International Journal of Business Information Systems (118 papers in press)
Investigating the Impact of Information Culture on the Adoption of Information System (IS) in Public Health Sector of Developing Countries.
by Dalbir Singh, Adnan Mukred, Nurhizam Safie
Abstract: Despite the importance of the information culture, little is known about the influence of information culture on the adoption of information systems (IS) among employees in public health sector of developing countries. This research explores the influence of information culture factors on employees behavioral intention to adopt IS. Information culture factors have been suggested as important predictors of IS adoption. Quantitative structured questionnaire was administered to 312 employees in public health sectors of Yemen. SPSS and Structural Equation Modeling (SEM) were used for data analysis and evaluation of the research model. The findings revealed that self-efficacy, social influence, performance expectancy and perceived access significantly influence employees intention to adopt IS. However, perceived need, perceived information sharing, and effort expectancy influence attitude significantly which, in turn, influences their behavioral intention. In addition, perceived awareness negatively influences behavioral intention. Moreover, facilitating conditions and effort expectancy did not have any significant influence on employees behavioral intention.
Keywords: adoption, behavioral intention, developing countries, information system, information culture, public health sector, UTAUT model.
The Use of UTAUT to Investigate the Adoption of E-Government in Jordan: A Cultural Perspective
by Ahmad Rabaa'i
Abstract: E-Government is believed to be vibrant in developing the public sectors around the globe, as it assures more accountability and transparency. Jordan, as a developing country, has developed a number of e-Government services. The success of e-Government services is dependent one both; the government support as well as citizens willingness to adopt those e-government initiatives. This study adopted a modified version of the unified theory of acceptance and use of technology (UTAUT) to examine factors that determine the adoption of e-government services in Jordan. Also, the study aims to examine whether and how national culture has an impact on e-government adoption. A survey collected data from 1132 users of Jordans e-government services. Using partial least squares (PLS) of structural equation modelling (SEM) analysis technique, the results show that all the five factors, namely: Performance expectancy, Effort expectancy, Social influence, Facilitating conditions and Behavioural intention have significant effect on the adoption of e-government services in Jordan.
Keywords: Culture, e-Government, ICT adopting, Jordan, UTAUT.
Prioritization of the solutions of Knowledge Management adoption in bank using FAHP
by Elahe Nadimi
Abstract: The aim of this study is to identify and prioritize the solutions of Knowledge Management (KM) adoption in Banks to overcome its barriers. It helps organizations to concentrate on high rank solutions and develop strategies to implement them on priority. This paper proposes a framework based on fuzzy analytical hierarchy process (FAHP) to identify and rank the solutions of KM adoption in banks and overcome its barriers. In this paper, banks(private bank , semi private bank and state-owned bank) have been prioritized regarding the level, the solutions of knowledge management adoption sub-criteria and quintuplet solutions of Knowledge Management adoption scopes (strategic barriers, organizational barriers, cultural barriers , Technological barriers , and Individual barriers ). Results show that private bank, semi private bank, and state-owned bank are on the first, second and last priority, respectively. The results obtained from fuzzy AHP methods indicate that strategic barriers are on the first priority and organizational barriers, cultural barriers, technological barriers, and individual barriers are on the next priority. Then regarding to the strategic barriers scales, it is realized that lack of top management commitment towards KM adoption is most important. Regarding to the organizational barriers scales, it is realized that, lack of proper organizational structure to create and share knowledge is most important. Regarding to the technological barriers index, it is realized that, lack of technological infrastructure to adopt KM is most important. Regarding to the cultural barriers index it is realized that, lack of willingness and sharing spirit among members is most important. Regarding to the individual barriers index, it is realized that, lack of time to share knowledge is most important.
Keywords: knowledge, knowledge management, Fuzzy Analytic Hierarchy Process
Identifying the causal relationship between social media content of a Bollywood movie and its Box-office success - A text mining approach
by Biplab Bhattacharjee, Amulyashree Sridhar, Anirban Dutta
Abstract: Marketing strategies for movies have undergone a rapid metamorphosis over the years with the progress of new technological innovations and its associated impact on consumer behavior. The advent of social media has brought a rapid transformation in the dynamics of marketing for both the service-providers and the customers. Social media gives a two way interacting platform for users and service providers and such interactions generate voluminous textual content which has a cascading influence on public mind-space. This mammoth data can be a source for deriving new insights into the customer behavioral dynamics and can also act as a handy tool for revenue enhancement. This study is designed to understand whether the polarity of the social media content of a Bollywood movie can essentially reveal any insights about the potential box office revenues. In this study, the initial steps involved data collection from social media, followed by text mining to identify the sentiments about a movie. The relationship between the sentiments captured from social media and total revenue generated was explored in both pre-release and post-release scenarios. Based on the data extracted from post-release settings, a linear regression model was built. In the model, the box-office revenue was considered as dependent variable and sentimental-metrics were taken as independent variables. The model was further statistically validated using covariance and correlation analysis. Based on this model, the first week box-office collection was predicted for the pre-release movies. The model so constructed was able to forecast the box-office revenues correctly to a larger extent. Further, improvement of this model by the incorporation of additional metrics can boost its effectiveness as a robust predictive system.
Keywords: Social Media, Sentimental analysis, Bollywood, Box-office, Text analytics
Keeping E-Business in Business: Identifying The New Perspective of Server Operating Systems
by Nijaz Bajgoric
Abstract: In today's e-business era system downtime equals to financial losses and going out-of-business. As modern business information systems are operated by enterprise servers, server operating systems that run them play crucial role in keeping application servers up and running. Therefore, considering server operating systems from business perspective and keeping them available 24x7x365 is critical for keeping e-business in business. The paper is aimed at identifying a business perspective of server operating systems as a core component of business information system infrastructures from business continuity perspective. A holistic framework of such a perspective is presented in the form of a conceptual model of server operating environment for continuous computing with major technology enablers. Model is supported by three cases and SWOT analysis.
Keywords: business information systems, e-business, server operating systems, business continuity, continuous computing
A STITCH IN TIME SAVES NINE: THE ROLE OF MORAL JUDGMENT IN REDUCING INTERNET POLICY VIOLATIONS
by Matt Campbell, jordan shropshire, Antonis Stylianou
Abstract: Internet access has become ubiquitous in many organizations. While employees need this access to perform their duties, many studies report a large percentage of employees use their work Internet access in violation of organizational policies. These activities can result in reduced efficiency, increased vulnerability to cyber-attack, and legal liability. Although firms vary according to their acceptable personal internet use policies, they tend to provide generic usage guidelines which do not provide a clear basis for decision making. We argue that the decision to use company internet resources for personal use is largely a moral decision, a fact which has been previously overlooked in research and in practice. In this study, we create and test a predictive model which is framed using moral judgment. The model is confirmed using a survey of 787 knowledge workers. Our results suggest that organizations should incorporate moral guidelines in their acceptable internet use policies.
Keywords: internet policy violations, perceived moral intensity, technology abuse, personal internet usage at work, moral judgment, organizational behavior
A Framework for Knowledge Sharing in ERP System Usage in Small and Medium Enterprises: A Preliminary Review
by Mohammad Bany Baker, Zawiyah Yusof
Abstract: Enterprise Resource Planning (ERP) system, a comprehensive integrated system, has been increasingly utilized in majority of organizations. Its success is noted in some organizations while in others, its failure is a topic for discussion. It is thus important to examine the way ERP system used in the context of organizations. Hence, knowledge sharing is key factor for success of ERP system usage. In this study, a framework of knowledge sharing for ERP system users in small and medium-sized enterprises (SMEs) is proposed. A thorough review of literature stresses on the factors that contribute to successful knowledge sharing. These are organizational, social capital, individual and IT-related factors. On the basis of such a review, the studys conceptual model was proposed comprising of four main constructs, which are organizational, social capital, individual and technological factors. It is recommended that future studies should conduct on the validity of the proposed conceptual model.
Keywords: Enterprise resource planning (ERP) system, Small and medium-sized enterprises (SMEs), Knowledge sharing, Social capital, Individual, Organizational, Technological factors.
Employee Performance Evaluation in Institute of Higher Education using Fuzzy AHP Methods
by Zahra Ghassabi
Abstract: Todays business executive is in a seemingly never ending search for employees who are not only high performing, but are also willing to remain and grow with the organization.( WRIGHT,2010).companies began to quantify , the most efficient method for performing each work task, piece-rate systems of compensation to maximize employee work effort, and the selection and training of employees based on a thorough investigation of their talents and skills) Ferris,2007). The main aim of this study was employees Performance evaluation at those Institutes of Higher Education. The model of the study is tested on a sample of 30 experts in Institute of Higher Education in Iran. The main instruments used for gathering the data in this study were Institute of Higher Education records and questionnaire. In this study, Personal qualities & strength , Management skills, Talent & aptitude sub-scales were ranked regarding to factor effective on Performance evaluation of employees including Personal qualities & strength , Management skills, Talent & aptitude by using Fuzzy hierarchical analysis (FAHP). The results obtained from fuzzy AHP methods indicate that Personal qualities & strength is more important than Management skills, Talent & aptitude. According to the Talent & aptitude factor, it is concluded that Subject knowledge is superior to other factors. According to Personal qualities & strength scale, it is concluded that Decisiveness are more important than other factors. According to Management skills scale, it is concluded that Time management are more important than other factors
Keywords: performance evaluation; Human resource practices; Organizational performance and Fuzzy Analytic Hierarchy Process.
An Integrative Model for Realizing Benefits from Enterprise Resource Planning Implementation
by Shahin Dezdar
Abstract: The purpose of this paper is to examine the role of project factors, technology factors and organizational factors in realizing benefits from enterprise resource planning (ERP) system implementation. This study is the first to conceptualize an integrated relationship between ERP implementation benefits, ERP project factors, ERP system factors, and organizational factors in one model. The study was conducted using a survey questionnaire. The questionnaires were distributed to ERP users in Iranian organizations and in total, 384 responses were collected and analyzed. The study showed that there is a positive relationship between project management, team composition and competence, top management support, enterprise-wide communication, organizational culture, and user satisfaction with ERP implementation benefits. The study also indicated that ERP system quality, ERP vendor support, and user training and education had positive relationship with user satisfaction and ERP implementation benefits accordingly.
Keywords: Enterprise resource planning; ERP benefit; ERP implementation; User satisfaction, organizational culture; Developing countries; Iran
To identify the Critical Success Factors for Cloud Computing Adoption by MCDM technique
by Rakesh Raut, Pragati Priyadarshinee, Manoj Jha, Manoj Kharat
Abstract: SMEs play a very vital role in each market by significantly contributing to each countrys Gross Domestic Product (GDP) and its labour market. Therefore proposing new strategies or developing new systems that can help SMEs become more efficient and productive is not only beneficial for SMEs but also for the economy of a Country as a whole. The decision about the selection of Cloud Computing adoption is crucial for every manufacturing company. However, the selection on an appropriate system may prove difficult, especially for small and medium manufacturing enterprises which may not have sufficient resources (money and personnel) to properly implement the system. This study aims to provide a systematic approach towards the cloud computing adoption, in which Analytical Hierarchy Process (AHP) are proposed. In this paper, Analytic Hierarchy Process is applied to find the importance degree of each criterion as the measurable indices of the cloud computing adoption. This study considers nine (9) criteria with fifty one (51) sub-criteria, which has somewhat already been used, and establishes a ranking model that provides decision makers to assessing the prior implementation of cloud computing adoption.
Keywords: Cloud computing, adoption, MCDM, AHP, SEMs.
E-Governance diffusion in the telecenters of Karnataka A gender analysis
by Lakshmi Shankar Iyer, Subba Rao
Abstract: E-Governance is the interaction between a government and its citizens to deliver services in an efficient manner by means of information technology and telecommunication. The current study takes into account three aspects namely - economical, governance and services that impact the e-Governance diffusion in the telecenters set up at the hobli level of Karnataka state. A framework is created with these aspects and validated through the present study. The study explores whether gender differentials exist in the e-Governance diffusion process. The research adds up to the literature in establishing that gender differentials disappear when the e-Governance is in the stage of maturity. One way ANOVA is used to identify the gender differentials in e-Governance diffusion through the NadaKacheri centres of Karnataka. The study proposes policy changes by the Government to render better services and governance to the citizens.
Keywords: e-Governance diffusion, telecenters, Gender and e-Governance, citizen services, citizen benefit certificates, gender differentials, NadaKacheri centers, hoblis, Atalji JanaSnehi Kendras, transparency, governance, e-Governance, accountability
USING AHP METHOD TO EVALUATE E-PAYMENT SYSTEM FACTORS INFLUENCING MOBILE BANKING USE IN IRANIAN BANKS
by Mohammad Osmani, Khaled Moradi, Rozan MZA
Abstract: Understanding the key factors influencing the use of mobile banking is vital for banking customers and managers. E-Payment systems play a key role in online banking. Nowadays, it has become more common to absorb new customers in order to use the mobile banking. However, in the mobile banking technology, the electronic payment systems need to be assessed from different viewpoints to boost the performance of these systems. Therefore, in this research, a multi-criteria decision making model (MCDM) is developed comprising the key factors that impact the mobile banking usage in the Iranian banks. From the literature, we developed a research model including 4 main criteria and 22 sub-criteria. For collecting data, 12 experts that had enough experience in working with online banking systems were requested to participate in the online survey. AHP as the multi-criteria decision making method is used for ranking the criteria and sub criteria to incorporate the research model. The obtained data were analyzed by using Expert Choice software. The pairwise comparisons results revealed that rom the main criteria, the most important factor that influence the use of Iranian mobile banking was the security infrastructure (with weight 0.375). Additionally, as the sub criteria, authorization in legal infrastructure, trust in socio-economical infrastructure, security in security infrastructure, and flexibility in technical infrastructure had high priority (with weights 0.538, 0.370, 0.297, and 0.199 respectively).
Keywords: Analytical Hierarchy Process; AHP; Online banking; Mobile banking; Critical factor; Electronic Payment System; Iranian banks.
Fine-grained opinion mining of product review using sentiment and semantic orientation
by Gaurav Dubey, Ajay Rana, Jayanthi Ranjan
Abstract: The reviews or feedback about the product or service has become quite significant in marketing, promoting or improvising the product or service. Since, the e-commerce or purchasing online products has become trend these days. The availability of product reviews is online and in the form of text. But these reviews are very much in the unstructured form which does not help either the new consumer or the organization to take up any decision further. In this paper, we have proposed an approach based on opinion mining and sentiment analysis. We have explored the sentiment orientation and sentiment classification to evaluate the customers review. The reviews of various mobiles were converted from unstructured to structure to extract the summarized knowledge from online reviews. The 1000 number of user reviews were explored and the empirical results found that the sentiment orientation and classification provides the effective methods for better decision making and benchmarking.
Keywords: Online Reviews, Semantic Orientation, Opinion Mining
Graphical Business Process Modelling Standards, Techniques and Languages A Literature Review
by Youseef Alotaibi
Abstract: Literature shows that there are many graphical business Process Model (PM) tools, techniques and standards. However, choosing the right tools and techniques with which to model BPs is very complicated as there are not as many guidelines to describe the concepts involved. Thus, the modellers should know the purpose of their model in order to select the right techniques and tools. Categorizing the different graphical business PM techniques, tools and standards into different groups with the same functions and characteristics can make logical sense of them. In this paper, we have categorized the existing graphical business PM techniques and tools into two groups: graphical standard at enterprise level and at process level, and have provided a comprehensive analysis on the existing graphical business PM techniques and tools. Our proposed literature review can help in enhancing manufacturing practice as it provides a right picture for the business analysts and modellers regarding what are the most satiable techniques for their cases and requirement. Thus, the manufacturing and companies process time, cost and performance can be enhanced and improved their revenue.
Keywords: Business Process Management (BPM); Business Process Modelling (PM); Business Process (BP); Enterprise Model; Graphical Standard; Literature Review; Process Model
Behaviour approach for composite OWL-S services discovery
by Maamar Khater
Abstract: Service discovery is the process of retrieving the service most similar to the query based on the description of functional and/or non-functional semantics. The matchmaking based only on service profile (inputs/outputs) is not sufficient in the case of composite services. to overcome profile matching limitations, we propose an approach based subgraph isomorphism to check the matching of process structure between two OWL-S process models of composite services and shortest path (OWLS-SP) to compute the score of matching between nodes of service and query (atomic services).
Keywords: Composite web services, OWL-S, matchmaking, subgraph isomorphism, shortest path, information systems.
Impact of Employees Participation in Communities of Practice (CoP) on Individual, Community, and Organizational Performance: A Case Study at PT PLN (Persero) Distribusi Jakarta Raya and Tangerang
by Devi Fitrianah, Samuel Rizal Harahap, Achmad Nizar Hidayanto, Dina Chahyati, Kongkiti Phusavat
Abstract: This research aims to evaluate the impact of CoP participation for individual, community, and organization performance, and to find the types of participation providing most benefits to PT PLN (Persero) Distribusi Jakarta Raya and Tangerang. The data were collected by sending questionnaires to the employees in 10 company areas, which resulted as much 238 copies. The collected data were processed with Partial Least Square (PLS). The result of this research showed that CoP proved to provide benefits for individuals and to the community as well as the organization indirectly. Moreover, types of participation that provides most benefits to performance are work barrier discussion, followed by success story discussion. However, career development discussion has not been proven to give benefit to organization.
Keywords: Communities of Practice; CoP; type of participation; individual performance; community performance; organizational performance; knowledge management; knowledge management systems; knowledge sharing; Partial Least Square (PLS); Indonesia
Assessing the relationships among information systems integration, coordination cost improvements, and firm profitability
by Adam Maiga
Abstract: This paper used a survey questionnaire approach to obtain results about the roles of bonding cost improvement, internal monitoring cost improvement and external transaction cost improvement in mediating the impacts of internal and external information systems (IS) integration on firm profitability. Results indicate that internal IS integration is significantly associated with external IS integration. Both bonding and internal monitoring cost improvements are significantly impacted by internal IS integration, while external transaction cost improvement is impacted by external IS integration. All three cost improvements are significantly associated with firm profitability. The effect of internal IS integration on firm profitability is mediated through both bonding and internal monitoring cost improvements. Similarly, the effect of external IS integration on firm profitability is mediated through external transaction cost improvement. Furthermore, the link between internal IS integration and profitability is mediated through external IS integration and external transaction cost improvement.
Keywords: Information systems integration, internal coordination costs, external coordination costs, profitability
The Evolution of the Business-IT Strategic Alignment Process: Key Insights and Emergent Views from a 40-year Period (1975-2014)
by Manuel Mora, Fen Wang, Mahesh Raisinghani
Abstract: The process of Business-Information Technology Strategic Alignment (BITSA) has been consistently ranked as a top priority by Chief Information Officers (CIOs). For over three decades, a vast amount of conceptual and empirical research on BITSA has been conducted. Main outcomes of BITSA research include constructs on the BITSA process, frameworks for understanding its main components, models for predicting its successful occurrence, and methods for guiding toward a successful BITSA process. However, the BITSA literature can appear as contrasted and fragmented for researchers, and copious and ambiguous for CIOs given the multiple views and recommendations for achieving the BITSA objectives. Thus, in this paper we conduct a selective yet intensive literature review on the BITSA process with the aim to provide a summary of core concepts, an evolution model, and an account of theoretical and practical implications. Through this literature review, a four-stage evolution model of BITSA emerges and an updated view of the BITSA process as a complex adaptive system is supported.
Keywords: Business-IT Strategic Alignment (BITSA) process, IT Strategy, Business Strategy, IT Strategic Planning, Complex Adaptive System (CAS), Chief Information Officer, CIO
Barriers and Benefits of Using Social Networking Sites versus Face-to-Face Meetings for Sharing Knowledge in Professional Societies
by Kamla Ali Al-Busaidi, Gillian Ragsdell, Ray Dawson
Abstract: Abstract. This study aims to assess the benefits and barriers of social networking sites (SNS) for sharing knowledge in professional societies, compared to face-to-face meetings (F2F). SNS can be a valuable technology for non-profit organizations. Studies have investigated the barriers and benefits of knowledge sharing in firm-based communities of practice (CoP) or virtual CoP, but not much is known about professional societies use of public SNS for knowledge sharing. Based on two rounds of a Delphi study, the results revealed the benefits and barriers of F2F meetings compared to the benefits and barriers of SNS for sharing knowledge in professional societies.
Keywords: Keywords: knowledge sharing; professional societies; social networking sites; SNS, face2face meeting; delphi study; knowledge management; knowledge; social media; social networking; knowledge sharing benefits; knowledge sharing challenges.
Testing and Validating the ERP Success Evaluation Model for Higher Education Institutes of Pakistan
by Sehrish Nizamani, Khalil Khoumbati, Imdad Ismaili, Saad Nizamani, Sarwat Nizamani, Nazish Basir
Abstract: Higher Education Commission (HEC) of Pakistan has taken profound measures to bring significant improvement in public sector universities of Pakistan. HEC signed an agreement with Oracle PeopleSoft to equip public sector universities of Pakistan with high-tech Information Technology (IT) solutions. To this end, HEC initially implemented Enterprise Resource Planning (ERP) campus management system in seven universities of Pakistan as a pilot project. Since then, it has been considered as an important shift from standalone legacy systems to campus-wide integrated ERP system. However, there is void in literature to evaluate ERP implementation in various public and private sector universities of Pakistan. This research formulates a conceptual model for ERP success factors based on strong background theories to effectively evaluate the success of ERP system implementation in public and private universities of Pakistan. A questionnaire based on online survey approach was used to collect data from 323 respondents from various universities of Pakistan. The respondents were active users of ERP. Findings of the paper result in a refined model for analyzing success of ERP implementation in various universities of Pakistan. By employing this model, the paper also reports on the success and failure of ERP implementation at several universities in Pakistan. Finally, the undertaken study implies that its findings may substantially add regarding the future decisions of ERP implementations.
Keywords: Enterprise Resource Planning, ERP, Oracle PeopleSoft, Campus Management Solutions, CMS, Higher Education Institution, HEIs, Pakistan
Assessing the impact of Information Technology excellence on firm profitability and market value in emerging economies: A study from India
by Bharat Arora, Zillur Rahman
Abstract: Investments in information technology (IT) form a substantial portion of capital expenditure of firms, and organizations are constantly looking for ways in which IT can be used to attain sustained profitability. However, there is scarcity of empirical studies that have examined whether IT can provide sustained competitive advantage to firms in major emerging economies such as India. This study seeks to empirically test whether superior IT capability can provide sustained profitability to multinational corporations and domestic firms in India. To this end, the financial performance of 94 firms from 15 different industry sectors has been analysed to determine whether superior IT capability of these firms led to improved profitability. Our results show that superior IT capability does not provide competitive advantage to firms operating in India. Another important finding of this research is that in recent years stock markets have given higher valuation to firms with superior IT capability despite the fact that superior IT capability is not associated with improved profitability. This finding has direct implication for investors and financial analysts who still perceive that IT capability can provide higher profitability to firms.
Keywords: Information Technology; Competitive advantage; IT investments; Emerging markets; India; Business value of IT.
INTERNET FINANCIAL REPORTING: USER PERCEPTION IN INDONESIA
by Luciana Spica Almilia, Sasongko Budisusetyo
Abstract: The objective of this research is to conduct a survey of the users of financial information through the company's website related to the kind of information the user needs information website company (include: investors, stock analysts, public accountant). This research is not to test hypotheses, but rather on how the company's website information the user needs, ie: investors, stock analysis, public accountant, lecturer and researcher in the field of Accounting.rnThe study explores the user perception in terms of the company's website: (1) websites frequently visited and trusted, (2) the purpose of visiting the company's website, (3) the information provided in the company's website, (4) the company's important information needed by the user, (5) assessment of the company's website, (6) reporting of financial information over the Internet can replace the financial statements are printed on paper, and (7) the standardization of financial information on the Internet. Respondents in this study were 73 respondents, but 7 are not complete in filling out the survey research. Total respondents that can be analyzed are 67 respondents.rnThe results of this study show that: (1) users of financial information companies very rarely visit the company's website and more frequently visit and trust the stock exchange website, (2) a company's financial report key information sought by users of the company's website, (3) financial statements users can obtain the necessary financial information on the company website, (4) the company is not optimally utilize the company's website as a media to disseminate information to the user company information, (5) the required financial reporting by the user is printed financial information.rn
Keywords: internet financial reporting, company’s website, financial information, internet, technology
Social Media Marketing: Literature Review and Future Research Directions
by Mayank Yadav, Zillur Rahman
Abstract: In a decade's time, the social media has not only brought about drastic changes in the mode of communication but has also become an important marketing tool, making it an area of eminent interest for the academicians as well as the industrialists. This study provides a taxonomic classification of the social media research articles published in the marketing journals listed on the website of the Academy of Marketing Science, from 2004 to March 2015. In addition to it a framework depicting various antecedents, mediators, moderators and consequences has been developed. This is presumably the first exhaustive review of the literature on the social media for the period 2004-March 2015, comprising both classification of the literature and various constructs adopted in the social media research. It contributes to the existing body of literature by providing more comprehensive knowledge of the trends in, and the cause-and-effect relationship between the constructs used in the social media research.
Keywords: social media; social media marketing; user generated content; literature review.
Holistic Procedures for Contemporary Formative Construct Validation using PLS: A Comprehensive Example
by Ahmad A. Rabaa'i
Abstract: Sound advice from knowledgeable methodologists synthesized from the literature, has yielded herein a complete and readily useable set of guidelines for best-practice contemporary formative construct validation using partial least squares (PLS). Procedures are logically organized around indicator level and construct level validation. Indicator level validation is concerned that each indicator contributes to the formative construct by carrying the intended meaning. Tests advocated are in attention to: (i) potential multicollinearity, (ii) formative indicator weights, (iii) formative indicator loadings, and (iv) formative indicator criterion validity. These procedures are advocated at all formative levels of the focal construct, thus guidelines presented are sufficient whether validating formative constructs that are multidimensional (multiple levels) or unidimensional (single level). Construct level validation includes tests of: (i) nomological validity, and (ii) external validity. Assessing nomological validity involves evaluating the extent to which the formative construct behaves as expected within its network of hypotheses. Testing the external validity of a formative model entails assessing the extent to which the formative indicators in combination capture the full domain of the construct.
Keywords: Information Systems Evaluation, IS-Impact, Formative Construct Validation, PLS, SEM
An empirical investigation of online review diagnosticity
by Amar Raju.G, Dennis Joseph
Abstract: Online reviews have become an essential tool for evaluating products and services with the exponential growth of online shopping. Marketers are also using online product reviews as important promotional tools that motivate the consumers to buy. Websites that provide better information in the form of online reviews will eventually attract more consumers. In this context, it is important to improve the perceived diagnosticity of online reviews. Present empirical study aims to investigate whether argument quality and source credibility of information in online reviews affect the review website diagnosticity. The study also investigates whether this perceived diagnosticity in turn affects consumers attitude towards the website and revisit intention.
Keywords: Electronic word of mouth communication, product reviews, online reviews, argument quality, source credibility, diagnosticity.
ARE ENTERPRISES READY FOR BIG DATA ANALYTICS? A SURVEY BASED APPROACH
by Habib Ullah Khan, Vitor Fabian Brock
Abstract: Big data analytics is a fascinating topic in the field of computer science and information systems as it challenges fundamental aspects of computation. Big data analytics also challenges technology adoption theories as it dramatically changes the way organisations and people manage large quantities of information. The aim of this study is to investigate the acceptance and usage of big data analytics in enterprises, and to understand how end-users perceptions and organisational factors influence the implementation of big data projects. This study unfolds in two objectives. The first objective is to examine the concepts and elements of big data and big data analytics. Big data analytics is not a single off-the-shelf product, or a one size fits all solution but high-volume, high-velocity, and high-variety information assets that exceed the capabilities of traditional storage infrastructure, computing environment, database systems and human resources. There are benefits in all industries apart from the data driven organisations. The second objective is to propose and empirically validate an extensive model of technology acceptance incorporating individual perceptions and organisational elements. The proposed research model expands the traditional technology acceptance model (TAM) by incorporating the dimensions of organisational learning capabilities (OLC). This study surveyed 359 information technology professionals from 83 countries in various industries who are studying at the University of Liverpool Online. This study provides relevant academic and practical insight as it integrates two technology adoption frameworks to explain the adoption of big data analytics.
Keywords: Technology Acceptance Model (TAM); Organizational Learning Capabilities (OLD); Big Data; Exabyte.
Privacy-Preserving Item-based Recommendations over Partitioned Data with Overlaps
by Ibrahim Yakut, Jaideep Vaidya
Abstract: User ratings are vital elements to drive recommender systems and, in the case of an insufficient amount of ratings, companies may prefer to operate recommender services over partitioned data. To make this feasible, there are privacy-preserving schemes. However, such solutions currently have not comprehensively investigated probable rating overlaps among partitioned data. Such overlaps make collaboration over partitioned data more challenging, especially if overlapped values are divergent. In this study, we examine this privacy-preserving recommender problem and propose novel schemes in this sense. By means of our schemes, two parties can perform item-based collaborative filtering over partitioned data with divergent overlaps. We also show that the proposed solutions promote prediction quality with tolerable overheads.
Keywords: Collaborative filtering; privacy; arbitrary partitioning; rating overlaps
Differences in Information System for Exploratory and Exploitative processes of Innovation and UDR/USR type of Innovators
by Vinay Singh, RRK Sharma
Abstract: Literature on innovation suggests that innovative business units seem to be information intensive and ambidextrous in nature. Some business units carry out exploratory and exploitative processes under different roof (UDR) and others under same roof (USR). To establishing the balance between exploration and exploitation in Innovators, Information System (IS) plays important role to share the information accurately, timely, effectively and efficiently. Present study explores three aspects: (1) differences in focus (clear v/s unclear orientation) of Information System in UDR and USR type of innovative business units; (2) difference in characteristics of IS facilitating exploratory activities v/s exploitative activities considering (i) type of information being used (ii) its flexibility and; (iii) business processes characteristics as mapped on IS. The study framework is set in the form of nine hypotheses and verified through primary data obtained from 31 Innovators (15 UDR and 16 USR types) through structured questionnaire. Majority of the hypotheses are supported from the data. The study attracts new researchers to enhance flexibility dimensions of IS to cope-up with the rigor of innovation activities and fragile innovation process.
Keywords: UDR and USR type of Innovators, dimensions of IS, Exploration/Exploitation processes, Linkage of Information System and Innovation
E-Commerce market trends: A case study in leveraging Web 2.0 technologies to gain and improve competitive advantage
by Ching Chieh Kiu, Chien Sing Lee
Abstract: The emergence of Web 2.0 technologies have changed the way e-commerce can be sustained and improved to enhance competitive advantage. Integrating Web 2.0 technologies into e-commerce websites not only improves customer shopping experience but also enhances customer engagement. These evolutions in organizational and technological development require categorization in order to be understood holistically and consequently, to be exploited fully. This paper evaluates the adoption of Web 2.0 technologies in Malaysian E-commerce. The paper also examines Malaysian E-Commerce engagement on Web 2.0 technology platforms to improve customer shopping experience and customer engagement at their online retail store. Findings on Web 2.0 technologies usage in 10 top e-commerce websites in Malaysia shows that most of the e-commerce websites have substantially integrated Web 2.0 technologies in their online retail store to gain and improve their competitive advantage. Furthermore, increased frequency of engagement in social mediums such as Facebook increases impact in terms of effect on customer shopping experience and customer engagement at online retail stores. In summary, Web 2.0 technologies influence changes in customer purchase behavior, shopping experience and ultimately, the dramatic change in top 10 ranking in the Malaysian e-commerce landscape.
Keywords: Competitive Advantage, E-Commerce, Online Shopping, Web 2.0 Technologies, Malaysia
A Semantic Sense-and-Respond Approach to Managing IT-enabled Buyer-Supplier Relationships: An Action Research Study
by Mala Kaul, Jing Betty Feng, Lars Mathiassen
Abstract: As a reflection of the strategic importance of buyer-supplier relationships in supply chains, information sharing and knowledge exchange have been found to positively impact coordination, transparency, and perception of trust between buyers and sellers. However, our knowledge about IT as an enabler in buyer-seller relationships is limited. Against this backdrop, we examine how a large retailer, BuildSmart, adapted and leveraged a portal to help listen to the voice of their suppliers. Through a collaborative action research project, we developed a semantic sense-and respond approach to design and implement mechanisms that allowed BuildSmart to continuously sense how suppliers experienced their portal and how to generally improve their supplier relationships. As a result, we present a conceptual model for managing IT-enabled buyer-supplier relationships and demonstrate how conceptual modeling can be combined with sense-and-respond thinking to support IT-enabled process management.
Keywords: Buyer-Supplier Relationships; Supplier Portal; Sense-and-respond; Conceptual Modeling; Collaborative Action Research
A New Architecture Of Cloud Computing To Enhance The Load Balancing
by Ashraf Aljammal
Abstract: One of the emerging trends in IT environment is the cloud computing with various requirements and huge resources. Therefore, efficient load balancing guarantees an efficient resource utilization to cope with the increasing users demands. Consequently, this paper proposes a new architecture in cloud environment for load balancing. The proposed architecture taking advantage of the clients machines resources for distributing the cloud tasks among the clients machines rather than relying only on datacenters. The proposed architecture has been implemented using the cloudAnalyst simulator. The simulation results show an efficient load balancing through minimizing the computational load on the cloud servers and hence, improve the overall cloud performance compared to the traditional architectures.
Keywords: Cloud computing; load balancing; new load balancing architecture
Analysis of Big Data Vendors for SMEs
by Pedro Neves, Jorge Bernardino
Abstract: Big Data is a cutting-edge research topic among both academic and business areas that aims to provide ways to store and process massive volumes of data. The paradigm became an ever-increasing business as some companies focus on providing Big Data platforms and analytical tools to extract information from available data. Such features are in accordance with the interests of Small and Medium Enterprises (SMEs), since it allows them to implement sophisticated decision support systems in order to gain competitive advantage over their opponents. Hiring a service from a Big Data vendor allows SMEs to avoid the initial investment and focus mainly on their business needs. However, choosing a vendor is not an easy task and the lack of understanding over Big Data technology is very high, especially among SMEs. Therefore, this paper provides insights over Big Data, discusses the functionalities of 9 major Big Data vendors - Amazon AWS, Cloudera, Hortonworks, IBM, Intel, MapR, Microsoft, Pivotal and Teradata - and presents the best solutions regarding current offering, strategy and market presence of each of the vendors.
Keywords: Big Data for SMEs, Big Data vendors, Big Data platforms.
Collaborative Education in a Virtual Learning Environment
by Hani Bani-Salameh
Abstract: For the last few decades, there was tremendous interest in harnessing 3D virtual environments for education and training. Multi-user game-like environments make use of non-player characters and quest activities in tutoring and training. This approach incorporates successful active learning and incremental progress. This article presents issues encountered while adapting the multi-user online game genre for educational virtual environments. In this endeavour, non-player characters play a central role in organizing and delivering educational content. Educational virtual environments call for additional kinds of extension beyond generic user content creation as delivered in some virtual worlds like SecondLife.
Support for these environments will emphasize the creation of new activities. A set of libraries and techniques named Portable Non-player character tutors and Quests reduces the effort needed to develop and integrate educational non-player characters. These non-player characters are introduced in CVE, a platform for rapidly developing educational virtual environments. The Portable Non-player character tutors and Quests framework enables formatted web-based exercises, quizzes, and educational content to be incorporated into virtual worlds, reducing the effort needed to create new content. The framework presented in this article introduces initial non-player characters that supports educational quest activities to the 3D environments users.
Keywords: Virtual World; Collaborative Virtual Environment (CVE); NPCs;rnEducational Quests; MMO.
IDENTIFICATION OF CRITICAL BARRIERS IN CLOUD COMPUTING ADOPTION BY ENTERPRISES USING SYSTEMATIC REVIEW METHODOLOGY
by Abdulrahman Altalhi, Saleh Alshomrani, Shahzad Qamar, Shehram Akram
Abstract: Cloud computing has been an area of intense interest recently because of its unrivaled advantages to the computing world however businesses are still skeptical of using it because of the different issues that come with it. While there are many factors that can be stumbling blocks for enterprises to use cloud computing, we targeted the factors that hinder the businesses to use the cloud. We conducted a systematic literature review (SLR) in order to come up with a comprehensive answer to our research question. During the process of conducing our SLR we targeted five major and reputable databases to dig for relevant literature. The studies selection and data extraction process was based on a well-documented protocol. Our results extracted were specifically in relevance to our research question. The results (factors/barriers) went through different data visualization techniques to identify different metrics and patterns such as the most/least influential barriers, research diversity, publication pattern, research by year etc. Our results extracted clearly identified the areas and domains, which requires further attention, and the areas that have been well researched. The SLR, we conducted, will help researchers identify gaps in current research for future research on issues that discourage and stop enterprises from using the cloud.
Keywords: Cloud Computing, SLR, Enterprises
Social Commerce Adoption Research from the Consumer Context: A Literature Review
by Salma S. Abed, Yogesh K. Dwivedi, Mike Williams
Abstract: This study examined the adoption of social commerce from the consumer perspective of information technology innovations. An overview of the concept of innovation adoption and social media definitions and functions are presented as well as the concepts of social commerce; these are identified to offer some background. Furthermore, previous researches investigating social commerce are highlighted and the empirical research investigating social commerce adoption utilising IS theories are described in detail. Finally, the discussion, research gaps and future lines of research are highlighted.
Keywords: E-commerce; Social Media; Social Commerce; Consumer
The Determinants of Internet Financial Reporting (IFR) in Jordan: Financial versus Corporate Governance
by Mohammed Yassin
Abstract: The Internet has become widely used as a channel to disseminate financial information by Jordanian listed companies in response to the cross-listing agreement among the Amman Stock Exchange (ASE), Abu Dhabi Securities Exchange (ADX) and Dubai Financial Market (DFM). This study aimed to investigate the determinants of Internet financial reporting (IFR). The results should help policy makers and regulators in building a framework for mandating IFR. An IFR index was developed to measure the level of each firms information content and format disclosures. IFR determinants were divided into financial characteristics and corporate governance mechanisms. The analysis determined that firms that are larger, profitable, and more leveraged, with a separation between chairperson and CEO positions, with larger board size numbers, and with fewer independent non-executive directors are more likely to engage in IFR. By extending the analysis using OLS and 2SLS regression, the findings suggest that IFR was predicted using size, liquidity, leverage, market-to-book ratio, chairperson/CEO separation, independent non-executive directors, board size, and shareholder number. Corporate governance mechanisms can predict IFR and its components, content and format more accurately than firms financial characteristics.
Keywords: Internet Financial Reporting; Voluntary Disclosure; Corporate Governance; Jordan.
Adoption of Self Service Banking Channels The Case of Mobile Banking in India
by Kalaiarasi H., Lakshmi P.
Abstract: Mobile banking is an innovative, technology based, cost efficient, expedient and time saving, self-service channel for banking customers as compared to conventional branch banking. Though India has a strong potential for mobile banking usage, it is observed that only 5% of mobile subscribers are registered users of mobile banking,which is very low as compared to other developed countries. This study explores the aspects that affect an individuals intention to adopt mobile banking services in India. Perceived risk is a critical factor that can influence adopting or continuing with any new technology. Hence a modified model of Brown et al., (2003) that merges risk rnperception with the features proposed by decomposed theory of planned behaviour, Diffusion of Innovation theory is developed and tested in the Indian context. The results reveal that adoption of mobile banking by Indian customers is affected by lack of security and privacy, whereas innovation features such as relative advantage, compatibility, trialability, self-efficacy and technology support positively influence mobile banking adoption. rn
Keywords: Innovation; Financial service; E-banking; mobile banking; India
An Influence of Human Emotion Expressed through Social Networks in Viral Marketing
by Anthoniraj Amalanathan, S Margret Anouncia
Abstract: Social networking is a multidimensional content and knowledge-sharing on-line communication media. Presently, the social network influences users' activities, such as identity creation, sharing, conversation, relationship establishment, presence indication, group participation, and reputation. In a way, these activities do reflect an individual's behaviour. As social networks allow any on-line content to be shared, it is possible to utilize this channel to employ in marketing effectively. As of now, the major challenge of social marketing is selecting and understanding the target audience to develop campaigning strategies. One way to understand users is to know the emotions they express when communicate content through social networking. This paper attempts to study the nine basic human emotions and their significance in various social network activities to determine the right strategies of marketing. A suitable marketing strategy and tools to attract users can be developed in e-Business with the help of extracted information.
Keywords: Social Network; Emotions; User Behaviour; Personalization; Viral Marketing.
Similarity upper approximation based clustering for recommendation system
by Rajhans Mishra, Pradeep Kumar
Abstract: Web has evolved enormously in the past few years resulting in a rapid increase in the number of web users and web pages. Web personalization has become a challenging task for e-commerce based companies due to information overload on the web and increase in the number of web users. Recommendation systems generate recommendations to users for various products as per their requirements. Recommendation systems have been widely used in e-commerce websites and have become an integral part of the e-commerce business process. Developers try to customize web sites to suit the needs of specific users utilizing the knowledge acquired from users navigational behavior.
The current study focuses on development of a framework for a web recommendation system on the basis of sequential information present in web logs. Rough set based clustering using similarity upper approximation has been utilized to generate soft clusters to capture the multiple interests of users. The proposed recommendation system can predict the next possible page visit of the user based on the sequential information present in their navigation pattern.
Keywords: Web recommendation system, Rough Sets; Clustering; Web data
The customers perception of Mobile Banking adoption in Chennai city. An empirical assessment of an Extended Technology Acceptance Model
by Kumar G, Shenbagaraman V
Abstract: To improve bank performance and customer satisfaction strong technology based services are important for banks. The mobile phones especially the smart phones are becoming most important channel for banking due to easy accessibility. The expanded use of smart phones has increased demand for mobile banking services and is like to have significant effects on banking experience. The purpose of this paper is to investigate the factors influencing the adoption of mobile banking services in Chennai.The secondary data were used for providing the theoretical background of the research problem. The secondary data includes journal articles , reference books and web contents. The primary data collected by the researcher through the questionnaire. The survey was conducted in Chennai city. The research model includes six constructs Perceived Ease of Use, Perceived Usefulness, Relative Advantage, Quality of System, Personal Innovativeness, Self Efficiency each of which measured with the item Intension to use mobile banking. The construct were taken from the Technology Acceptance Model (TAM), Innovation Diffusion Theory (IDT) ,Theory of Planned Behaviour(TPB),Extended Technology Acceptance model. Data analysis result that the constructs Perceived Ease of Use, Perceived Usefulness, Relative Advantage, Quality of System, Personal Innovativeness, and Self Efficiency have a direct influence on the adoption of mobile banking in Chennai. Further examination of the inferential analysis highlighted that level of education and income level of respondents may be a major determinant in influencing the adoption of mobile banking. The limitations of this study are the sample was composed of mobile banking users only and non users are not considered for study. This research provides banking institutions with significant information on the various aspects that need to be highlighted in their mobile banking strategies to increase the adoption rate of mobile banking services
Keywords: Mobile Banking Adoption, Intention, Technology Acceptance Model, Perceived Ease of Use, Perceived Usefulness, Relative Advantage, Quality of System, Personal Innovativeness, Self Efficiency
A Theoretical Discussion of Factors Affecting the Acceptance of M-commerce among SMTEs by Integrating TTF with TAM
by Saleh Alqatan, Noor Maizura Mohamad Noor, Mustafa Man, Rosmayati Mohemad
Abstract: Tourism is an information-based industry and innovative mobile applications are believed to provide new business opportunities for the industry. Most tourism firms throughout the globe consist of Small and Medium-sized Enterprises (SMEs) and as such, SMEs utilization of information systems (IS) is crucial in terms of added efficiency, effectiveness and innovation. However, the acceptance of M-commerce in SMEs remains very low, while the factors impacting the application of IS are still ambiguous. The objective of the current study was to integrate TTF with TAM to investigate the determinants of user acceptance of M-commerce among SMTEs. The study provides advanced knowledge of customers acceptance of M-commerce in SMTEs, which will help the M-commerce providers in such enterprises to understand the factors that influence the acceptance of M-commerce in SMTEs. This in turn would play an important role in increasing the acceptance level of M-commerce among SMTEs.
Keywords: M-commerce; SMTEs; TAM model; TTF model
A Framework introducing implications of RFID network threats to Businesses
by Sami Miniaoui, Suadad Muammar
Abstract: The radio frequency identification (RFID) technology is increasingly used in several industries for various business tasks (item tracking, inventory, etc.). Many types of security threats to RFID networks have been identified, but the impact of these threats on businesses remains unclear. This research aims at proposing a framework detailing the implications of RFID security threats to businesses. We followed an interpretive study to draw up the proposed framework. Based on a literature review, we established a classification of RFID usages (inventory management, payment systems, identity control, and tracking systems). A number of RFID network security threats (denial of service, spoofing, relay, etc.) were identified and explained. Consequently, a framework linking RFID threats to different types of usages in applications is proposed and explained. This framework exposes clearly the implication of every RFID threat on a specific usage of RFID regardless of the industry (healthcare, education, etc.).
Keywords: RFID; RFID networks; RFID threats; business implications; RFID usage; RFID framework; security threats; privacy; data security; corporate data
Predicting the likelihood of dividend payment from Indonesian public companies with Data Mining Methods
by Raymond Kosala
Abstract: Making decisions about dividend payment is one of the most important choices for public companies. In finance literature, deciding to pay dividends is a controversial subject. Thus there are several theories on the reason why companies choose to pay dividends. This paper investigates the likelihood of dividend payment from public companies in Indonesia using some artificial intelligence and statistical techniques. In the process, the possibility of using dividend related data from public companies as a dataset for predictive techniques is analyzed. Then domain expert knowledge is used from finance literature to determine the predictor variables. Next predictive models are developed for the likelihood of using dividend payments by applying four different methods: logistic regression, artificial neural networks, decision tree induction, and support vector machines. Afterwards, the predictive accuracy performance of the models generated by these methods is examined. Finally, the resulting decision tree model is analyzed and the validity of the resulting predictive model is confirmed with a domain expert. Then the resulting model is converted to create simple and understandable if-then rules, which can be used by company management to make decisions on dividend payments in practice. These if-then rules support the lifecycle theory of dividends as exhibited in previous works.
Keywords: Dividend Policy; Dividend Policy Forecasting; Decision Support Systems; Logistic Regression; Artificial Neural Networks; Decision Trees Induction; Support Vector Machines.
Factors Identification of Online Reputation and Relationship with Trust: A study of Generation Y
by Rashik Gupta, Karteek Ponnuru, Anil Kumar, Shrawan Trivedi
Abstract: Trust is a major factor for business let it be online or offline without trust a business transaction is impossible. Trust and Reputation together act as a key differentiator in determining the success or failure of any firm. But there has been comparatively little research examining the relationship between trust of Generation Y and online reputation. To fill this void in the existing literature, the objectives of this study are twofold: first is to identify the factors structure of online reputation and second is to find the relationship between identified factors with customers trust related to online purchasing. Data has been collected from Generation Y through a structured questionnaire. Exploratory factor analysis is used to find the factors structure of online reputation and multiple regression analysis is utilized to find the relationship with the trust of customers. The study has findings in terms of what Generation Y needs and looks for in an e-commerce site before purchasing and this find can help the service provider to target Generation Y in the digital platform.
Keywords: Online Trust, Online Reputation, Generation Y, Exploratory factor analysis, multiple regression analysis, e-commerce
INFORMATION SYSTEM CONTINUANCE USAGE: MODERATING ROLE OF HABIT
by Thomas John Paul, Jayanth Jacob
Abstract: This study helps in the understanding of Indian customers evaluation of loyalty and its antecedents. Extending the Information System (IS) continuous usage theory, an empirical study has been carried out on the determinants affecting loyalty of the Indian customers using self-service technology (web-store) for online shopping. In this study, habit is proposed of having a negative moderating outcome effect and a positive moderating outcome effect on trust and loyalty and on satisfaction and loyalty respectively. This study also investigates the threshold characteristic of satisfaction and trust with the introduction of habit. Data collected from 245 customers strongly substantiates the research model. The empirical results demonstrate that trust, satisfaction and habit have positive impact on loyalty. The study also finds that a customers past habitual experiences reduce the effects of trust on loyalty and satisfaction on loyalty. The details of the study, analysis and results are described in this paper.
Keywords: Loyalty, Habit, Satisfaction, Trust, Information system continuance, Self-service Technology
Antecedents of Intention-to-Use of E-Audit System: A Case of the Audit Board of the Republic of Indonesia
by Dyah Dharma, Puspa Sandhyaduhita, Ave Pinem, Achmad Hidayanto
Abstract: E-Audit is a form ofe-government that is utilized by the Audit Board of the Republic of Indonesia (BPK-RI) to assist the state's financial auditors. However, when conducting audit not all auditors use the e-Audit. This study was conducted to determine factors that affect auditors in using e-Audit by combining theoretical models from the Technology Acceptance Model (TAM), the Innovation Diffusion Theory (IDT), the DeLone & McLean Information Systems Success Model, with individual dimensions on the Technology Readiness Index (TRI) and variable of management support. From the questionnaires that were distributed and collected from BPK RI's ministries and agencies auditors, we obtained 185 samples.The data were then analyzed using Partial Least Squares on Structural Equation Modeling (PLS-SEM). The results showed that quality system of e-Audit, compatibility e-Audit with the audit process, perceived usefulness and perceived ease of use, have positive influence either directly or indirectly on the auditor's intention to use e-Audit. While the auditors discomfort feeling of new technologies will have negative effect indirectly on the auditors intention to use e-Audit.
Keywords: E-Audit; intention-to-use; TAM; IDT; TRI; PLS-SEM; Indonesia
PROMOTING SOFTWARE INDUSTRY IN ECUADOR: STRATEGIC THINKING
by Hotniar Siringoringo, José Silva, Jaime Albuja, Andrés Navas, Ramiro Valencia
Abstract: The objective of the research was to identify significant variables in promoting Ecuadorian software industry. Questionnaire was deployed to collect data. Questionnaire in closed loop form consists of questions related to the need of government intervention in order to promote software industry. Questionnaire was distributed to software industry management through Survey Monkey website. A number of 60 responses to the survey during 2 months and 38 responses were valid to proceed to data analyses. Data analyses were performed using descriptive statistic and Chi-square for hypotheses test. Result showed that government intervention on investment (2 indicators), tax reduction, cost of promotion, skilled labour (4 indicators), and export bureaucracy significantly will promote the software industry.
Keywords: Ecuador, foreign direct investment, government intervention, promotion, software industry
Enhance the Retrieval Performance in Content Based Image Retrieval Using Meta-heuristic Approach
by Umamaheswaran Subashchandrabose, Suresh Kumar N., Ganesh K, Sivakumar P
Abstract: Multimedia and digital image database management have undergone major transformation significantly in recent years in domains like Data Mining, Medical Imaging, Weather forecasting and Remote sensing etc. CBIR is an important tool, useful to retrieve the required image precisely and effectively from large databases. This paper proposes the use of low level visual content features viz, Mean value and color histogram, to retrieve the color feature and Gray level Co-occurrence Matrix is proposed for retrieval of the texture feature. IGA is integrated with the above said low level features to derive refined results for query image matching from the database and to differentiate retrieval performance among the image features. The proposed method yields an accurate and faster retrieval from a Corel Image Database.
Keywords: Interactive Genetic Algorithm(IGA), Content -Based Image Retrieval(CBIR), Gray level Co-Occurrence Matrix(GLCM), Color histogram, Mean.rnrn
Extracting customer opinions associated with an aspect by using a heuristic based sentence segmentation approach
by Naime Fulya Kayaalp, Gary Weckman, William Young, David Millie, Can Celikbilek
Abstract: Extracting opinions from textual customer reviews is one of the most challenging but crucial tasks which has a significant effect on decision support systems. The task becomes trickier when customers mention different aspects of an entity and different opinions associated with those aspects within the same review text. In literature, there are segmentation-based approaches, which try to parse the reviews based on the features/aspects they mention and assign opinions to those segments. It is observed that the existing models can perform better with an improved underlying segmentation model. This research aims to propose an improved segmentation model, named IMAS, to fill the gap in an existing multi-aspect segmentation model (MAS). Two aspect-opinion extraction systems were developed with two different segmentation models, and they are compared based upon their overall accuracy. As a result of the comparisons, an 8% accuracy improvement is observed by using the proposed segmentation model over the legacy one.rnrn
Keywords: Review mining; aspect-opinion matching; text segmentation; decision support systems
Social Commerce Adoption among Jordanian Youth: Empirical Study
by Radwan Al-Dwairi
Abstract: Social commerce is a subset of e-commerce which utilizes social networking tools. Customers' adoption of this new technology is not addressed by researchers in Jordan and consequently not yet completely understood. To our knowledge, this research is the first one that studied Jordanians intention to adopt social commerce. This study proposed a conceptual model based on the Technology Acceptance Model (TAM) and empirically tested using a survey of 299 Jordanian respondents. Findings of the study showed that perceived ease of use, perceived usefulness, information quality, social support, and trust significantly impacted Jordanian's intention to adopt s-commerce. Results of this study showed that the five constructs of the model explained (33.6%) of the variance of respondents intention. In addition, the F-test of the model's variables was highly significant which means that there is a linear relationship between those variables. Thus, results of this study demonstrate the applicability of our model in testing this phenomenon.
Keywords: social commerce, social media, customer behaviour, intention, TAM, social platforms, social support, trust.
Possible Factors Affecting Internet Addiction: A Case Study of Higher Education Students of Qatar
by Habib Ullah Khan, Mahmood Awan
Abstract: The sea change brought by the internet and technology to human life came along with all possible hazards, if not adopted in the correct manner. Across the world, the highest impact is on the younger generation. In this regard the current study attempted an effort to capture the opinion of the students about the cause and effect of the factors in internet usage and specifically to internet addiction. Data is collected from 357 students of Qatar using questionnaire. The tool is a modified version of the internet addiction test (IAT) that is developed by Widyanto et al. (2011), by adding another construct called culture. The collected data is validated and analyzed using binary logistic regression and principal component analysis. Though the construct culture is introduced in the model, no significant contribution and impact is found on the internet usage and addiction... However, the constructs introduced are found to have association with internet addiction. But in logistic regression analysis, the education level and time management have actual impact on the internet addiction. But unlike the above results, the principal component analysis showed that demographic variables like age, gender, income level and others are able to explain much variation in internet usage. The differences in these results could be because of the limitations of the study, bias in the data collected. The future research studies can look into the impact of the constructs by overcoming these drawbacks to understand the actual impact of culture on the internet usage and interned addiction.
Keywords: Internet Addiction Test (IAT); Internet Addiction; Internet Gaming Disorder (IGD); Emotional/Psychological Conflict; Time management; Mood Management; Culture
A preliminary study of user acceptance and adoption of data visualisation tools for decision support in business organizations
by Mohammad Daradkeh
Abstract: Despite the widespread availability of data visualisation tools for decision support, the key factors that affect their acceptance and adoption are not well explored. This paper presents a preliminary study of behavioural intention and actual usage of data visualisation tools for decision support in business organizations. The study adopted a revised Technology Acceptance model (TAM) and a self-administered questionnaire approach to gather data from employees working in different business sectors in Jordan. The gathered data from the questionnaires were tested for reliability and then analysed using correlation and multiple linear regression analysis. Findings of this preliminary study demonstrated significant positive relationships between the perceived usefulness, perceived ease of use, and employees behavioural intention and actual usage of data visualisation tools for decision support. However, when analysed alone, employees behavioural intention is more influenced by the perceived usefulness (β=0.755, p<.05) than the perceived ease of use (β=0.238, p<.05). Conversely, the actual usage is more influenced by the ease of use (β=0.672, p<.05) than the perceived usefulness (β=0.281, p<.05). The results also demonstrated that 67.5% of the variance in the actual usage can be explained by the perceived ease of use, perceived usefulness, and behavioural intention to use data visualisation for decision support. Findings of this preliminary study confirm the original TAM findings and suggest that the considerable body of TAM-related research provides a useful foundation for further research on the factors that affect user acceptance and adoption of data visualisation tools for decision support.
Keywords: data visualisation, decision support, technology acceptance model (TAM), evaluation, adoption, business organizations
After-Sales Service Quality Satisfaction in Indian Automobile Industry
by Santosh Kumar Yadav, Dennis Joseph
Abstract: In automobile industry, after-sales service plays an important role whether it is before buying a product or after buying the product. One of the necessary evaluation criteria for customer satisfaction is availability of after-sales service. In todays situation, after-sales service quality can be measured by administering a customer satisfaction survey. This paper focuses on after- sale service quality and customer satisfaction. In this paper SERVQUAL model was applied for measuring quality of service given to the customers and customer satisfaction in an automobile industry. Structural equation modeling (SEM) with partial least squares (PLS) was used to simultaneously evaluate both the measurement and structural models. The analysis of customer satisfaction through after-sales service quality gave the result in which Tangibility, Reliability, Assurance, Responsiveness and Empathy were seen to have a significant positive effect on Customer Satisfaction. In light of the SERVQUAL model, this paper discusses practical implications and focuses on recommendations on how to manage and improve service quality in after-sales service in the Indian automobile industry. This study presents a model for improving customer satisfaction in terms of service quality dimensions.
Keywords: Service quality, Customer Satisfaction, After-sales service, Automobile
Data Analytics: Feature Extraction for Application with Small Sample in Classification Algorithms
by Kamatchi Priya Loganathan, M.k. Kavitha Devi, Nagarajan S
Abstract: This paper focuses on improving the classification accuracy for supervised learning in areas of application with very few training data and with extremely available high dimensionality. This paper proposes a framework which acts a decision support system incorporating both feature selection and feature extraction to improvise the classification accuracy. The feature selection technique comprises redundancy elimination and relevance analysis. Feature subset selection problems eliminate features which are redundant by using correlation based Maximum spanning tree. But the eliminated features may contain useful information which may contribute in determining the target or class labels. The principal components are extracted from the eliminated features and they are complemented with the selected features to perform classification. The superiority of the proposed method over other feature selection methods, in terms of computational complexity and classification accuracy, is established extensively on various data sets.
Keywords: Classification, Feature Selection, Feature Extraction, Redundancy Elimination, Relevance Analysis, Maximum Spanning Tree, Supervised Learning.
A conceptual framework of e-loyalty in social-based e-commerce
by Bushra Alhijawi, Hourya Douglass
Abstract: The social-based e-commerce as we named is a type of e-commerce, appears
as a result of widespread of social networking like Facebook, Instagram, YouTube, and Twitter. The retailer in social-based e-commerce depends on the personal profile, pages, or groups on the social networks to presents their products. In this study, we investigate the factors that affect the customer satisfaction and e-loyalty. Four factors are proposed (i.e. usefulness, usability, customer services, and customization) that may have impact on customer satisfaction and may derive the e-loyalty in social-based e-commerce. Online survey was distributed and 95 complete and valid questionnaires were returned. All the four factors have a positive impact on customer satisfaction. In addition, the customer satisfaction has a positive impact on e-loyalty in social-based e-commerce. The findings suggest that to determine e-satisfaction in SEC, the merchants need to focus on providing a hand-made, tailor-made, variant colors and sizes products, special attention by the salespersons and deliverymen to the customers. This will reflect on the loyalty of the customers.
Keywords: e-loyalty; e-satisfaction; social-based e-commerce; e-business; social
User Acceptance of Business Intelligence (BI) Application: Motivation to Learn, Technology, Social Influence, and Situational Constraints
by Tom Yoon, Bong-Keun Jeong, Biswadip Ghosh
Abstract: Business intelligence (BI) applications have gained significant attention as a viable option to address the challenges of dynamic business processes and real-time decision making scenarios. However, a majority of BI application implementation projects inside organizations are unsuccessful. One of the main reasons for the failure is end user resistance to adopt BI applications that their organization chose. Therefore, it is important to understand how to facilitate individual adoption of BI application. Yet, little academic research has been done on individual adoption of BI application.
Based on a survey collected among ERP (Enterprise Resource Planning) system users in large to medium sized organizations, this study finds individuals' intention to adopt a BI application is positively influenced by their motivation to learn the software application. In addition, the results show that the motivation to learn a BI application is influenced by the relative advantage of the application and situational constraints, such as requisite skills/resources and organizational learning climate. These findings make an important contribution to the technology adoption literature and provide some practical implications that can help organizations to promote the adoption rate.
Keywords: Business Intelligence (BI), Technology Adoption, Motivation to Learn, Social Influence, Situational Constraintrnrn
Neuro-Fuzzy Approach in Business Applications: A decade survey
by Sharifa Rajab, Vinod Sharma
Abstract: This paper presents a survey of the application based research on Neuro-fuzzy systems (NFS) in business on account of the research articles published in various reputed international journals and conferences during the last decade (2005-2014). The application of the NFS in different business domains has diversified enormously during this period and NFS has emerged as a dominant technique for addressing various research problems in various business domains. On the basis of an in-depth review of these research articles we have identified finance, marketing, distribution, business planning, information systems, production and operations as the main business application domains of NFS during this period. The impact of NFS in different business domains and the trends in this application based research are presented and discussed in this paper. For each of these years, this paper also explores the various innovations in NFS methodologies employed by the researchers to tackle different business problems. Further the paper also includes some articles published during year 2015 in various international journals to present the recent developments in the research based on the application of NFS in various business domains.
Keywords: Business forecasting, Artificial Intelligence, Neuro-fuzzy Systems, neural networks, Human resource management, finance, fuzzy logic, information systems, business planning
The relationships between definitions of Big Data, Business Intelligence and Business Analytics: A literature review.
by Kenneth Mashingaidze, Judy Backhouse
Abstract: Advances in technology and increasing data volumes have led to new tools and techniques to exploit data and improve decision making. Terms used to refer to these tools and techniques include big data (BD), business intelligence (BI) and business analytics (BA). Definitions of these terms are not agreed on. In particular the terms are used as subsets or special cases of each other and this leads to confusion about their meaning and how they relate. This paper examines both academic and practitioner literature that deals with two or more of the terms to synthesise definitions and describe the relationships between them. BD is data with high volume, variety of sources and high velocity. BI is a set of tools and techniques to use data for decision making. BA is an advanced form of BI. BD is data that can be used in both BI and BA.
Keywords: big data; business intelligence; business analytics; definition; relationship; literature review; information technology; data analysis
Performance optimisation of the decision-support queries by the horizontal fragmentation of the data warehouse
by Mohamed Kechar, Safia Nait-Bahloul
Abstract: The horizontal fragmentation of the data warehouse is considered as one of the important performance optimisation techniques of the decision-support queries. This optimisation is reached only if the large data volume of the fact table is horizontally fragmented. For that, the fragments of the fact table are always derived from the fragments of the dimension tables. Unfortunately, in this type of fragmentation, the fragments number can dramatically increase, and their maintenance becomes quite hard and costly. Thus, to reduce the number of the fragments and to further optimise the decision-support queries performances, we propose to fragment horizontally only the fact table by exploiting jointly: the selectivities of the selection predicates, their occurrence numbers, and their access frequencies. To prove the effectiveness of our fragmentation technique, we present at the end, a set of experimental results conducted under Oracle 10g on the APB-1 benchmark.
Keywords: Decision support system; Data warehouse; Query performance optimisation; Horizontal fragmentation; Selection predicates; Fragmentation predicates
Citizen centric assessment framework for e-Governance services quality
by Vinay Singh, Garima Singh
Abstract: Citizen-centric e-governance services are essential to enhance the quality of life of citizens while ensuring citizen empowerment. The present study proposes a framework of assessing quality of e-governance services from citizens perspective to find out the degree of its quality impacting citizen satisfaction. The framework is validated through primary data collected from 213 respondents. Confirmatory factor analysis and structured equation modelling are employed to validate the model. The results depict quality of e-governance service and the information being disseminated to the citizens impact on their satisfaction significantly. The study contributes a parsimonious model that can significantly contribute in future theoretical advances in e-governance quality assessment. The findings can bridge the gap between government initiatives and citizens' needs. Thus designing high quality e-governance services while keeping the needs and expectations of citizen in focus translates its functional efficacy.
Keywords: citizen centric e-governance; e-governance services; citizen satisfaction; quality assessment; information quality; service quality; Governance Quality.
Developing SOA Enabled Service Agility Capabilities: Case Studies in Services Industry
by Aparna Raman, Sangeeta Shah Bharadwaj, Jaydeep Mukherjee
Abstract: The research paper explores, how information technology, specifically Service Oriented Architecture (SOA) - enabled service agility capabilities were developed. The paper defines the service agility capabilities (sensing and responding) using dynamic capabilities theory and service dominant logic. In this research we present two case studies, based on the services sector. This paper explains, how these capabilities were developed by responding organizations. Based on the research results, the propositions were proposed. Further, the model was supported through thematic analysis. The study contributes towards the knowledge base of agility and reveals how SOA-enabled capabilities are developed to achieve agile services.
Keywords: Service Agility Capabilities ; Service-Oriented Architecture; Case Study.
Code Refactoring Using Slice-Based Cohesion Metrics and Aspect-Oriented Programming
by Jagannath Singh, P.M. Khilar, D.P. Mohapatra
Abstract: Software restructuring is essential for maintaining software quality. It is a usual practice that we first design the software and then go for coding. After coding, if there is any change in the requirement or if the output is incorrect, then we have to modify the code again. For each small code modification, it is not feasible to alter the design. These minor changes made to the code causes decay in the software design. Software refactoring is used to restructure the code to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods that require refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we use the concept of Aspects to alter the code structure in a manner that does not change the external behavior of the original module.
Keywords: Software Refactoring; Program Slicing; AOP; Cohesion Metrics; CodernRestructure; AspectJ.
Content management application website system for our lady of peace center
by Mahmoud Migdadi, Qtaish Areen, Al – Manaseer Ahmad, Qalanzi Lara
People with disabilities have been facing multiple difficulties other than their own health difficulties, environmental and social difficulties have proven to be more difficult on them than any other physical and mental disabilities they face on a day-to-day basis. Charities that provide help and care to people with disabilities are available worldwide; however, in addition to the challenging nature of their work, they are also faced with the difficulties of being a category of charities that is constantly overlooked. They are constantly suffering from the lack of social and financial support especially in countries that suffer from the lack of integration of disabled people within the society, such as Jordan. The high cost of developing websites and maintaining them poses as one of the greatest challenges that is faced by charities for disabled people which is prohibiting them from being able to have an online presence in an era in which the lack of such a presence can be considered damaging. Therefore, developing a content management website for Our Lady of Peace Centre (a disabled children charity) was chosen as an opportunity to increase awareness and engagement of disabled people. The most significant contribution that this website provides is a dynamic page that informs parents and caregivers of disabled children of the appropriate toys and activities for different disabilities at different levels in both Arabic and English language which, to the best knowledge of the researchers, does not exist in the middle east.
Keywords: People with disabilities, Our Lady of Peace Centre, Charity, Content Management Website, Jordan
Selection and Classification of Common Factors Affecting the Maintainability on the basis of Common Criteria
by Shivani Kundu, Kirti Tyagi
Abstract: Maintainability is considered as one of the fundamental quality aspect that promotes efficient software systems development. By using soft computing techniques maintainability can be easily estimated and provide effective result. This paper describes the some key factors that influence the maintainability of software as presented by different researchers. In the software maintainability estimation these factors play a fundamental role. Proper study and inclusion of these factors may make the maintainability estimation clearer and easier. The maintainability models may be used to find enhanced quality of the software so that maintenance can be performed effectively and efficiently.
Keywords: Maintainability; Software Quality; Maintainability Factors.
A TRIANGULAR PERCEPTION OF SCOPE CREEP INFLUENCING THE PROJECT SUCCESS
by Lakshmi Madhuri, Suma V, Uma Mohan Mokashi
Abstract: Project management strategies are a part of every organization as developing high quality customer satisfied software is always one of the challenges for any software organization. Though, the scope creep is known to be one of the factors which influences project success, existing project management strategies do not effectively measure or predict the scope creep. This paper focuses on effective scope creep management which is achievable through a comprehensive analysis of the scope creep and its impact on project success. The paper further presents a case study conducted in one of the leading software companies to investigate the significance and impact of scope creep in the project success. An investigation was carried out on several empirical projects and a three dimensional visualization of scope creep on success of project was brought out. This trio visualization comprises of historical data perspective which leads to visualize the inferences in a pictorial representation perspective. Facts, thus, gained from historical and pictorial data perspectives lead one towards visualization of scope creep and its management using a mathematical modeling perspective. This mode of visualizing the scope creep and its implications on project success ensures one to effectively modulate their strategies in order to develop software products which attain total customer satisfaction.
Keywords: Software Engineering; Software Quality; Software Metrics; Scope Creep Management; Total Customer Satisfaction.
An Empirical Examination of Antecedents Determining Students Usage of Clickers in a Digital Marketing Module
by Nripendra P. Rana, Yogesh K. Dwivedi
Abstract: As more and more educational institutions are integrating new technology such as clickers into their learning system, it becomes increasingly essential to have an understanding of students perceptions about such technology on their overall learning process. The incorporation of clickers into teaching instructions has created implications for teaching practices and student satisfaction. The purpose of this research is to understand student use and satisfaction with clickers in a large undergraduate digital marketing class in a British university. To do so, we propose a conceptual model based on information systems (IS) success models to understand students usage behavior and satisfaction with clickers. The data were analysed based on 138 valid responses gathered from the students, where clickers are effectively used for teaching and learning purposes. The results provided a strong support for all eight hypothesised relationships and adequate variance on its key dependent variables in the proposed research model.
Keywords: Clickers; Higher Education; IS Success Models; Student; Usage; United Kingdom.
Relative Importance of CSF in ERP Implementation Strategy: A Multi-Participant AHP Approach
by Shruti Nagpal, Ashok Kumar, Sunil Kumar Khatri
Abstract: Enterprise Resource Planning Systems (ERP) have found a wide acceptability among organizations, albeit with a pinch of salt. ERP systems appropriately bring about uniformity in the software across the organization by bringing all the processes under one umbrella. But the low adoption rates and greater time to value are often reasons for low ERP implementation success rates and even ERP implementation failures. Researchers have chronicled various Critical Success Factors (CSF) that determine a successful ERP implementation. This paper utilizes multi-participant Analytic Hierarchy Process (AHP) to determine the relative importance of CSF in various ERP implementation strategies. The paper contributes to the existing knowledge of CSF in ERP implementations by showcasing that CSF have varying importance across ERP implementation strategies.
Keywords: Enterprise Resource Planning (ERP); Critical Success Factors (CSF); Analytic Hierarchy Process (AHP)
Emergence of Multipresence A theoretical underpinning
by Somesh Gaur, Bala Krishnamoorthy
Abstract: Anytime anywhere and immersive Information and Communication technologies have penetrated all spheres of our life. Because of these technologies, an individual can be present in multiple environments either real or virtual at a given time or in a time frame. Such technology driven Multipresence has emerged as a prominent behavioral phenomenon today. Multipresence might have significant influence on an individuals behavior as well as on team, organization and society. Despite being such a prevalent and important behavioral phenomenon, there has been limited research and literature in this area. In this conceptual paper, we explore and refine the concept of Multipresence. We start with the exploration of concept of Presence, which forms the basis for understanding Multipresence. We further discuss various aspects of Multipresence from the literature. We also introduce a new revised definition and new concepts about Multipresence. Finally, we discuss possible implications of such behavior on performance of an individual and suggest potential future research opportunities in this area.
Keywords: Presence, Multipresence, Multitasking, Polychronicity, Attention Sharing, Attention Switching, Technology Affordance
ERP Implementation in University: A Case Study in Thailand
by Nacha Chondamrongkul
Abstract: Enterprise Resource Planning (ERP) is considered a proven solution that enhances the organizations structure, which results in better productivity. Nowadays, universities have many reasons to improve efficiency in administrative operations. Therefore, there are number of universities that aim to enhance administrative efficiency by implementing ERP system. However ERP system implementation in the university has a high failure rate because of its unique characteristic. Even though a number of critical success factors have been proposed but there is rare example of how to put them into practice. This paper presents a case study in a Thai university that implements ERP system, which shows how selected critical success factors are taken into practice throughout implementation process. A combination of semi-structured interviews and survey questionnaires are used as research methods to observe and analyze implementation process in the university environment. The study shows software learnability as a significant challenge that causes problems in the post-implementation phase. Also, the study highlights ERP system as the foundation for the development of forthcoming IT system.
Keywords: Enterprise Resource Planning; University; Critical Success Factor.
Evaluation of Indian universities websites in terms of information quality: Differences in the perspectives of end users segments based on their socio-demographic characteristics
by Bhim Sain Singla, Himanshu Aggarwal
Abstract: To-day, with the advent of Web technologies, there has been a sea change in the business scenario of not only the commercial organizations but also the higher education institutions. The organizational goals can be achieved more easily and efficiently by reaching out to a vast population through this medium. The educational institutes can provide quick and reliable services to the stakeholders of these websites within the shortest span of time and limited financial resources. However, the benefits to be derived from such websites rest more on their content quality in accordance with the requirements and expectations of the end users. Thus, this study is a modest attempt to evaluate the content quality of Indian universities websites through the perspectives of end users based on their demographic variables such as gender, age, education and status. The study is based on primary data which has been collected through a well-structured and pre-tested questionnaire from the respondents. The findings are extremely significant for the Indian universities as the improved quality of their websites would help them to attract more and more number of students for admission, and in improving their ranking.
Keywords: content categories; customer satisfaction; effective website; end users; importance versus performance; information quality; India; service quality; universities’ websites; website quality.
Data Mules Oriented Particle Swarm Optimization Based Mobile Sink Data Gathering Techniques with Analytical Data Analysis using Linear Regression
by Govindarajan Saravanan, MJS Rangachar
Abstract: Wireless sensor networks with convergecast nature poses great challenge on data collection strategies. In order to cut down the issues on constrained resources of wireless nodes, here a sink based (PSOMSDG) Particle Swarm Optimization Based Mobile Sink Data Gathering had been proposed. This PSOMSDG is a rendezvous based protocol which uses three metrics for data gathering based on the nodes position as; when the nodes are in inertia; when they change to optimistic position (based on current scenario); finally when they change to swarms optimistic position. These three metrics avoid long detour path by providing global optimal length constrained trajectory. In addition, residual energy consumption of protocol was achieved in a balanced manner. The performance is noticed with increasing data rates and compared with Biased Sink Mobility with Adaptive Stop Times (BSMAST). Then data obtained with NS2 simulation which was developed into a linear regression model. Finally the analytical study states that there is a strong relationship between data rate and energy consumption. The Analysis Of Variance (ANOVA) based analysis shows that there is a strong influence between groups.
Keywords: PSOMSDG, Energy consumption, ANOVA, Regression.
Cost Benefit Analysis of Cloud computing in Education
by Kiran Nayar, Vikas Kumar
Abstract: Application of Cloud Computing in Education not only relieve the educational Institutions from the burden of handling the complex IT Infrastructure management as well as maintenance activities, but also lead to huge cost savings. Along with many industry sectors, education sector would be largely benefited by adopting cloud services. Cloud promises to deliver affordable, reliable and flexible computing solutions to education sector and enable it to compete more effectively with bigger organizations. Motive of this paper is to analysis approach that has been followed to identify the benefits and limitations of cloud computing. Specific case of a lab setup has been taken to illustrate the financial aspects. A comparative analysis of Cloud-based hosting versus conventional (on-premise) application deployment has also been presented.
Keywords: Cloud Computing challenges; ICT; TCO; ROI; cost factors; ROI Factors.
Acceptance of E-book Reading among Higher Education Students in Developing Country: The Modified Diffusion Innovation Theory
by Nida shah, Syed Ali Raza
Abstract: This study explores the students intention towards the E-book adoption in Pakistan by using the modified diffusion innovation theory. Student attitude, awareness, perceived innovation characteristics (PIC) are taken as independent variables, actual usage is taken as a dependent variable, whereas intention plays the role of the mediator in the relationship. The data is collected through 5-point Likert questionnaire from the 620 university students. The confirmatory factor analysis (CFA), partial least square structure equation modeling (PLS-SEM) has been applied. The results show that compatibility, complexity, observability, trialability, attitude and awareness has a significant positive effect on behavioral intention, whereas, relative advantage has an insignificant effect on behavioral intention. Moreover, behavioral intention creates a significant positive effect on actual usage. This study will be useful in understanding the factors associated with the adoption of E-book reading. This work will help the managers to understand the role of PIC in adoption of new product or technology.
Keywords: E-Book reading, modified innovation diffusion theory, actual usage, Pakistan
Decision Modeling in Evaluating Information Management Strategy in Manufacturing Industry
by Purnendu Mandal
Abstract: Information technologies are exerting ever increasing influences on corporate growth and profitability. However, very little is understood of the mechanisms through which information technologies impact upon long-term organizational growth. We hypothesized several relationships between information technologies and organizational financial performance. We then analyzed those relationships through a structural equation model (SEM) using data collected for a national survey of US manufacturing companies. The major findings of the research are: an organizations financial performance is dependent on its information management and technology management strategies; knowledge management strategies indirectly influence financial performance. These findings are important in framing long-term strategies for sustainable development.
Keywords: Organizational Performance, Information Management Strategy, Technology Management Strategy, Knowledge Management Strategy, PLS analysis, Mediating effect
Investigating Drivers of User Acceptance of Electronic Treasury: A Case Study
by Behrouz Zarei, Kasra Amanati, Amir Hossein Ghapanchi
Abstract: Using information technology to increase efficiency and transparency in public expenditure management can have a great impact on production, collection, processing and providing reliable reports for policy-makers. Thus, it is very important to identify factors which impact the adoption of this technology. The conceptual model of this study is based on the trust and risk model in electronic government (e-government) adoption. In this study, the constructs of perceived ease of use from Technology Acceptance Model (TAM) and optimism bias have been added to the trust and risk model. Using a descriptive-survey method, a sample of 36 top budget managers has been examined. A questionnaire was used to collect the required data. Structural equation modeling using partial least squares was used to test the model. Based on the results, disposition to trust, trust of the e-treasury system, perceived ease of use and optimism bias explained the adoption of electronic treasury system among top budget managers. Disposition to trust and perceived ease of use also affected trust positively.
Keywords: E-treasury; Trust; Risk; Optimism bias; Ease of use
Developing and Validating a Comprehensive Model of Factors Influencing Consumer Acceptance of SMS Advertising: Empirical Evidence Using SEM-PLS
by Mohammad Al khasawneh, Ahmed Shuhaiber
Abstract: This study examined consumers acceptance of SMS advertising, as one of the mobile marketing instruments that is increasingly popular in accessing consumers through their mobile devices, by empirically investigating the factors that influence consumers attitudes towards and acceptance of SMS advertising. A comprehensive model was developed and tested with a sample size of 321 Jordanian mobile phone users, and analyzed quantitatively using Structural Equation Modeling Partial Least Squares (SEM-PLS) method. The findings indicated that SMS advertising values (entertainment and credibility) and SMS content (clarity and relevancy) as well as subjective norm and consumer control have a positive significant influence on consumer attitude and acceptance of SMS advertising. The results represent novel findings that hold important implications and recommendations for future marketing research and practice.
Keywords: Consumer Acceptance, Mobile Marketing, SMS Advertising, SMS Messages.
The Influence of Technological Factors on Individuals intention Towards Knowledge Sharing Practice.
by Dhanapal Durai Dominic Panneer Selvam, Arif Abdelwhab Ali
Abstract: Abstract: Knowledge sharing has been receiving the highest concern among knowledge management processes. It does attract many studies due to its vital role in the success of organizations. In fact, the practice of knowledge sharing in an organization is influenced by employees intention for sharing knowledge. This paper aims to investigate the influence of two technological factors precisely knowledge sharing systems and web2.0 on the individuals intention for knowledge sharing. Likewise, this paper examines the impact of knowledge sharing intention on the practice of knowledge sharing in organizations, particularly in oil and gas industry. Based on these objectives, a model was proposed, and research hypotheses were developed accordingly. Data were collected from seven international petroleum companies using a survey method. In details, an online questionnaire was used as a survey instrument which yielded a sample size of 157. Measurements were verified through reliability analysis using Cronbachs alpha method. Furthermore, factor analysis was also conducted for the purpose of dimension reduction and detecting any complex structure among the model variables. Further statistical tests were completed including correlation and multicollinearity tests. Structural equation modeling approach was used to evaluate the research model and test the proposed hypotheses as well. The findings indicated that both knowledge sharing systems and web2.0 platform positively influence knowledge sharing intention. Moreover, it was found that the intention to share knowledge has a positive influence on the knowledge sharing practice within organizations. All three proposed hypotheses were significantly supported. Finally, an extension of the study was suggested to be considered in the future.
Keywords: Knowledge sharing; knowledge sharing intention; knowledge sharing practice; knowledge sharing systems; web 2.0 technology;
New Local Sedec Pattern(LScP) Descriptor for improving the retrieval efficiency in Content Based Image Retrieval
by Umamaheswaran Subashchandrabose, Suresh Kumar N., Ganesh K
Abstract: In this paper, a novel Content Based Image Retrieval (CBIR) method is proposed using the Local Sedec Pattern(LScP). The Local Binary Pattern (LBP) and the Local Ternary Pattern (LTP), encode the relationship between the referenced pixel and its surrounding pixels, by computing gray-level difference, but in a different way. The proposed methods encode the relationship between the center pixel and its neighbors, based on directions such as vertical, horizontal and diagonal. Calculation based on First Order Derivatives is used here. Second order derivative is also applied to obtain LScP. The performance of the proposed method is compared with the LTrP and other local pattern (LBP,LDP and LTP)which results are obtained using benchmark image databases viz., Corel 1000 database(DB1), Brodatz texture database(DB2). Performance of the LScP shows improvement in retrieval from 75.9%/48.7% to 86.52%/54.4% in DB1, for average precision/average recall as compared with LTrP and other local patterns . A similar comparison shows improvement from 85.30% to 91.5% in terms of average retrieval rate on database DB2
Keywords: Content-based image retrieval(CBIR), Local sedec patterns (LScPs), Local tetra patterns (LTrPs)
Optimal Sentence Clustering for Web Database using Hierarchical Fuzzy Relational Clustering Integrated with Artificial Bee Colony Algorithm
by Santhi Venkatraman, Prasanthini R.
Abstract: Sentence clustering plays a vital role in text mining and text processing activities. The proposed work is a novel Hierarchical Fuzzy Relational Clustering Algorithm (HFRECA) capable of identifying sub clusters. It has features of both hierarchical clustering and fuzzy clustering in which it uses page rank to form multiple clusters present in text documents containing hierarchical structure. To enhance the quality of the clusters formed, an optimization algorithm which is called Artificial Bee Colony (ABC) algorithm is used along with it. The proposed algorithm identifies the sub clusters and finely tunes the cluster to show a better optimized result.
Keywords: Sentence clustering; page rank; fuzzy relational clustering algorithm; artificial bee colony algorithm.
Cognizant Computing and Lean Practices: Interactions with 21st Century Businesses and Implications
by Emmanuel C. Ogu, Benita Amos, Uduakobong Edy-Ewoh
Abstract: Cognizant Computing is one of the emerging, current and rapidly evolving information technologies that portends great promises for savvy businesses of the 21st century, with the potential to create huge savings and returns for businesses by reducing overhead costs and expenses. Lean practices in the business manufacturing and process industries have been proven to also guarantee global competitiveness and enhance efficiency of the manufacturing and process chain operations of businesses, while ensuring enhanced financial performance, productivity and market performance of end products. Until now, the existing nexus between these twain paradigms have remained blurred, with very little knowledge of how both can be combined and harnessed to ensure business success in the 21st century. As the world advanced towards the dawn of the long-deliberated Industry 4.0 revolution, it has become necessary that these twain concepts be re-investigated with a view to uncover a possible nexus between them; which, upon implementation, could guarantee the success, competitive advantage and stability of businesses in the coming industrial revolution. This study utilizes the exploratory research methodology due to the relatively new and emergent nature of the domain of discourse. The study introduces cognizant computing and illuminates its prospects for businesses in the present era, and how lean practices could combine with cognizant computing to guarantee the success and sustainability of businesses in the coming industrial age.
Keywords: Cognizant Computing, Business Operations, Industry 4.0 Revolution, Business Information Technology, Lean Manufacturing.
Patterns affecting structural properties of social networking site Twitter
by Vinay Singh, Anurag Singh, Divya Jain, Vimal Kumar, Pratima Verma
Abstract: With invent of Web 2.0 technology, online interpersonal interaction has been turned into the sensation of twentieth century. Websites and other applications on the Internet provide large amounts of data and new research area to the researchers. Twitter is one of them. Structurally, this site is the complex network of users connected to each other whose nodes represent individuals or organizations, and links mimic the interactions among them. Understanding the graph is critical, both to enhance current frameworks and to plan new applications for this platform. Here, we will endeavor to study the mixing patterns possible in Twitter online social networking site due to the geographic locations mentioned by the user via measuring assortativity coefficient and find out how these patterns are affecting the structural properties of the network. We examined data gathered from Twitter online social network by crawling on this site using the open Application Programming Interface (API)available for us by Twitter. We obtained a small portion of this social networks graph and observed that assortativity is indeed present in this network and also when we ranked the user according to their followers count and then remove few of them from the dataset, we found that network is resilient to the deletion of highest degree nodes and assortativity still exists. We performed the same experiment with random users and found the same results. To validate the above property observed in this social network, we plotted the graph to show the presence of core components in the network.
Keywords: Mixing Patterns, assortativity coefficient, robustness, dynamics of a network, homophily
Internet Banking in Pakistan: An Extended Technology Acceptance Perspective
by Sahar Afshan, Arshian Sharif, Nazneen Waseem, Reema Frooghi
Abstract: The growing attractiveness of internet banking is contributing well in the success and growth process of banking sector around the world (Xu et al. 2009). This study examines the integrative framework of internet banking (IB) in Pakistan using Technology Acceptance Model (TAM) with the integration of several risk dimensions and initial trust model. The techniques of both exploratory and confirmatory factor analyses are employed to assess the reliability and validity of the measurement model. The structural equation modeling method was also applied to investigate the hypothetical framework with the help of literatures recommended goodness-of-fit measurements. The findings of the study found significant contribution of personal propensity to trust, structural assurance, and familiarity with bank in influencing initial trust of people to accept IB. The findings are beneficial for banks that are pursuing IB in formulating strategies of enhancing users acceptance of internet banking in Pakistan.
Keywords: Internet Banking, TAM, Risk Dimensions, Initial Trust, Pakistan.
Evaluation of the StrAli-BPM approach: Strategic alignment with BPM using agreements in different levels
by Guilherme Salles, Vitor Barros, Marcelo Fantinato, João Albuquerque
Abstract: The strategic alignment between business areas and Information Technology (IT) is motivated by the needs of large organizations to thoroughly use the potentials of IT to transform business processes and deliver good products and services. In the treatment of processes and services, it is important to attend also to non-functional requirements, minimizing misapplied IT investments due to inefficiency. However, business process modelling languages do not represent these requirements, focusing only on functional requirements. Thus, in order to fill this gap, this paper presents the StrAli-BPM (Strategic Alignment with BPM) approach, which is divided in two parts BLA@BPMN and BLA2SLA: the former to extend the BPMN language aiming to embody non-functional requirements, in the form of BLAs (Business Level Agreements) enriched with KPIs (Key Performance Indicators); and the latter to semi-automatically derive a set of SLAs (Service Level Agreements), associated with web services, from a pre-defined BLA. This paper mainly describes the results obtained with the evaluation of the StrAli-BPM approach. First, the approach was evaluated by a proof of concept, based on the developed prototype tools, which allowed to verify its technical applicability. Then, a survey experiment was conducted with a panel of experts, members of a real organization. As a result, the proposed approach was well accepted by the experts who judged it as important and necessary to cover a gap in the BPM field. Some lessons learned from both evaluations are presented.
Keywords: strategic alignment; BPM; business process management; business process modelling; BPMN; business process model and notation; non-functional requirements; BLA; business level agreement; KPI; key performance indicator; SLA; service level agreement; SOA; service-oriented architecture; WS-Agreement.
Factors driving consumer loyalty intention towards e-tailers: an integrated model
by Plavini Punyatoya, Anurag Satpathy, Arjun Agrawal
Enhancing Revenue Management Systems Performance with CRM Systems Data
by Vinaysingh Chawan
Abstract: Revenue Management Systems (RMS) and Customer Relationship Management (CRM) Systems are widely used in todays data enriched environments to improve a firms profitability. Though these systems are used to improve business profitability, their approach and evolution are different, as a result of which these systems are being used separately. In case of RMS, the focus is on short term tactical revenue optimization, whereas in case of CRM the focus is on developing long term customer relationships. This paper discusses some ways of enhancing performance of Revenue Management Systems by using CRM data. Synergies and conflicts that may arise with the simultaneous use of these systems are discussed, and numerous applications that help in enhancing RMS performance are suggested.
Keywords: Revenue Management; Customer Relationship Management; Enhancing Performance; CRM Metrics.
The Big Five personality traits and their relationship with the intensity of using Facebook: A developing country perspective
by Ziad El-Tah, Mohammed-Issa Jaradat
Abstract: There is a remarkable increase in the usage of the social networking sites worldwide especially among young people, which has become a lifestyle. This study examines the role of the Big Five personality traits and their relationship with the intensity of using Facebook in a developing country perspective like Jordan. A Paper-based questionnaire was used to collect the data and the WarpPLS 5.0 software was utilized to test the data using a population sample (N=260). The results show that the intensity of using Facebook is negatively affected by the three personality traits (Neuroticism, Agreeableness and Conscientiousness) and positively affected by Extraversion, meanwhile Openness has no significant effect in the current analysis. This study also examines the moderating influence of gender, academic study level, college type and age on the relationships between the Big Five personality traits and the intensity of using Facebook. Furthermore, with respect to the addictive tendencies, the results revealed that the amount of average usage per day exceeds the benchmark of Facebook addiction.
Keywords: Facebook; Big Five Personality Traits; Gender; Academic study level; College; Age; Intensity of Using Facebook; Facebook Addiction; Jordan.
RBACA: Role Based Access Control Architecture for Multi-domain Cloud Environment
by Chaitali Uikey, D.S. Bhilare
Abstract: Cloud computing is an emerging area as a new arrangement of wide-area distributed computing. Sharing of resources and services over the network are heterogeneous, dynamic, and multi-domain. Security issue is also a serious problem in a cloud computing environment. Similarly, access control and authorization are an important aspect of the security. The paper proposes a scalable access control architecture and authorization, for cloud computing environment. A new access control architecture is proposed which is based on traditional access control, Role-Based Access Control (RBAC) model. The paper provides a flexible framework for policy announcement management approach for a multi-domain cloud environment. A policy language (XACML) is used for the demonstration of access control policies. This provides a general and standard provision of different resources and services.
Keywords: cloud computing; multi-domain architecture; role based access control; control architecture.
Towards a new method for designing multidimensional models
by Nawfal EL MOUKHI, Ikram EL AZAMI, Abdelaaziz MOULOUDI
Abstract: Designing a data warehouse as a support of the decision-making process remains a complex task and a major challenge for companies and organizations. This complexity is principally due to data sources that are heterogeneous and to the absence of a conventional method for modeling the data warehouse.
This paper analyzes the most important data warehouse design methods; it enumerates key strengths, limitations for each method, and presents a new design approach that allows to construct multidimensional schemas from relational models by using the MDA (Model Driven Architecture) techniques. This new approach will be able to produce good quality multidimensional schemas in an automated and standardized way.
Keywords: Decision Support System; DSS; data warehouse; data warehousing; relational models; multidimensional models; design methods; designing data warehouses; Model Driven Architecture; MDA.
An empirical investigation of agility factors in select Indian manufacturing industries
by Alok Khatri, D. Garg, G.S. Dangayach
Abstract: In the era of dynamic and customized demand, the organizations cannot to be rigid. Rigidity can be reduced by adopting agile manufacturing paradigm. The agile manufacturing is a tool that facilitates organizations a capability to deal with these challenges. The objective of this study was to identify chief predictors of agile manufacturing, establishing a relationship of agile providers, capabilities, enablers and to distinguish agile developers and enablers. The survey based study has been conducted to identify pinpoint factors of agility to help managers to identify the areas to be focused. To know the important factors that affect agile manufacturing, survey has been conducted for Indian manufacturing industries in selected areas. A hypothetical agile manufacturing framework has been proposed. The data has been analyzed by principal component analysis and linear regression model. The study indicates that nine hypothesized factors have statistically significant relationship with agility. Linear regression model has been developed to recognize agile manufacturing predictors. Linear regression model equation of agile manufacturing has been compared and tested with the mean value of agility. The results obtained from linear regression model and survey was found to be in close proximity. Further using principal component analysis, proposed empirical framework has been restructured as per empirical results of study.
Keywords: Agile manufacturing; agility enabler; agility developer; hypothesis testing linear regression model; principal component analysis.
Sequence Clustering Approach for clustering Web User sessions
by Pradeep Kumar
Abstract: Clustering web usage data is useful to discover interesting patterns pertaining to user traversals, behavior and their usage characteristics. It is also useful for trend discovery as well as for building personalization and recommendation engines. Since web is dynamic, clustering web user transactions results in arbitrary shapes. Moreover, users accesses web pages in an order in which they are interested and hence incorporating sequence nature of their usage is crucial for clustering web transactions. In this paper, we present an approach to cluster web usage sequence data and removing noise using DBSCAN algorithm. We also study the impact of clustering process when both sequence and content information is incorporated while computing similarity measure. We use S3M (Sequence and Set Similarity) measure to capture both the order of occurrence of page visits and the page information itself, and compared the results with Euclidean distance and Jaccard similarity measures. The Inter-cluster and Intra-cluster distances are computed using Average Levensthein distance (ALD) to demonstrate the usefulness of the proposed approach in the context of web usage mining.
Keywords: Sequence clustering ; web usage data; similarity measures; Average Levensthein distance.
MULTI TERM BASED CO-TERM FREQUENCY METHOD FOR TERM WEIGHTING IN INFORMATION RETRIEVAL
by Santhanakumar Markandeyan, Christopher Columbus Chinnappan, Jayapriya Kalyanakumar
Abstract: Now a day, World Wide Web (WWW) has become the only source of all kind of information. Retrieving the relevant web pages based on user queries from WWW is an exigent task. Term Frequency Inverse Document Frequency (TF-IDF) is the most frequently used method for term weighting based on the occurrences and presence of a term inside the document. Retrieved document based on a single query term may not relate to the user search. This may lead the user to process the unwanted information. So, this paper proposes a new term weighting method named Co-Term Frequency, in which the weight is assigned according to the multi terms commonly occur in all documents. From the measures of precision, recall and F-score of the proposed method, it is clearly evident that the proposed framework retrieves the most relevant web pages when compared to other term weighting methods.
Keywords: Term Frequency; Inverse Document Frequency; Co-Term Frequency; Term Weighting; WWW; Precision; Recall; F-score.
Factors Affecting the Adoption of Internet Banking: A Systematic Literature Review
by Shahzad Qamar, Amer Alzaidi
Abstract: Recent developments and trends in Information and Communication Technology (ICT) have significant impact on financial institutions such as banks. Internet Banking (IB) referred to the use of ICT by customers for performing different banking related tasks. The objective of this study is to identify the factors, which are affecting the adoption of IB. A Systematic Literature Review (SLR) methodology is adopted for conducting this research work. Our SLR included 122 papers selected from six digital libraries i.e. Google Scholar, Emerald Insight, Science Direct, IEEEXplore, Springer Link and ACM, published between 1999 and 2015. We classified 122 papers in the years, in which they were published, country in which research was conducted and the methodologies used in the papers. Based on the analysis of 122 papers, we identified 44 factors affecting the adoption of IB. Ease of use, Security, Ease of Usefulness, Trust and Prior IT Knowledge are consider critical among 44 factors. IB adoption is still a hot topic for research because the interest of researchers is still there to work on the factors affecting the adoption of IB.
Keywords: Internet Banking; Adoption Factors; Systematic Literature Review.
The impact of the quality of the service from IS/IT departments on the improvement of operational performance: The point of view of users of technological innovations
by Ricardo Santa, Mario Ferrer, Liliyana Makarova Jørsfeldt, Annibal Scavarda
Abstract: The purpose of this article is to examine how the provision of services from Information Systems / Information Technology (IS/IT) departments helps organisations to achieve reliable operations and improvements in operational performance in the view of the users. A Structural Equation Modeling (SEM) was used to examine structural relationships between the set of observed variables and the set of continuous latent variables from responses of a sample of 138 individuals from large service organisations in Australia that had recently implemented Enterprise Information Systems (EIS). The results suggest that there is no direct influence of the quality of the service from IS/IT departments on the improvement of operational performance, but there is an indirect relationship through the achievement of operational effectiveness. The findings also suggest that focusing solely on the effectiveness of the technological innovation is detrimental to long-term operational benefits.
Keywords: Service quality; system effectiveness; operational effectiveness; improvement in operational performance; enterprise systems.
Social Media Marketing Impact on the Purchase Intention of Millennials
by Ashutosh Pandey, Rajendra Sahu, Manoj Dash
Abstract: During the last decade we have seen an enormous growth of new channel of interaction i.e. Social media such as Face book, twitter and YouTube, where people can share their feelings, likes, dislikes publicly in the forum. Social media is emerging as a new sophisticated and uncontrollable element influencing consumer behaviour. They have also changed the way now businesses and consumers communicate with each other by instigating a power shift from business towards consumers. Due to a widespread use of social media, publicly as a medium of marketing communication, its the need of time to examine the social media marketing (SMM) empirically. From past relevant studies three constructs namely eWom, attitude toward social media advertising and peer communication has been identified and through it, an attempt has been made to find out the effect of all these mediums of SMM on purchase intention of millennial consumers.
Keywords: Social media; marketing; eWom; peer communication; purchase intention.
Evaluation and Performance Analysis of Classification Techniques for Thyroid Detection
by REKHA PAL, TANVI ANAND, SANJAY DUBEY
Abstract: Thyroid is one of the most common disease found in people nowadays which occur due to disorder of thyroid gland that include hypothyroidism(inactive thyroid gland) and hyperthyroidism (hyperactive thyroid gland) that can take place at any age and in either sex. Therefore their prior diagnosis and detection is very crucial and helpful for the betterment of human life. Large amount of complex data is collected by healthcare sector in order to identify hidden patterns for effective identification, detection and decision making. Data mining has become a current trend for achieving effective diagnostic result from massive data set by classifying applicable and unique patterns in data. The aim of the paper is to present an extensive analysis of different classification techniques viz. Naive Bayes, SVM, and K-Nearest Neighbour (K-NN) on the basis of dimensionality reduction for detection of thyroid disease. Results are provided to select best thyroid disease detection technique. The analysis reflected that K-NN is performing better than other classifier on the basis of various parameters. This analysis will help to identify best algorithm for such diseases and give better preventive options in advance.
Keywords: Classification Techniques; Disease; Data Mining; Dimension Reduction.
System Dynamics based Approach to Manpower Planning: A Study of Indian Microfinance Institutions
by Richa Das, Chandan Bhar
Abstract: The purpose of this paper is to analyze the manpower planning process of Indian Microfinance Institutions (MFIs). The paper describes a model that can assist management of MFIs to deal with the challenges microfinance organizations face in case of manpower planning. In this study, a system dynamics based model has been developed for manpower planning and the model estimates the requirement of staff members and executives at different levels under various scenarios that will help the organization in designing effective strategy to successfully manage their human resource strategically. The research methodology is in accordance with the principles of System Dynamics. The model has been developed using iThink software and has been validated by computing root mean square error between the actual values of the variables and the model generated values. The study will help the microfinance organizations to plan, manage and strategically focus on manpower planning in its desired direction.
Keywords: System Dynamics; Simulation; Manpower planning; Microfinance Institutions; Staffs; Executives.
Comprehending Visualizations of Dense Rank Order Data: A Comparison of Alternate Presentation Formats
by Vijay Raghavan, Ben Martz, Morgan Shepherd
Abstract: This study compared two tabular presentations and one graphical presentation of the same rank order data to study differences in participant comprehension. Hypothetical raw voting data by ten different judges ranking ten states on the desirability of each state as a preferred place for retirement was used. Three sets of the data were constructed for the voting scenario with low, high and moderate levels of consensus. The summary data was a table (TABULAR) representing the total count of votes for each rank (first place through tenth place) for all ten states. It was also presented as a 3D cone infographic (GRAPHICAL) and raw voting data (RAW). Participants were asked to estimate the level of agreement (0.00 to 1.00) indicated by each presentation. The results showed that the graphical and tabular presentations differed in participant comprehension for low and moderate levels of agreement but not for high levels of agreement.
Keywords: Analytics; Rank-order data; Visualizations; Pedagogy; Experiential Learning.
Online Car Parking Booking System: The case of Jordan
by Mahmoud Migdadi, AbdelRaouf Dado, Othman Al Safadi, Hisham Shadid
Abstract: With the increase in population and economic development of modern society of world, more and more people have cars of their own. The result is that traffic jam is more often than ever before. What is worse, in the increasingly crowded cities is the possibility of not finding safe parking lot especially in such crowded areas which could be a frustrating experiment. As parking facilities grow large, drivers need advanced methods of parking to reduce inefficiencies in finding spaces. A solution to reduce the drivers searching time for vacant car-park lots will greatly save time, reduce cost and improve the traffic flow in the car park areas. To this end, the researchers has created a web-based application (including PHP and MySQl server) which aims at providing its users (the drivers) several benefits-when they utilize it- such as provide real-time parking spot availability information in order to book a safe parking space any time and from any place, save them time and efforts, subscribe and pay electronically. In addition, the system allows parking owners and/or mangers to manage their own parking spaces bookings and subscriptions more efficiently.
Keywords: Keywords: Car parking; parking space management; web-based application; system analysis and design; Jordan.
Crowd Estimation at a Social Event using Call Data Records
by Sumathi V.P, Kousalya K, Vanitha V, Cynthia J
Abstract: Segregating attendees of the event from other regular visitor, paves way for new applications such as measuring event success and outdoor advertising. Traditional methods of crowd estimation at points of interests such as shopping malls, cinema halls, stadium and exhibitions using sample analysis of visitor through participant count obtained by number of tickets sold. In unstructured (free-to-view) event, the above said method does not help in accurate crowd estimation and social analysis. The objective of this paper is using call data records to estimate the crowd at an unstructured event in a city. The study was conducted at Indian Institute of Science (IISc) campus, Bengaluru on a special event day. To avoid breach of privacy, anonymised Call Data Records have been used. The crowd estimated using call data records shows positive correlation with ground truth-value.
Keywords: Social analysis; crowd estimation; call data records; unstructured event; free-to-view event; attendance estimation.
Identification and classification of parameters affecting service selection efforts in SOA-based applications
by Zeeshan Ali Siddiqui, Kirti Tyagi
Abstract: In recent past, service-oriented architecture (SOA) has evolved as a standard approach of software application development in the business world of information technology. The reason for its popularity lies in its ability to adopt the traditionally developed software applications and provide their functionality as services. Selection of a service from a pool of services, that can fulfill users capabilities requirements from different service providers, is a challenging core task. Selection of a service is eventually been decided by evaluation of quality of service (QoS) parameters based on users business requirements, and budget available. This paper presents identification and classification of significant parameters, based on previous literature, that affect service selection in SOA based applications (SOABAs)along with their definition and relation with service selection effort under the research question, What are the significant parameters that affect service selection efforts in SOABA?
Keywords: Service-oriented architecture; SOA; Service selection; Efforts; Parameters; Factors; Effort estimation.
Bees Algorithm and Support Vector Machine for Malaysian License Plate Recognition
by Nahlah Shatnawi
Abstract: Nowadays the increasing use of vehicles in modern life raises the problem of designing techniques that support effective traffic monitoring and vehicle identification. License Plate Recognition is an advanced machine vision technology used to identify vehicles by their license plates without direct human intervention. License plate recognition system major steps include image capturing, preprocessing, segmentation, feature extraction and classification. In this paper, a complete System for Malaysian License Plate Recognition is proposed to handle special Malaysian license plates under different conditions. In the proposed system, Peak Signal to Noise Ratio (PSNR) and Bees algorithm is used in preprocessing and segmentation stages, Sobel method for edge detection, and Support Vector Machine for classification. The proposed system is applied to dataset that is consisted of 1216 gray scale images, and is compared with different methods in segmentation and classification. Results show the robustness of the proposed system, making them suitable for more real world applications.
Keywords: Image Processing; Segmentation; Plate Recognition; Bees Algorithm; PSNR; Support Vector Machine.
Predictive Auto-Completion for Query in Search Engine
by Vinay Singh, Dheeraj Kumar Purohit, Vimal Kumar, Pratima Verma, Ankita Malviya
Abstract: The main goal of this research is to model an approach to give top-k predictive search results in search engine by the use of a combination of algorithmic and probabilistic approach and compare their processing time. Modified edit distance algorithm is used for spell auto-correction and prefix tree is used for auto-completion. Intersecting Union List algorithm is also used for multi-query predictive results. Wikipedia dictionary words are used for a single word query dataset and IMDB (Internet Movie Database) movie list is crawl by a python crawler, which is built for this research. And the rating of the movie provided by IMDB and frequency of each word is used to rank words.
Keywords: Auto-complete; Prefix tree; Hashing.
Preventing Business And Information Technology Misalignment When Introducing Technology Changes
by Oscar Avila, Kelly Garcés
Abstract: Organisations introduce changes in order to adapt themselves to the extremely changing context. These changes often impact Information Technology (IT) and Business domains. In most of the cases, the scope of the organisational elements in these domains requiring adaptation is not well defined, leaving out elements, which can lead to misalignment. Thus, it is important to know the impact scope with the purpose of performing a full adaptation. When reviewing the literature in the Business-IT alignment research field, we found that there are no works dealing with this aspect. However, several works in adjacent areas have studied change management. In this paper, we report a systematic review of related work in these areas and extract a set of clues applicable to the Business-IT alignment domain which results in a change analysis framework and a set of rules to estimate impact scope and potential adaptation. Framework elements and rules are illustrated by means of an industrial case study
Keywords: Change Management; Information Technology; Business-IT Alignment; Strategic Alignment; Prevent misalignment.
Factors Affecting the Adoption of Internet Banking in Pakistan: An integration of Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TPB)
by Masoodul Hassan, Asghar Iqbal, Zeeshan Iqbal
Abstract: The use of Internet banking in Pakistan is third largest mode in e-banking after Real Time Online Banking (RTOB) and Automated Teller Machine (ATMs) and it is evolving with an impressive pace and creates its space among other mode of e-banking. Therefore, this study examined the factors that affect the adoption of Internet banking in Pakistan through the theoretical lenses of Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TPB). Structural Equation Modelling (SEM) with the help of Smart-PLS was used to examine the hypothesized relationships among the proposed constructs. A questionnaire survey was used for data collection. The study results confirmed the applicability of TAM and TPB frameworks in predicting the adoption of Internet banking by Pakistani bank costumers. Practically this study guides the strategic decision makers of banking industry especially of Pakistan to develop strategies that will help to increase the adoption of Internet banking in Pakistan.
Keywords: Technology Acceptance Model (TAM); Theory of Planned Behaviour (TPB); Behaviour; Pakistani Banks; Structural Equation Modelling (SEM).
Application of IT in Project Management using Structural Equation Modeling
by Hamidreza Eftekhari, Changiz Valmohammadi
Abstract: The main objective of this study is to extract maturity indices based on the Control Objectives for Information and Related Technology (COBIT) model at every 9 stages of project management, using structural equation modeling (SEM). Due to the limited number of experts at this company, the whole population of the experts(57experts) that are familiar with the concepts of project management and information technology were considered and the designed questionnaire were distributed among them. For data analysis, Partial Least Square technique (PLS) was employed.
Based on the perception of the experts, the two variables of quality management and human resources were moderately significant while the rest of the variables were regarded as highly significant. The results obtained from the ranking of the variables of project management indicated that the variable of project communication management is regarded as the most significant. Furthermore, the final results supported 6 out of 9 hypotheses of the study. Among the variables of project management, which significantly affect the maturity of IT application, the variable of project quality had the highest direct effect on IT maturity. To the best knowledge of the authors no model has been developed for project management maturity in the application of organizational IT, particularly in the context of Iran, and the present study attempts to take a step towards such a goal.
Keywords: Maturity of IT application; Project Management Maturity; Structural Equation Modeling; Control Objectives for Information and Related Technology (COBIT),Iran.
Comprehensive Three-Layer Trust Management Model for Public Cloud Environment
by Vikas Kumar, Prasann Pradhan
Abstract: Public Cloud Offerings are gaining a lot of popularity as they offer consistent savings to the users by their pay-as-you-go model. Parties involved in public cloud transactions may be unknown to each other, however the users need to access the services of unknown cloud providers or third parties and even handover their significant data. Then the genuineness of the service providers or users becomes the most important concern. An established trust between the parties can help in creating sustainable transactions as well as long lasting business relations. To manage and build the trust, there is a strong need of trust management mechanism, which can fulfil the requirements from both the customer and provider perspective. Present work proposes a three-layer trust management model in public cloud environment, which can accomplish the expectations from both the viewpoints and can also support in building a long-term trustworthy relationships between them.
Keywords: Cloud computing; Trust; Trust Management;Trust Acquisition; Trust Development;Trust Retention.
A New Technique for Data Encryption Based On Third Party Encryption Server (TPED) to Maintain the Privacy Preserving in the Cloud Environment
by Ashraf Aljammal
Abstract: As the cloud datacenters are exposed to a various types of attacks, data theft/leakage is considered one of the vital attacks that may affect datacenters credibility. In this paper, a new technique is proposed to store the users data in an encrypted form in the cloud datacenter via a third-party-encryption server. There-fore, the attackers and the datacenter authorities will be able to deal only with an encrypted form of the data. Furthermore, to decrypt the data, they need to know the encryption algorithm as well as the encryption key which is in turn placed on a third-party-encryption server. In addition, using third-party-encryption server (TPED) will lead to reducing the workload on both the cloud servers and the data owners machine.
Keywords: Data Encryption; Cloud privacy preserving; Network security; information security.
Critical Success Factors in ERP Implementation in Indian Manufacturing Enterprises: An Exploratory analysis
by Shree Ranjan, Vijay Jha, Pralay Pal
Abstract: Enterprise resource planning (ERP) implementation projects involve complex processes which influence operations and performance of companies. It is essential to identify critical success factors (CSFs) of ERP implementation projects out of several contributing factors. In most large Original Equipment Manufacturer (OEM) organizations, ERP systems have replaced legacy information systems with integrated and maintainable software. In an attempt to understand what the CSFs are, why they are critical, and to what extent they are relevant to such OEM organizations this paper explores the existing literature empirically to research the CSFs that lead to the success of ERP, which is our basic objective. We conducted Exploratory Factor analysis (EFA) in the context of ERP implementation in large manufacturing organization. The findings of the results provide valuable insights for the researchers, practitioners and managers interested in adopting ERP systems in similar environments, which is also an objective of our research.
Keywords: Enterprise Resource Planning; ERP;Critical success factorsCSF;Exploratory Factor Analysis;EFA.
A bottom-up approach for creating goal hierarchy using OLAP query recommendation technique
by Ranjeet Kumar Ranjan, Parimala N.
Abstract: Traditionally, data warehouses have been designed guided by an analysis of the underlying data sources. On the other hand, goal-oriented approaches build a goal decomposition structure which is further mapped to a data warehouse model. Goal-oriented approaches address the requirements of the decision makers. In this paper, we propose to build a goal decomposition structure for traditional data warehouses. As a result it can be assessed whether the existing data warehouse model satisfies the decision makers requirements. The approach is bottom-up wherein the tasks are identified first and the path to the strategic goal is built later. The tasks themselves are identified using OLAP query recommendation technique.
Keywords: Data Analysis; Data Warehousing; OLAP; MDX; Goal Decomposition; Goal Hierarchy; Strategic Rationale Diagram; Query Recommendation; Cosine Similarity; Similarity Measure.
Reduced Energy Consumption for MC/DC Testing
by Sangharatna Godboley, Arpita Dutta, Durga Prasad Mohapatra
Abstract: After deployment, testing and validation techniques have become an important requirement for the reliability of software. However, these techniques do not measure energy that they consume, which is also an important parameter for software systems with short energy budgets. In this paper, we propose a new energy conservation technique. This novel technique does not affect the coverage percentage, but reduces the energy consumption. Energy conservation is based on test case minimization technique according to Modified Condition/Decision Coverage (MC/DC) requirements. Our experimental study shows that, as compared to existing work, our proposed approach achieves less energy consumption. On an average of five programs, we save 40.8% energy consumption
Keywords: Energy Consumption; Green Software Engineering; Green Software Testing; MC/DC.
To Measure the Business Performance through Cloud Computing Adoption in Indian Scenario: Structural Equation Modelling (SEM)
by Rakesh Raut, Pragati Priyadarshinee, Manoj Kumar Jha, Manoj Kharat
Abstract: The purpose of this research article is to measure the business performance through Cloud computing adoption in Indian industries. Data collection was done through a questionnaire based survey that was completed by 660 managers from Indian industries. The derived hypotheses were tested using structural equation modelling. The results show that six out of eight hypotheses were supported for cloud computing adoption to measure business performance. The research model has been tested empirically through three phases: exploratory factor analysis (EFA), confirmatory factor analysis (CFA) and structural equation modelling (SEM). The findings are: (1) trust is having a major impact on cloud computing adoption followed by perceived IT security risk, technology innovation, risk analysis, management style; (2) usage of technology and industry use are having very insignificant effect on cloud adoption rate. This research identified trust as a major factor influencing the cloud adoption rate. However, further research is required to fully understand all the aspects involved especially with the growing number of vendors available. Some more sub-factors can be derived for business performance which can be analysed through second-order SEM. In the final survey with 660 managers, two factors top management support and market place establishment have been confirmed and found are the most important criteria for cloud computing adoption. So, from this study service, manufacturing and power sectors are benefitted in terms of the business performance. This research provides original insight for cloud computing adoption within Indian industries from a managerial perspective.
Keywords: Cloud computing adoption; Business performance; Exploratory Factor Analysis; Confirmatory Factor Analysis; Structural equation modelling; Indian industries.
A Systematic review on Techniques of Feature Selection and Classification for Text Mining
by Sridharan K, Sivakumar P
Abstract: Nowadays, there is a quick development in the use of internet. The large amount of structured, Unstructured and Semi-Structured forms like videos, images, audio or texts, these types of data that can be shared and used on the internet by the users. The storing of large quantity of unstructured text, which cannot be used for further processing, where the sequence of useful patterns, then the algorithm and methods of preprocessing are required. From the unstructured text, an interesting knowledge and information extraction process is called as text mining. The main analysis of text mining is as follows: Preprocessing, Feature Dimension Reduction (Feature selection or feature extraction) and text classification, clustering on the final features. In this paper, preprocessing is a step, used to remove the stop words, stemming for removing different suffixes by means to reduce the words count. Context sensitive stemmer methods are used for the further feature selection and classification of the storing of unstructured texts. The unsupervised and supervised feature selection methods like document frequency, term strength, chi-square and information gain are compared to produce the best method for the web document feature selection. The classification techniques like Latent Semantic Analysis, Genetic Algorithm, Rocchios Algorithm and Neural Networks are also compared. Finally, a systematic review on the feature selection methods and text classification techniques takes place.
Keywords: Information Gain; Document Frequency; Term Strength; Artificial Neural Network; Latent Semantic Analysis; Text mining; Stemming.
From Information to Interaction: Website and Social Media Usage and Trends in Top Indian Higher Education Institutions
by Rakhi Tropathi
Abstract: Purpose: The purpose of this study is to examine Web 2.0 usage in terms of website development and social media of top 300 higher education institutions (HEI) in India in terms of website and social media.
Design/methodology/approach: Top 300+ Institutions were selected from National Institutional Ranking Framework, India. Content analysis was used in terms of quantitative approach.
Findings: All the selected institutions have website and one third of the institutions are on social media. One-fourth has unofficial accounts on social media. In totality no trend has been noticed in Web 2.0 usage of higher education institutions in India.
Research limitations/implications: This study is completely based on publicly available data regarding presence on website and social media. Outcomes suggest that HEI are using Web 2.0 applications but at a slow pace.
Originality/value: This is the first research that draws an overall picture of the top institutions Web 2.0 usage in India. The study provides academics with helpful information to better meet their user needs by effectively applying digital strategies.
Keywords: Web 2.0; Website; Interaction; Transaction; Higher Education; Social Networking Site.
The Effect of Culture Values on Consumer Intention to Use Arabic E-Commerce Websites in Jordan: An Empirical Investigation
by Kamsuriah Ahmad, Mohannad Ayyash, Omar Al-Qudah
Abstract: Abstract: A number of studies on the issues of Technology Acceptance Model (TAM), Hofstedes cultural values, risk and trust, have been done. However, the studies in combining all these issue are still limited especially in defining the relationship between them. Hence, this study attempts to examine the relationship between the variable through a developed model that is expected to improve the intention of consumers to use Arabic E-commerce websites. This study employs the quantitative method for data collection with the help of a questionnaire. The tested variables are significantly influenced the consumer intention behaviour, where intention to use factor positively impacted the utilization of Arabic E-commerce website. The findings showed support for the premise advocated by TAM and Hofstedes cultural dimensions theory as both were revealed to demonstrate the consumers intention towards using Arabic websites. The study enumerates the theoretical and practical implications, limitations as well as recommendations for future direction of studies.
Keywords: Keywords: Culture Values; Consumer Intention; Intention to Use; Arabic E-Commerce Websites; Trust; Risk; Arabic Language.
A Comparative Study of Emerging Scientific Themes in Business Analytics
by Iman Raeesi Vanani, Seyed Mohammad Jafar Jalali
Abstract: The purpose of this research is to investigate the emerging scientific themes in Business Analytics through the utilization of burst detection, text-clustering and word occurrence analysis in top Information Systems journals in order to provide an insight about the future scientific trends of business analytics for scholars and practitioners in the field. Researchers have gathered a rich set of Business Analytics articles from top journals which are indexed in the well-known scientific database of Web of Science (WoS) Core Collection. The burst detection algorithm, text clustering and terms frequency analysis are consecutively applied so as to understand the emerging themes in Business Analytics. The study provides clues, directions, and knowledge-based guidelines on the recent business analytics scientific trends through the utilization of mentioned algorithms over paper abstracts, titles, and keywords. Many of scholars and practitioners who are willing to conduct research over business analytics, business intelligence (BI), data science, and meta-heuristics will find this research helpful as it concentrates on the most deeply studied areas of related research. This study also highlights the most important areas of research and the future research directions that might be interesting to business analysts through an in-depth analytical discussion. An analysis of other academic databases and international publications would enrich the depth and breadth of this research.
Keywords: Business Analytics; Burst Detection; Text Clustering; Words Occurrence; Decision Support.
EI-Annotate: An adaptive collective memory based on annotation ontology and context for decision making in economic intelligence
by Aissa Bensattalah, Faical Azouaou, Fahima Nader, Rachid Chalal
Abstract: In the decision support process, the economic intelligence actors use mental efforts and considerable cognitive activities to solve decisional problems; they deal with a large mass of digital documents during their activities. To facilitate their activities, they use different types of annotations on the manipulated document. To exploit the benefits of these annotations, we propose in this paper, EI-Annotate, an annotation tool dedicated to economic intelligence actors, which enables them to create an adaptive collective memory. The adaptive collective memory based on annotation ontology and context suitable for economic intelligence. This memory is a knowledge management tool that can support economic intelligence actors in their decision process. The EI-Annotate annotation module is implemented as extensions using different technologies; it enables to annotate resources in different formats (document, picture, videos). We present the results of an evaluation study of the proposed architecture of an adaptive collective memory conducted with a research laboratory context, regarding their annotation experience using EI-Annotate.
Keywords: economic intelligence; decision support process; unstructured decision problem; ontology; semantic annotation; context; adaptation; annotation tool.
Prioritization of agile characteristics in products using Fuzzy AHP approach through the referencing of the features of mobile phones
by Thilak VMM, S.R. Devadasan, M. Vinod, D.T. Sunil
Abstract: In order to face the intensification of competition, modern companies are required to implement agile manufacturing paradigm. Since mobile phone manufacturers have implemented the characteristics of agile manufacturing paradigm, mobile phone industry thrives in this competitive world by frequently bringing out several models of mobile phones with amazing features. In the context of this observation, the research reported in this paper was carried out. In this research, 30 features that ascribe the agile characteristics of mobile phones were identified. Subsequently, fuzzy Analytic Hierarchy Process (AHP) technique was applied to prioritize the features and characteristics that infuse agility in mobile phones. The outcome of this research revealed that functional characteristic has been playing major role in enhancing the agility of the mobile phones. This result indicates that modern companies are required to prioritize the infusing of functional characteristic in products for exercising speedy implementation of agile manufacturing paradigm.
Keywords: Agile manufacturing; AHP; Fuzzy logic; Fuzzy AHP; Mobile phones.
An Empirical Examination of Customer Experience Co-creation model in Banking Self Service Technologies (SSTs).
by Amit Kumar Agrawal, Asha Nagendra
Abstract: The aim of the paper is to develop and validate customer experiences co-creation model in banking SSTs. Primary data collection was done through the field survey method using a self- administered questionnaire. The study is descriptive in nature. Structural equation modelling is used to analyze the data collected through the questionnaires. The study result reflects that customer propensity towards SSTs leads to co-creation of experiences which are responsible for satisfaction of customers with technological products. Present research is performed in the context of banking SSTs and cross sectional in nature which could be further replicated in other SSTs adoption context. The finding of the study would motivate manager to work on newer ways to intensify customer experiences through SST adoption in value co-creation process. The study is the first of its kind to examine SST adoption model that integrates customer experiences. Further study should undertake the quality of customer experiences as a tool for customer retention.
Keywords: Value Co-creation; Experiences; Customer Participation; Banking; Self Service Technologies (SSTs).