Forthcoming articles


International Journal of Information Systems and Change Management


These articles have been peer-reviewed and accepted for publication in IJISCM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJISCM are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Information Systems and Change Management (4 papers in press)


Regular Issues


  • Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud   Order a copy of this article
    Abstract: In today's business world, a huge amount of data has been generated every day, which cannot be stored or handled in a single premise. Technologies like cloud computing provide a generous storage service to outsource the business and personal data. The major research challenge of data outsourcing is ensuring data confidentiality. Data confidentiality resist the unauthorized access of the data through legislative procedures. One of the common and well known PKC is RSA cryptosystem. In this paper, an Improved Secure RSA Cryptosystem (ISRSAC) has been proposed to increase the complexity in factorizing the value of modulus 'n'. Existing integer factorization methods like number field sieve, Pollards (p-1), and Elliptic curve methods can be used to factorize the value of 'n' in RSA Cryptosystem. But, in ISRSAC, due to the complexity of computation in 'n', it is computationally difficult. A comparison is done with RSA, MREA [19] and ESRKGS [2] cryptosystems to show that ISRSAC is efficient. The experimental results prove that ISRSAC consumes more time for cryptanalysis compared to ESRKGS, MREA and RSA cryptosystems. Thus, ISRSAC is more secure for data outsourcing in the cloud.
    Keywords: Cloud Computing; RSA; Cryptanalysis; Data Outsourcing; Confidentiality; Cryptography;.

  • The Effect of an Information Ethics Course on the Students\' Information Ethics Values: A Kohlberg\'s CMD Model\'s Perspective   Order a copy of this article
    by Christina Ling-hsing Chang 
    Abstract: Students\' information ethics values (IEVs) are critical and of radical importance in achieving the above title\'s goal. Based on the Mason four issues of information ethics which are privacy, accessibility, intellectual property, and accuracy, (PAPA), the present study utilizes Kohlberg\'s Cognitive Moral Development (CMD) model to measure the improvement in the students\' IEVs through an information ethics course (IEC). Therefore, this paper uses the ethical reasoning of 655 students, to recognize the power of a scenario-based survey. Meanwhile, this study employed non-parametric analytical methods to test the outcome of two groups of students that have/not have IEC training being two independent groups. This study finds that while the course improves students\' \"privacy,\" \"accuracy\" and \"intellectual property\" values, however, it decreases their \"respect rules\" and \"accessibility\" values. Moreover, these results are analyzed from learning theories (models) and from a Confucian ethics perspective (CEP). In light of these results, educators should take account of such improvements when designing effective teaching methods, and incentives, whilst considering the CEP.
    Keywords: Information Ethics values; Kohlberg\'s CMD Model; Learning Theories; Information Ethics Course.

  • What determines work motivation of IT professionals: An integrated model   Order a copy of this article
    by Ling-Hsiu Chen, Xiaodan Zhou, Rung-Ching Chen, I-Hsueh Chen 
    Abstract: This study proposes an integrated model of the relationships among supervisory leadership style, employee achievement motivation, job characteristic perception, and work motivation of information technology (IT) professionals in China. LISREL is applied to test and analyze the proposed model. The results demonstrate that leadership style and employee personal achievement motivation positively influence job characteristic perception for IT professionals. However, leadership style only weakly influences job characteristic perception. Additionally, job characteristic perception positively influence work motivation. Thus employee personalities should be considered, specifically their achievement motivation before inspiring their positive perception on job characteristics when attempting to recruit IT professionals or improve the quality of existing IT staff.
    Keywords: work motivation; job characteristics; achievement motivation; leadership style.

  • Heuristic based Time-Aware Multi-Criteria Test Case Prioritization Technique   Order a copy of this article
    by Uma Maheswari Rengarajan, Jeya Mala D 
    Abstract: Regression testing is a costly process used to validate the changed software code. Test case prioritization techniques enhance the cost-adequacy of regression testing by ordering the test cases such that more imperative test case runs earlier in the testing process. This paper proposes a Heuristic based technique for Time aware Multi-Criteria Test case Prioritization (HTMCTCP). It considers various targets simultaneously and chooses the best test cases within the stipulated time budget. This technique swaps between the neighborhood search and the global search in the huge search space of the problem to avoid getting stuck in local optima and also it guarantees fast convergence to the best solution. When the effectiveness of the technique is compared with the existing prioritization approach like Genetic Algorithm (GA) and Simulated Annealing Algorithm (SA), it is inferred that the proposed HTMCTCP technique indicates noteworthy change over those systems.
    Keywords: Regression Testing; Test Case Prioritization; Heuristic Technique; Genetic Algorithm; Simulated Annealing Algorithm;.