge discovery techniques, including spatial clustering, classification, prediction, associate rules, and pattern analysis. Then, some challenges faced by geographic knowledge discovery in Geographic Information Systems (GIS) have discussed in order to have a more clear idea of the futures researches in this area.
Keywords: Geo-spatial data mining; Spatial knowledge discovery; Spatio-temporal patterns; Spatial interaction; Classification; Clustering; Associated rules; Decision trees.
- Managing the Internal IT Service Quality in Public Sector Banks of India
by Sanjay Dhingra
Abstract: The present study evaluates the internal information technology (IT) service quality of
public sector banks in India by using SERVPREF instrument of SERVQUAL model. The
results revealed the relative importance of IT service quality dimensions as perceived by
IT users. The empathy has been found the most important dimension, followed by
tangibility, responsiveness, and reliability, while assurance has been found to be
insignificantly affecting the service quality.
Keywords: SERVPREF; SERVQUAL; IT service quality
- Mobile Agents Modeling Using UML
by Feras Ahmad Hanandeh, Izzat Alsmadi, Majdi Yousef Al-Shannag, Essam Al-Daoud
- Measurement of E-Banking Services Quality: An Empirical Experimentation in Jordan
by Ali Alawneh, Mofleh Al diabat
- Assessing the Impact of the Information Technology on Organizational Systems: A Power Holding Company
by Ali Azadeh, Hasti Foroozan
- Students Authentication in e-assessment Sessions: A Theoretical Biometric Model for Smartphone Devices
by Randa Obeidallah, Ayat Alahmad, Fairouz Farouq, Sari Awwad
Abstract: The trend of accessing the internet by different types of devices increases the challenges for organizations who are embracing e-assessment sessions as part of the e-learning process. These organizations face the unethical behavior of unauthorized students as well as the costly expenses to provide secure exam systems. Different user authentication methods are briefly discussed in this paper for the e-assessment environment. As we pursue the optimistic version of the full meaning of e-learning and e-assessment, a theoretical model for Smartphone devices is proposed to authenticate the identity of students before and during the e-assessment session.
Keywords: User authentication, e-assessment, Password, Smart cards, Biometrics, e-learning, m-learning, Behavioral biometrics, Physiological biometrics, Smartphone
- A GREY BASED APPROACH FOR ERP VENDOR SELECTION IN SMALL AND MEDIUM ENTERPRISES (SMEs) IN QATAR
by Mohd. Nishat Faisal, Habibullah Khan
Abstract: This paper aims to develop a multi-criteria decision model for the purpose of ERP vendor selection. To tackle the multi-criteria nature and the presence of both qualitative and quantitative factors grey based model was proposed. Grey theory was utilized as it can effectively solve the multi-criteria decision making problems with small data sets. The major contributions of this work have been summarized as follows: development and implementation of a multi-criteria decision model for ERP vendor selection; group based decision making for comparing among attributes and ERP alternatives and efficient use of the concept of grey numbers to facilitate the solution of the model for SMEs in Qatar. The proposed method will help information system managers to weigh the ERP alternatives before actually implementing them, which will in turn save money and time.
Keywords: Grey Theory, ERP, SMEs, Qatar
- Prioritization of Cloud Computing acceptance indicators using fuzzy AHP
by Narges Safari, Fariba Safari, Mehdi Kazemi, Alireza Hasanzadeh
Abstract: As organizations grow, documentation and categorization of business information will become harder in traditional databases. In addition, these growing organizations will be involved with providing expensive computing resources. Cloud computing is a cutting-edge technology with huge amounts of advantages for most companies especially the ones that are highly dependent on information systems. Therefore, the current study aims to investigate and prioritize the factors affecting cloud computing adoption. The final model presented in this study has 2 main criteria (organizational and individual level), 4 sub criteria (organization, technology, environment and user acceptance) and 9 factors (business strategy, top management support, security and privacy, relative advantage, sharing and collaboration, competitive pressure, partner pressure, perceived trust and perceived ease of use). While, the results indicated that annual IT revenue is not considered as an important determinant in adopting cloud computing technology. In the second step, the analytic hierarchy process (AHP) methodology is applied for measurement of the importance of determinants. Using fuzzy AHP approach, this study is the first attempt to prioritize the cloud computing adoption determinants. The knowledge on prioritization of cloud computing adoption factors will lead to better understanding of its acceptance in future.
Keywords: Cloud Computing, business strategy, top management support, security and privacy, relative advantage, sharing and collaboration, competitive pressure, partner pressure, perceived trust and perceived ease of use , AHP methodology.
- A Fuzzy Hybrid Approach to Enhance Diversity in Top-N Recommendations
by Maatallah Majda, Seridi Hassina
Abstract: . In recent researches, Recommender Systems performance was restricted in their ability to predict unseen items by users and recommending them those with the highest predicted ratings. To make good predictions it is not sufficient to judge the performance, because a good recommender should offer useful and diverse items that fit to different interest choices and tastes of users. Unfortunately, the lack of diversity and the stability in recommender systems over the users profile dynamicity become a major challenge. In this paper, we propose a Fuzzy Hybrid Diversified Recommendation System able to generate multi-taste recommendations depending on the user\'s profile variation. Due to the fuzziness and uncertainty in users profile, the system allows users belonging to different clusters using a Fuzzy-based Collaborative Filtering combined with a Content-based Filtering algorithm. To identify the users neighbourhood, a novel similarity measure is proposed. To increase diversity in recommended lists, subsets from Top-N recommended lists in similar clusters, are selected according to users membership degrees. Several experiments are conducted on Movilens dataset to prove the proposals effectiveness
Keywords: Recommender Systems; Diversified Recommendation; Fuzzy C-Means; Nonnegative Matrix Factorization; Fuzzy Neighbourhood; User Profile; Taste; Top-N Recommendation.
- Operating Systems Course in a Business Information Systems Curriculum
by Nijaz Bajgoric
Abstract: Operating systems are traditionally taught from computer science/computer engineering perspective. However, as more and more businesses progressively rely on the availability and scalability of their business information system infrastructures which are in most cases based on client/server architecture, the roles of servers and server operating systems are becoming critical with regard to business applications' availability. It turned out that many businesses in e-business era simply go out of business due to the downtime caused by server operating system crashes. Therefore, operating systems, particularly server operating systems, should be taught in business information systems programs as well, with an emphasis on their business perspective.
A framework for designing and delivering an operating system course in a business information systems (BIS) undergraduate program is presented
Keywords: business information systems, operating systems, server operating systems, system administration, business continuity
- Enhancing organizational performance through information technology: An organizational and social strategic context
by José Martinho, Carlos Gomes, Mahmoud Yasin
Abstract: Motivated by the increasing significance of information technology (IT) in todays open system organizations, the objective of this research is to uncover the relationships between business executives and their IT counterparts, which are essential toward improving organizational performance. In the process, a structural equation modelling is utilized to analyse the responses of a sample of hundred and forty-one (141) Portuguese executives. The results of testing the nine research hypotheses tend to underscore the significance of the trust between business and IT executives. Such trust is capable of fostering an organizational culture, which is conducive to the enhancement of the organizational performance. The ability of these business and IT executives to work together cultivates a knowledge domain, which generates effective solutions and applications to organizational problems.In turn,this contributes to improving the competitive performance of the organization.
Keywords: IT-business relationship; shared domain knowledge; IT-business social alignment; organizational performance.
- Leveraging Mobile Devices for Human Resource Information Systems
by Sharon Pande, Neville Gomes
- The Effectiveness of Organizational Information Systems: Perceptions of Non-IT Executives and IT-Executives on IS Contributions to Strategic Development
by Muhammed Ademola Badamas
- Data Stream Outlier Detection Approach based on Frequent Pattern Mining Technique
by Aiman Moyaid Said, P.D.D. Dominic, Ibrahima Faye
- Factors affecting the adoption of cloud computing in small and medium enterprises
by Narges Safari, Alireza Hasanzadeh, Ali Rajabzadeh Ghatari
Abstract: In spite of cloud advantages for small and medium enterprises (SMEs) to reduce their costs and improve their performance, they have not utilized it at the desired level. Therefore, this study seeks to provide a model for the adoption of cloud computing in SMEs based on TOE framework (Technology, Organization, and Environment) along with Individual characteristics. The results show that relative advantage and compatibility in technological context, sensitivity of data and supporting infrastructure in organizational context, vendor support, competitive pressure and government support in environmental context, CEO trust, and CEO cloud knowledge in CEO characteristics are significant factors in cloud adoption. However, Complexity and CEO innovativeness are not influential determinants. In addition, five top prioritized factors for moving to cloud are relative advantage, vendor support, competitive pressure, CEO trust, and CEO knowledge. This study is not only useful for SMEs in their adoption decision but also for researches in this subject.
Keywords: Cloud computing; small and medium enterprises (SMEs; TOE framework; relative advantage; compatibility; sensitivity of data; supporting infrastructure; vendor support; competitive pressure; government support; CEO trust; CEO knowledge; Complexity; CEO innovativeness.
- Green Supply Chain Performance Appraisement and Benchmarking using Fuzzy Grey Relation Method
by Saurav Datta, Anoop Kumar Sahu, Siba Sankar Mahapatra
Abstract: Recently, the explosion of green supply chain management (GSCM) initiatives in the practical realm has led to an increasing body of research in relation to both external influences leading to the adaptation of green supply chain management practices, and their impact on firms overall performance. rnIn last decades, green performance measurement has become a part of decision-making scenario in order to check and compare ongoing firms performance with the prescribed standard from the aspect of amendment as well as improvement of green issues and practices for acquisition of unified green goal of candidate industries. rnIn this context, an efficient performance appraisement framework (index system) has been conceptualized from the resource of existing literature to appraise and benchmark green performance extent of candidate industries running under similar green supply chain architecture. In this reporting, on account of the ill-defined criterions and inherent vagueness associated with subjectivity of evaluation criterions (evaluation indices); the assessment (evaluated score) of the expert panel have been acquired in terms of linguistic assessment which have been finally transformed into generalized Triangular Fuzzy Number (TFN) set. The fuzzy transformation of the linguistic data helped in data analysis supported by the fuzzy mathematics in order to facilitate the said decision-making. rnA fuzzy based computation module embedded with Grey Relation Method (GRM) has been explored in this work from the prospectus of evaluation, appraisal and benchmarking the preferred green supply chain performance of candidate industries operating under common green practices. Finally, an empirical case study has been led from the perspective of checking feasibility as well as effectiveness of the proposed decision-making approach. rn
Keywords: Green Supply Chain Management (GSCM); Benchmarking; Triangular Fuzzy Number (TFN); GRM (Grey Relation Method)
- Two-Stage Graph-Clustering Algorithm and Localized Classification Model to Identify Apt Business Locale
by Harya Widiputra, Marsudi Kisworo, Agnes Novita, Tiolina Pardede
Abstract: Previous studies conducted in the economy, finance and business management fields have found that there exists a collection of business agglomerations, which contain various numbers of firms that are spread on a specific region. Based on this realness, the selection of apt business locale for a new establishment should then be considered as a trial to identify the prospective business agglomeration in which the new establishment would be able to compete with existing firms. Consequently, a pertinent method that works by characterizing the business agglomerations from a collection of business firms data and subsequently computes the projection of business performance level of a new establishment in each identified agglomeration is developed in this study. A two-stage graph-clustering algorithm that purposively designed to unravel the task of business agglomerations identification is introduced, whereas the localized classification models perform the prediction of business performance level in each known agglomerations. Decisively, results from conducted experiment suggest that the proposed method is beneficial to distinguish the apt business locale for new establishments in a particular region with a collection of business agglomerations.
Keywords: BBusiness Agglomeration; Business Locale; Graph-Clustering; Localized Classification Model
- STEP Model approach for linking Website Usability Dimensions and Website Success Measures in B2C E-commerce Setting
by Geetanjali Sahi, Sushila Madan
Abstract: The study proposes STEP model of B2C E-commerce success by relating website usability dimensions and success measures. Questionnaire survey method is used to collect data from selectrespondents (N=415) with respect to seven dimensions identified after literature review. Findings indicate that usability dimensions have differential impact on success measures. For instance, the trust construct impacts all success measures, whereas propriety of content impacts only perceived usefulness. STEP models fit statistics indicate a good model fit.Findings and implications of these are discussed.
Keywords: B2C E-commerce, system quality, trust, extension quality, propriety of content, perceived usefulness, user satisfaction, intention to purchase.
- Information Technology Revolution and Transition Marketing Strategies of Political Parties: Analysis through AHP
by Arpit Jain, Anil Kumar, Manoj Kumar Dash
Abstract: As the technology has been evolving, India has been witnessing an increased internet revolution growth. Due to Information Technology (IT) revolution, all political party in India were campaigning their party and candidate through social networking sites to capture the confidence and to win the trust of electors in parliamentary elections in 2014, this revisited their marketing strategies: transition from offline to social media. This study develops a conceptual model and identifies the major factors to the merchandising strategies of political parties: transition from offline to online. Analytic Hierarchy Process (AHP) is used to produce a hierarchy structure model to prioritize the influencing factors of electors of by the survey of judgment. The results of our analyses show that the growth of internet technology occupied the first rank followed by internet penetration and e-marketing. The findings of this research show that all the offline channels are converting in online channels with very fast speed due to the technology revolution.
Keywords: technology revolution, campaign, analytic hierarchy process, transition, social media, merchandising
- Selection Decisions of Offshore ITO Service Providers for Strategic Alliances - An AHP Based Approach
by Santanu Mukherjee, Kampan Mukherjee
Abstract: Increasing trends towards offshore business model for IT service delivery motivates client organizations look for offshore partners, who have the ability to match their strategic business requirements. One of the critical steps in this endeavor is the selection of an offshore supplier among many potential alternatives. Therefore, the offshore supplier selection decision has emerged as an important aspect of strategic alliance formation. Given the multi-criteria nature of the offshore supplier selection decision, this article proposed a comprehensive problem definition hierarchy highlighting the key elements (criteria) at its various levels based on a thorough study and analysis of the existing literature on IT outsourcing (ITO) industry. A data collection instrument is designed to capture comparative judgments from Indian practitioners on relative importance of each element in the hierarchy. Analytic Hierarchy Process (AHP) is applied to synthesize the captured data to get the normalized weights of these criteria. Lowest level criteria are eventually used to rank three suppliers to test the veracity of the proposed hierarchy. At the end a sensitivity analysis is conducted to verify the stability of the outcome.
Keywords: AHP, Decision making, Framework, Hierarchy, Offshore, Priorities, Service Provider, Strategic Alliance, Supplier
- Multi-objective Model for Intelligence Evaluation and Selection of Enterprise Systems
by Ahad Zare ravasan, Saeed Rouhani
Abstract: Most organizations still experience a lack of Business Intelligence (BI) in their decision-making processes when implementing enterprise systems. The current state-of-the-art in decision support takes the intelligence requirements of enterprise systems as important quality aspects into consideration, along with their functional and nonfunctional needs, but the literature lacks studies on the evaluation of these intelligence requirements. This paper proposes a fuzzy, multi-criteria decision-making procedure and a multi-objective programming model to evaluate and make final decisions about the selection of enterprise systems that also include the requirements of business intelligence in addition to their other goals and requirements. In order to validate the model with a real application, all phases of the approach were applied in the evaluation of the enterprise systems of a company in the oil industry. Companies can use this model to evaluate, select and implement enterprise software and systems that will provide better decision support for their organizational environment.
Keywords: Enterprise Systems; Business intelligence; Multi-objective programming; Fuzzy evaluation
- The effects of performance-monitoring technology on privacy and job autonomy
by Marko Seppanen, Eila Pajarre, Pasi Kuparinen
Abstract: The contemporary working environment makes good use of ICT technology development. However, since modern devices and software also enable electronic monitoring of performance, for employees the use of ICT may incur feelings of privacy invasion. This study builds a model based on the Job Characteristics Model and the Unified Theory of Usage and Acceptance of Technology (UTAUT) model explaining the relationship between willingness to adopt new ICT tools and perceived job autonomy at the level of individuals. Data from a survey of a telecom service firm with several offices were used to test the model. The findings show that the feelings of privacy invasion have a strong negative and statistically significant relationship with the perceived job autonomy.
Keywords: technology; organization; adoption; performance; electronic monitoring; ICT; job autonomy; privacy
- Examining beliefs, values and attitudes towards social media advertisements: results from India
by Thamaraiselvan Natarajan, Janarthanan Balakrishnan, Senthilarasu Balasubramaniam, Jeevananthan Manickavasagam
Abstract: The purpose of this study is (a) to empirically identify the Indian consumer attitude towards social media advertisements based on their demographics and (b) to investigate the relationship underlying beliefs, values, attitude and behaviour towards social media advertisements among Indian consumers. Online data collection was administered from various social media sites. 510 responses were recorded comprehensively as usable data. CHAID criterion in decision tree technique was used to identify the significant demographic characteristic predicting consumer attitude. A two-step structural equation modeling approach using Lisrel 8.8 was applied to understand the relationship underlying beliefs, advertising value, consumer attitude, and consumer behaviour. A consumers occupation, income level and preferred social media sites were identified as the most significant demographic predictors for his/her attitude towards social media advertisements. Standardised estimates of the structural equation modeling indicated that four beliefs factors, namely, hedonic/pleasure, social role and image, materialism, and falsity, significantly influenced advertisement value. This research is amongst such pioneering efforts in exploring the online presence and response of Indian consumers to internet marketing in the form of social media advertisements.
Keywords: Online consumer behaviour, social media advertising, demographics, internet marketing, Decision Tree, Online marketing, Indian consumer behaviour, Structural equation modelling, Indian consumers.
- TECHNOLOGY CONSUMER BEHAVIOR: A study of hedonic/utilitarian preference via virtual space
by Emílio José Arruda-Filho, Agenilson Jonatan Santos, Eliane Brito
Abstract: In this article we analyzed consumers buying intention regarding integrated products in the virtual space, by exploring the interaction between utilitarian/hedonic characteristics and usage predictions. We based our analysis on data collected through four different experiments applied to 122 students of different courses at a university in the north of Brazil. The product studied was a digital reader (or e-reader), which had recently integrated various services and devices into its overall structure. The factors that directly influence the choice and use of the product were examined, with purchase intention quantified in terms of fun, wellbeing, satisfaction, perceived value, utility, and importance related to the product, which, ultimately, justify the behavior of technology consumers. As the integration of services increases, the hedonic and utilitarian value of the product purchased through e-commerce also increases; complementarily, consumers usage predictions were found to be greater than their current use of existing products, and this is used to justify their purchases.
Keywords: E-commerce; hedonic value; utilitarianism; prediction of use; technology convergence.
- Comparing Internet Financial Reporting Practices: Indonesia, Malaysia, Singapore, Japan and Australia
by Luciana Spica Almilia
Abstract: Good Corporate Governance is characterized that firms convey information more quickly, accurately and completely. Information is considered informative if the information is capable of changing beliefs (beliefs) of decision makers. Internet Financial Reporting Practices in Indonesia is one form of transparency and accountability of good corporate governance. Good corporate governance requires companies to present information timely, clear, and comparable, especially concerning financial issues, management and company ownership.
The research objective is to compare the quality of corporate disclosure of Internet Financial Reporting in Indonesia, Singapore, Japan, Malaysia and Australia. The sample in this research is the companies in each country (Malaysia, Singapore, Japan and Australia) are the best in the category of FORBES magazine (Forbes 2000). Indonesia's best to use the criteria established by SWA magazine (SWA 100). The reason is that the criteria used by each of the magazine to rank the order of the best companies have used a methodology that can be justified. IFR index used in this study was developed from the study Cheng et al. (2000). IFR index in this study consist of: content, timeliness, technology and user support.
The result of this study indicate that there are differences in IFR quality between companies in Malaysia with companies in Australia and Japan. This study also shows that there is a difference in IFR quality between companies in Indonesia with companies in Australia, Singapore and Japan.
Keywords: internet financial reporting, website, traditional financial reporting, internet, financial statement, voluntary disclosure
- End User Computing Satisfaction (EUCS) Instrument For an University Website in India
by Alagirisamy Kamatchi Sukumaran
Abstract: The study has tested the End User Computing Satisfaction (EUCS) instrument (Doll and Torkzadeh, 1988, 1991) among the students of a university in India which stands culturally apart from other countries. Though the instrument had been tested widely as reported in the previous literature, McHaney et al. (2002) argued for retesting the EUCS instrument in different environments. The present study offers certain suggestions for modification in the instrument to strive for a better goodness of fit and for that purpose makes an attempt for an exploratory factor analysis of the EUCS model. The important factors responsible for the end user satisfaction in the usage of the university website are identified.
Keywords: University Website; End User Computing Satisfaction; Confirmatory Factor Analysis; India.
- Changes in beliefs, satisfaction and information system continuance intention of experienced users
by Semina Halilovic, Muris Cicic
Abstract: This study examines changes in beliefs, satisfaction and intention that occur among experienced users of information system (IS). In order to examine these changes, a research has been conducted about measuring of perception, satisfaction and continuance intention of integral accounting budget software (IABS) users on two occasions, during 2009 and 2013, respectively. The extended Expectation-Confirmation Model of IS Continuance (ECM-IS), the original ECM-IS having been extended for a construct of perceived ease of use, has been used in this research. The statistical comparison shows that only the path coefficient from perceived ease of use to satisfaction in the structural model during the second survey is significantly stronger than the corresponding path coefficients in the structural model in the first survey. Also, results show that all other path coefficients are not statistically different. A subsequent analysis of changes that have taken place among users in relation to the use of other programs, such as MS Word, MS Excel and Internet, shows that there is a statistically important difference in usage of these programs in the course of the first and second research studies conducted.
Keywords: IS continuance intention, satisfaction, beliefs, perceived usefulness, perceived ease of use, the Expectation-Confirmation Model of IS Continuance (ECM-IS).
- Approaches and Issues in View Selection for Materializing in Data Warehouse
by Rajib Goswami, D.K Bhattacharyya, Malayananda Dutta, Jugal K. Kalita
Abstract: To facilitate efficient query processing in data warehouses and develop On Line Analytical Processing (OLAP) for decision support systems, intermediate data derived in the middle of complex processing may be stored as a set of materialized views. It is not possible to save each and every intermediate query result due to limitation of space and updating cost. Therefore, an optimum set of views need to be selected for materialization and, this requires a good optimization technique. Many approaches have been presented in the literature to achieve good solutions to this problem. In this paper we attempt to provide a comprehensive survey of the approaches and algorithms introduced to address the issue. We also attempt to identify the key issues and research challenges in this area.
Keywords: Data Warehouse; View selection; View materializing; Query responserncost; Materialized view maintenance; OLAP; HRU Algorithm; RandomizedrnAlgorithm; AND-OR view graph; Optimal query planrn
- Using DEMATEL to Construct Influential Network Relation Map (INRM) of Consumer Decision Making in e-Marketplace
by Anil Kumar, Manoj Kumar Dash
Abstract: Prodigious growth of Internet offers companies, many chances to implement new business models, led to the search of novel techniques for conducting effective marketing business, and to reinforce their competitiveness in the marketplace. Commerce is now undergoing a revolutionary phase, where the medium of communication between the customer and the merchant is electronic. The cutting edge for business today is e-marketing. Now there is need to leverage the knowledge of domain experts in evaluating the consumer decision making in the e-marketplace. The purpose of this study is to construct Influential Network Relation Map (INRM) of consumer decision making in the e-marketplace. For this DEMATEL (Decision-Making Trial and Evaluation Laboratory approach is used to investigate the interrelation among perspectives and criteria by the survey of experts. This study provides solutions to improve service quality, optimize source allocation, customize their product/services according to the need of customers and enhance online reputation by increasing customer retention.
Keywords: Revolutionary; e-marketplace; Optimize; Online reputation; Influential Network relation map
- An efficient FLANN Model with CRO based Gradient Descent Learning for Classification
by Bighnaraj Naik, Janmenjoy Nayak, H. S. Behera
Abstract: Due to the nonlinear nature of real world data, it is difficult to determine the optimal ANN classification model with accurate and fast convergence. Although, many higher order ANN have been designed and integrated with competitive optimization method in order to construct an accurate classification model, but the parameter adjustment and variability in performance in different runs of the classification model leads to statistically insignificant result. In this paper, a FLANN model (CRO-GDL-FLANN) has been proposed for classification with gradient descent learning (GDL) based on Chemical Reaction Optimization (CRO). The proposed CRO-GDL-FLANN method has been tested with various benchmark datasets from the UCI machine learning repository under five fold cross-validations. The classification accuracy of CRO-GDL-FLANN is compared with FLANN, GA-FLANN and PSO-FLANN. To prove the proposed method is statistically better and significantly different from other alternatives, the CRO-GDL-FLANN is verified under multiple comparisons of classifiers by using Friedman, Turkey and Dunnett statistical test. Finally, one-way-ANOVA test has been carried out for generalized comparison of CRO-GDL-FLANN with other classifiers.
Keywords: Data Mining; Machine Learning; Classification; Functional Link Artificial Neural Network; Gradient Descent Learning; Chemical Reaction Optimization; Particle Swarm Optimization; Genetic Algorithm.
- The Competitiveness of CSR Communication Strategy in Social Media
by Reza Jamali, Asghar Moshabaki, Asadollah Kordnaeij
Abstract: This qualitative study utilises documents in the public domain published by 50 companies listed among the Fortune Global 500. The terms and statements that the companies used to describe their social responsibility policies have been analysed, and the types of social media (SM) used have been identified for this study. Moreover, questionnaires were completed by 1,263 people who were consumers of at least one of the 50 companies. The study results indicate that the investigated digital strategies, failed to meet the objectives of the companies. This likely occurred because respondents were exposed to a wide range of messages that were of little interest to most of them. Respondents indicated that they prefer to receive messages through videos, photo sharing, publishing, and blogging, whereas most firms published their messages on corporate websites or social networks. This study is one of the first to propose that using social media without engaging users cannot be considered a success and should be considered an expense with no return.
- Evaluation of user satisfaction with OLAP recommender systems: an application to RecoOLAP on a agricultural energetic consumption datawarehouse
by Elsa Negre, Sandro Bimonte
Abstract: OLAP and Datawarehouse (DW) systems are technologies intended to support the decision-making process, enabling the analysis of a substantial volume of data. Decision makers explore warehoused data using OLAP operators to discover new trends and/or confirm business hypotheses. In the era of Big Data, the size of warehoused data has increased substantially, and the data have become increasingly difficult to use. One of the goals of recommender systems is to help users navigate large amounts of data. OLAP recommender systems have recently been proposed in the literature because the multidimensional analysis process is often tedious because the user may not know what the forthcoming query should be. However, user satisfaction with these systems has not yet been investigated. Indeed, only time and space performances and classical information retrieval metrics (e.g., accuracy) have been studied on fictive DWs and users. Thus, this work is the first study of the usefulness of OLAP recommender systems from the decision makers point of view. Indeed, to the best of our knowledge, although several works have proposed OLAP recommender systems, they did not evaluate them against real-world data and users. With our experiments on a spatial DW concerning agricultural energetic consummation issued from the Energetic French Project, we prove that OLAP recommendation is useful via a real-world case study and confirm the importance of these academic tools.
Keywords: OLAP; Reccomandation systems; Evaluation
- Business Process Analysis: A Process Warehouse based Resource Preference Evaluation Method
by Dhanapal durai dominic Panneer selvam, Abid Sohail, Khurram Shahzad
Abstract: In working environment resources are commonly shared between tasks, and sometime multiple resources are necessary to commence a single task, this scenario makes the resource utilization complex. Existing studies on business process analysis and evaluations widely focused on competence of resource to measure work performance, but it is contend that the relationship of resource with task is not sufficiently understood due to not considering evaluations of all resource classes. Particularly, business intelligence based approaches to BPI have not adequately explored this relationship. Subsequently, a set of relationships between human resources, non-human resources and tasks (named suitability, preference and competence) are presented. However, only human resources relationship with non-human resource/s (named preference) is presented in detail, as a resource preference model. The model bundled with the presented preference evaluation method guides users for evaluation of resources preference. The applicability of the method is illustrated through a healthcare case study. Quality of data produces is evaluated though an empirical study, that is confirming the claim of highly relevant information generation.
Keywords: Business Process Management; Workflow Management; Business Process Improvement; Process Warehouse, Preference construction.
- Customer Switching Resistance towards Internet Banking in Malaysia
by Lee Hoi Yen, Abdullah Al Mamun, C A Malarvizhi
Abstract: Internet banking, although proven to be a successful innovation, has still not been adopted by the laggards, and hence, has not met all the expectations of banks. This study, therefore, is aimed at investigating the effects of E-system quality (ease of use, responsiveness, and web content) and E-trust (privacy, perceived risk, reputation, and security) on customer switching resistance (SR) towards Internet banking in Malaysia. There are many reasons why customers do not use Internet banking in Malaysia. This study employed a cross sectional design and data was collected from 158 respondents from Cyberjaya, Malaysia. The findings indicate that perceived ease of use of current service provider, privacy policies, perceived risk, and security services are the key determinants of customers reluctance to switch to the current Internet banking services. These findings provide a more profound understanding of consumer resistance to Internet banking, in addition to offering guidance to service providers.
Keywords: Internet Banking, E-System Quality, E-Trust, Switching Resistance
- An investigation of the information system security issues in Taiwan
by Nancy Tsai, Yan Xiong
Abstract: Taiwan is a small island located in Far East of Asia, but its business organizations have the most market shares of supplying information technology hardware worldwide. Most local suppliers of these Taiwan-based high-tech companies are small or medium sized business. However, some companies in Taiwan are multi-national organizations with significant revenue and a large amount of suppliers. Therefore, Taiwan, as a new developed country, provides an ideal setting for us to explore various information system security threats encountered by their organizations and evaluate their achievement of security objectives and various counter measurements implemented by those organizations. The major purpose of this study is to provide some insight to the information systems security issues of e-business in Taiwan for researchers and practitioners.
Keywords: security; information systems; developed country; e-business.
- Drivers and Barriers in the Decision to Adopt IaaS: A Public Sector Case Study
by Shafiu Ibrahim
Abstract: Extant academic literature reveal the benefits of subscribing to Cloud computing services but few of these address the use of Cloud computing in the government sector. Moreover, within the literature, the subject of the decision making process in the migration to Cloud computing by government agencies, does not seem to be investigated sufficiently. This paper, through a qualitative case study focusing on the decision to migrate to Infrastructure as a Service (IaaS) in a government organization, reveals drivers and barriers that influence the decision to adopt Cloud computing. The study shows that there are some common as well as some differing determinants to the decision to adopt Cloud computing between a commercial organization and a government organization.
Keywords: Cloud Computing, Public Sector, Infrastructure as a Service (IAAS),
- Efficient Keyword Search using encrypted text in Grid Computing Architecture
by Gomathi Mathi
Abstract: Searching needs effective key based cryptographic algorithms. The retrieval of encrypted data from huge set of distributed databases leads to complexity. This study is based on certain set of keywords. Most of the key based cryptographic algorithms are more effective but each and every algorithm has its own limitations. Sometimes there arises a huge need to direct the data to Grid computing system in the cryptic form. No algorithm in an intelligible form has been made available to the intruders. Complexity and computational overhead attached with these algorithms make the retrieval task more complex and ineffective. To overcome these problems it is proposed to introduce a novel keyword search technique in the Grid computing environment. The result so obtained in keyword search using this novel technique was most effective and with the reduction of retrieval time in the Grid computing environment.
Keywords: Keyword Search, Software Parser, Job scheduling, Grid Computing, Cyclic
Shift Algorithm ,Data Management System ,Encryption, Character Substitution
- Gauging the School-Based Acceptability of Web 2.0 Collaborative Tools
by Dhanapal Durai Dominic Panneer Selvam, Sadaf Hina
Abstract: This article develops an insight of the factors affecting the use of social networking sites (SNS) for mutual participation/collaboration among school stakeholders. Collaborative social networks that have a casual disregard for personal information put users at risk and afford a cyber criminal the opportunity to attack by exploiting information about the victim that is readily accessible and, with hindsight, unintended. Our research, among 380 school stakeholders, shows that students, teachers and parents are frequent users of SNSs but lack awareness of the rules and regulations, i.e. cyber safety, for SNS usage. This lack of safety education on how to deal with online hazards affects users trust in friends added to their profiles. Moreover, trust of a user in SNS is instantly influenced by the security and privacy seal provided by the SNS service provider and consequently these trust factors manipulate users intention to use SNS for parrticipation/collaboration among each other.
Keywords: Social Networking Sites (SNS), Participation/Collaboration, Security, Privacy, Trust, Cyber Safety Education
- A Conceptual Model of Factors Affecting E-commerce Adoption by SME
Owner/Managers in Jordan
by Mohammad Alrousan, Eleri Jones
Abstract: SMEs have become an important element in economic growth, particularly in developing countries. Since the Internet revolution, Internet usage in business environment (ecommerce) has changed the way of doing business in SMEs. It is well known that ecommerce is essential for SMEs in enhancing their competitiveness, productivity, efficiency, access to global markets and cost reduction. Despite such benefits, it has been reported that SMEs in developing countries, such as Jordan, have been slow to adopt ecommerce. This highlights the need to understand the factors influencing/inhibiting ecommerce adoption by SMEs owners/managers in Jordan and determining their level of adoption of the Internet. This paper reviews the background, strengths and weaknesses of the major models and theories relevant to technology adoption: Technology Acceptance Model (TAM); Theory of Reasoned Action (TRA); Technology-Organization Environment (TOE); Diffusion of Innovation (DoI) and Hofstedes Cultural Dimensions. Also, the literature review shows the most common sequences in level of e-commerce adoption in SMEs: Rao Model; Daniel Model; PriceWaterhouseCoopers Model; Rayport and Jaworski Model; Lefebvrea et al. Model and Leadership Typologies for Staged Technology Adoption). On the bases of these theories and models a conceptual framework for SMEs e-commerce adoption level in Jordan is suggested. This conceptual framework can be tested empirically for SMEs in Jordan as well as other Arab countries.
Keywords: e-commerce, SMEs, Adoption , Technology Acceptance model , Theory of
Reasoned Action model, Diffusion of innovation model, Technology-Organization-
Environment model, Hofstede, e-commerce levels.
- U-business: A Taxonomy and Growth Strategies
by Changsu Kim, Jintae Lee, Stephen Bradley
Abstract: U-business uses ubiquitous computing technologies to support uninterrupted communications in business transactions to gain competitive advantage. This study seeks to identify patterns underlying successful U-business growth. It follows four stages: (1) dimensions important for the study of U-business growth strategies were identified through examining past cases. Two dimensions were identified: nature of change (Improvement vs. Innovation) and implementation environment (Physical vs. Virtual Value Chain). (2) These dimensions were then used to build a taxonomy of U-business types and a growth strategy type was defined as a transition from one of these types to another. (3) A focus group consisting of U-business and ubiComp experts was then used to validate these dimensions and generate hypotheses about successful strategies. (4) These strategies were then tested by using the transition strategies that Apple has used in its product offerings. These findings are used to provide guidelines about growth strategies for U-business companies.
Keywords: U-Business, U-Business Taxonomy, U-Commerce, Ubiquitous Commerce, Ultimate Commerce, uber-Commerce, Value Chain, Growth Strategy, Ubiquitous Computing, UbiComp
- Conceptual model of enterprise resource planning and business intelligence systems usage
by Muhmmad Nofal, Zawiyah Yusof
Abstract: Businesses have invested considerable resources in the usage of Enterprise Resource Planning (ERP) and Business Intelligence (BI) systems. These systems were heavily studied in developed countries while there are a few and narrowly focused studies in developing ones. However, studies on the integration of ERP and BI have not been given enough attention (hereafter ERPBI). There are many challenges facing the ERPBI usage in term of the steadily increasing speed with which new technologies are evolving. In addition, there are a number of factors that affecting this usage. Based on the finding of the literature, a model from a critical success factors (CSFs) perspective that examine the relationship between ERPBI usage and organizational performance is proposed. The conceptual model provides a foundation for more research in the future. The expected results of the study will improve the business outcome and help design strategies based on an investigation between ERPBI usage and organizational performance.
Keywords: ERP, BI, ERPBI, organizational performance.
- Wikis and their adoption: factors influencing user behavior
by Parag Uma Kosalge
Abstract: Wikis can provide unique business advantages at tactical as well as strategic levels, including harnessing collective intelligence, group collaboration, and improved business processes. The adoption rate is low but increasing. As wiki is believed to be a bottom-up phenomenon, this paper empirically examines the benefits of the wiki technology as perceived by the new generation. An exploratory factor analysis reveals four factors that may influence wiki adoption: Business improvement, day-to-day collaboration, innovation, and personal use. Business benefits such as collective intelligence, collaboration, and cost reduction find strong recognition. This research is important for academicians as there are few studies that examine what motivates the modern workforce to adopt the wiki technology. A better understanding of the end user perceptions can help organizations shape their wiki-related initiatives and improve successful adoption. Wiki technology providers can focus their attention on improving performance on aspects important for business users.
Keywords: Internet, Web, Wiki, Web 2.0, benefits, user perceptions, technology adoption, drivers, collective intelligence, collaboration, knowledge management
- A Specification of Principles Governing the Design of Requirement Prioritization Approaches
by Rahul Thakurta
Abstract: The importance of prioritizing requirements stems from the fact that not all requirements can usually be met with available time and resource constraints. Although several papers have been published in this domain, they mainly focus on descriptive research endeavours to suggest different requirement prioritization ap-proaches. Prescriptive research dealing with design science for a systematic and holistic understanding of the prioritization process is still scarce. The gap motivates our research, which aims at arriving at a set of design principles that explains the form and function of a requirement prioritization approach. We resort to a non-experimental approach using content analysis to identify and analyze articles on requirement prioritization in order to arrive at the set of six design principles addressed in the paper. This subsequently is evaluated based on expert feedbacks to validate our design principles. We finally give a brief outlook on implications and issues for further research.
Keywords: requirement prioritization; prioritization approaches; design principles; content analysis
- Measuring End User Satisfaction in Enterprise Resource Planning in India
by AKS Sukumaran
Abstract: End user satisfaction in Enterprise Resource Planning (ERP) among the employees in India has been analysed using EUCS instrument. This study is unique in including expectations and dependable to measure satisfaction in a modified EUCS scale. EUCS had been used only in a few of the studies in ERP and the existing literature on user satisfaction also had emphasized the need for retesting of the instrument in many countries and cultures. ERP market in India is expected to grow at a CAGR of 22.2% over the period 2011-2015 (TechNavio) and India is a key player in the IT market. Its IT end users are culturally different from other countries. Hence, there is need for this study and for re-testing the EUCS instrument among the end users of ERP in India. The study also attempted to find the differences in satisfaction among the employees having different work experiences and demographic characteristics.
Keywords: End user satisfaction (EUCS); Expectations and Dependability; Enterprise Resource Planning; Modified EUCS; Total experience; Organisational experience; India.
- The Role of Service-Oriented Architecture as a Part of the Business Model
by Ville Alkkiomäki
Abstract: Digitalization is affecting business models of many enterprises and changing the way information work is done. Service-oriented architecture (SOA) is one way of implementing this change, but despite its capability to model services on a business level, the enterprises are not able to link the value of the services with the related investments. This paper proposes the use of ontology as a tool to make service-oriented architecture an integrated part of the business model. This linkage enables the SOA investments to be evaluated as a part of the value delivery process of the enterprises.
Keywords: business model; IT value; SOA; service oriented architecture; ontology; case study; service identification; business model generation; business alignment; ValIT; cost volume profit analysis
- Paradigm Shift in Teaching IT-Based Courses in a Teaching University
by Purnendu Mandal, Alicen Flosi, Jennifer Large
Abstract: Due to resource constraints, today teaching of IT-based courses and software applications is posing greater challenges than before. Also the student body, being widely diverged and exposed to many electronic gadgets and technologies, requires a different teaching style. Indeed, there is a need for paradigm shift in teaching and assessment of learning. This paper addresses various issues in teaching introductory level business software in a teaching university. The students in the course come with different levels of ability, perception, learning habits, technical skills, and exposure to different types of technology. The course adopts the latest educational technologies (MyITLab and Blackboard) in delivering the course materials in face-to-face as well as purely online classes. The effectiveness of the course delivery, limitations and opportunities are studied through a well-designed questionnaire survey. A major finding is that students preferred self-directed study over rigid, teacher-directed class room based delivery.
Keywords: Paradigm Shift, Teaching and Learning, Course Effectiveness, IT-Based Course, Teaching University
- Querying a multi-version trajectory data warehouse
by Wided Oueslati
Abstract: Trajectory data warehouses, which gather data about mobile objects activities may be autonomous and consequently may change frequently their structures and contents. This kind of change can alter the trajectory data warehouse associated schema, the analysis process and thus the decision making requirements on which the initial conceptual model is performed. For this reason, a TDW maintenance technique is needed to adapt the defined schema. In this paper, we will focus on maintaining a trajectory data warehouse after schema changes using for that the versioning approach which allows the existence of many versions of a same trajectory data warehouse. However, querying such data warehouse versions is considered as a big challenge since data returned by queries may vary according to queried versions. Hence, a solution to ensure data mapping between different versions is required in order to give valid results necessary for providing elements leading to efficient decisions.
Keywords: Trajectory data warehouse modelling; trajectory data warehouse maintenance; multi-version trajectory data warehouse; querying multi-version trajectory data warehouse.
- Multi-Criteria Website Optimization using NSGA-II
by T.V. Vijay Kumar, Kumar Dilip
Abstract: It has been observed that organizations in order to be competitive are trying to maintain long-term relationships with their online customers. These organizations are mining information in log files or on-line forms with the aim of creating websites that can adapt to changing online buying patterns of customers. In addition to improving the browsing experience of the user, this would also lead to an increase in sales of the product. This problem of arranging web objects in an optimal manner, on a website, with respect to download time, visualization and potential sales of the product, has been addressed as a tri-objective optimization problem with the three objectives being minimizing the download or waiting time, maximizing the product visualization and maximizing the potential sales of the product. The proposed NSGA-II based multi-criteria website optimization algorithm is able to generate multiple web object sequences, with each providing optimal trade-offs between the three objectives resulting in the effective and efficient catering of the varied class of users.
Keywords: Web Usage Mining, Web Site Adaptation, Genetic Algorithm, Multi-objective Genetic Algorithm, NSGA-II
- Drivers of information and communication technologies adoption in Colombian services firms
by María Verónica Alderete, Luis H. Gutiérrez
Abstract: This paper analyses the determinants of ICT adoption in Colombian services firms using micro-level data. It contributes to the scant literature on the determinants of ICT adoption at firm level in emerging economies. Due to ICT heterogeneity, different econometric models are estimated to identify the drivers of ICT adoption. The results show that the factors that positively influence ICT adoption are the proportion of foreign capital, firm age, employees' education and the ICT spillovers from the corresponding service industry. Information spillovers from the service industry adopters to non-adopters are taken into account as determinants of ICT adoption. An extended version of the model explores the determinants of ICT adoption comparing large firms and SME. For some variables, such as proportion of foreign capital, firm age and employees' education, the results differ by firm size.
Keywords: ICT adoption; services; new information and communication technologies; developing countries; Columbia.
- Synchronicity in international stock markets: evidence from USA-South Africa
by P. Lakshmi, S. Visalakshmi, Kavitha Shanmugam
Abstract: The South African equity market witnessed very strong lift since 1994 and is included in BRICS countries in 2010. The emergence of the sub-prime crisis in the USA had an adverse impact on the global markets especially emerging market like South Africa. The primary objective of the present study is to analyse the distinctiveness of price movements and volatility spill over effects between the USA (NYSE) and the emerging economy of South Africa employing daily time series data spanning Jun 2006 to May 2012. The stock price synchronicity is examined using VECM-based causal relationship during the 2006-2012 (entire sample period) and 2007-2009 (financial crisis period). Further, the speed of transmission of shocks from the USA to SA in the long run, short run deviations and swiftness of recovery during the US subprime mortgage crisis is also analysed. The results reveal that both long-run and short-run dynamic nexus exist between these stock markets. In addition, the nexus is amplified in the short-run during the US financial crisis. This suggests that changes in the US stock markets swiftly affect the South African stock market and the US index acts as a conducing indicator for information transmission across the two markets.
Keywords: South Africa; USA; VECM; Granger causality; financial crisis.
- Design and implementation of a novel secure internet voting protocol using Java Card 3 technology
by Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi-Ghoushchi, Hadi Mikaili
Abstract: Internet voting is highly regarded for its speed, automatic counting, cost reduction and lower possibility of error. However, in order to replace traditional voting system with internet-voting, i-voting must meet many requirements and overcome some challenges like collusion, uncoercibility, unfairness and in particular voter insecure platforms. In this paper, we propose a very practical and secure internet voting protocol based on FOO with use of Java Card 3 which can help prevent voting fraud and addresses its major challenges. Java Card 3 technology is a new concept which provides the expected client-side security in a much higher level than an ordinary PC, which is highly vulnerable to infection via the network. Since with Java Card 3 technology the card acts as a secure web client (server) can address the voter side insecure platform problem which is one of main reasons for the delay in implementing I-voting in real world.
Keywords: elections; internet-voting; Java Card 3; coercion; cryptographic protocols; JEE technologies.
- How business intelligence works when analytics meet guanxi
by Bo Han, Shih Yung Chou
Abstract: Mainland China is an emerging market for business intelligence (BI). However, Chinese senior manager's ingrained guanxi-based decision making practices are considered the largest obstacle of the BI system diffusion to local enterprises. In the current research, we perform a comparison between business intelligence-based decision making philosophies (i.e., business analytics) and guanxi-based decision making philosophies in four dimensions: 1) the key player dimension; 2) the business practice dimension; 3) the time orientation dimension; 4) the performance measurement dimension. After the comparative study, we offer several propositions to practitioners in order to find the possibilities of introducing business analytics to Chinese enterprises that have been strongly influenced by guanxi networks.
Keywords: business information systems; business intelligence; business analytics; Chinese guanxi; social commerce; comparative study; China.
- Exploring information system evaluation in Indian manufacturing sector
by Khushdeep Dharni
Abstract: The present paper is an attempt to explore the IS evaluation in Indian manufacturing sector. It aims to find out the major dimensions for the evaluation of IS by the users and organisations. The results of the study are based on the primary data collected from 840 users taken from 70 large and medium manufacturing organisations using survey method. The results indicate that negligible IS evaluation was undertaken at the organisation level and the evaluation methodologies were technical in nature. Seven factors from user-based IS evaluation were deducted using factor analysis. No significant variation was found across these factors across different functional areas while significant differences were observed across different levels of management. The findings of the study carry value for the IS managers and vendors dealing with Indian manufacturing sector and provide a glimpse of the state of IS evaluation in India. The present study is an attempt to explore the IS evaluation in India, a relatively unexplored field till date, hence, provides valuable insights regarding the status of IS evaluation in Indian manufacturing sector. It will help in filling the existing IS research gaps in the context of India, an emerging market for IS/IT applications.
Keywords: information systems; IS evaluation; user evaluation; India; manufacturing.
- A framework for applying critical success factors to ERP implementation projects
by Rekha Gupta, S. Kazim Naqvi
Abstract: Enterprise resource planning (ERP) system is a tool to integrate the departments and functions across an organisation to help achieve its specific business goals and objectives. The complex and integrated nature of ERP system is often coupled with time constraints and substantial financial commitments that inevitably make its implementation to be a highly risky undertaking with an inherent high failure probability. Reviews of the existing literature on the subject suggest that critical success factors (CSFs) have been studied by researchers for risk aversion in ERP implementations. However, with no suggested methods or framework for monitor and control coupled with the inherent subjectivity, CSFs studies for ERP implementation find little practical usage. This paper proposes a framework for applying the earlier cited CSFs studies for ERP systems with particular emphasis on bringing objectivity leading to their effective monitoring and control. The paper also attempts to highlight the short-comings of existing CSFs studies based on the proposed framework.
Keywords: enterprise resource planning; ERP; critical success factors; CSFs; evaluative COUsage framework; completeness; prioritisation; objectivity; key assumption set; KAS; key information set; KIS; key decision set; KDS; use case support.
Special Issue on: "Building Information System Capabilities in the Age of Complexity"
- Supply Chain Management Practices IT Utilization Alignment: Impact on Supply Chain Performance and Firm Performance
by Sufian Qrunfleh, Monideepa Tarafdar
- Environmental Social Governance (ESG) Management: A Theoretical Perspective for the Role of Disclosure in the Supply Chain
by Vincent G. Whitelock
- Quantitative Analysis of the Effects of Dual Integration on firms Competitiveness
by Atsushi Akiike, YoungWon Park
- Success Factors of Online Services in Kathmandu, Nepal: An Empirical Analysis
by Shisir Prasad Manandhar, Seunghyun Kim, Junseok Hwang
- Interaction of Marketing and R&D and Critical Innovation: Case Study of Korean and Japanese Firms
by Geon-Cheol Shin, James Roh
- A Professional Training Program Design for Global Manufacturing Strategy: Investigations and Action Project Group Activities through Industry-University Cooperation
by Kin'ya Tamaki, YoungWon Park, Satoshi Goto
- International Entrepreneurship and Information Technology Strategies of the Multinational Enterprises from Emerging Markets
by OhSuk Yang, Ryosuke Sugie
- The role of IT for Global firms in Emerging Markets
by YoungWon Park, Paul Hong
- Stakeholders' Pressure and Managerial Responses: Lessons from Hybrid Car Development and Commercialization
by James J. Roh, Ma Ga (Mark) Yang, Kihyun Park, Paul Hong
Special Issue on: "Requirement Engineering Processes in Information Systems"
- Factors Influencing the Willingness to Implement Requirement Engineering Good Practices
by Rajesri Govindaraju, Bahana Wiradanti
- A Knowledge-Driven Approach for Specifying the Requirements of Multi-Agent System
by Vibha Gaur, Anuja Soni
- An Empirical Study of Automated Classification Tools For Informal Requirements In Large Scale Systems
by Adegoke Michael Abejide, Joshua O.A. Ayeni, Sogunle Francis Oluwasegun
- Thinking Cloud enabled adept and agile supply chain for SMEs: A conceptual study
by Sanjay Sharma, Bhavin Shah
- Understanding Heuristics Employed to Verify Non Functional Requirements of Web Based Applications in Pakistani Software Industry
by Asad Hanif, Irfan M. Khan, Saqib Saeed
- A Pattern-Based Approach for Workflow interconnection and Flexibility Support
by S. Boukhedouma, M. Oussalah, Z. Alimazighi, D. Tamzalit