International Journal of Business Information Systems (145 papers in press)
A study of Feature Selection techniques for predicting customer retention in Telecommunication sector
by E. Sivasankar, J. Vijaya
Abstract: Churn is a termination of a contract between customer and company or quitting customer using the product or service. The goal of Churn Management (CM) is to reduce customer losses and retain profitable customers. Churn prediction is an important measure that leads to the solutions for the development of any business or industry; mainly it has lots of impact in telecommunication field. The eventual aim of the organization is to retain the existing customer base, because adding new customers may need investment of money, human resource and additional time. In the current era many researches and industries focus on effective research on churn prediction. Based on the analysis of works performed in the past, it is comprehended that there is some lagging in identifying necessary features in the telecommunication field and also the performance of the telecommunication sector is challenging due to the highly complex dimensional data sets.Feature selection is the process of eliminating irrelevant features from the data set, while maintaining acceptable classification accuracy. The selected features play an important role which can directly influence the effectiveness of the resulting classification. In this paper, a methodology is proposed consisting of two phases, attributes selection and classification based on the attributes selected. Phase one uses a Filter and Wrapper method for attribute selection with Random over-sampling (Ros) through which the size of attributes set and misclassification error can be reduced. In the second phase, the selected attributes are taken as inputs by classification techniques like Decision Trees(DT), K-Nearest Neighbor(KNN), Support Vector Machine(SVM), Naive Bayes(NB) and Artificial Neural Network(ANN). In this work the data set KDD Cup 2009 is used for evaluating the performance. Finally True Churn, False Churn, Specificity and Accuracy are measured to evaluate the efficiency of the proposed system and it is found that the above mentioned methodology performs well ahead for churn prediction and suits well for the telecommunication sector.
Keywords: Churn prediction; Random over sampling; Feature selection; Filter method; Wrapper method;Classification;DT;KNN;SVM;NB;ANN.
RELATIVE EFFICIENCY OF SOCIAL CRM SOFTWARES: A HYBRID FUZZY AHP/DEA APPROACH
by V. Raj Kumar, L. Suganthi
Abstract: In todays tech-savvy society, social media platforms revolutionize the way in which people communicate and share information with each other. These platforms enable customers to instantly and openly convey their opinions, criticisms and praises on various topics pertaining to products and brands. Hence it becomes imperative for organisations to integrate social media information into their CRM strategy. In this paper, relative efficiency of the Social CRM packages using fuzzy AHP/DEA:AR-CCR was determined by considering price as the input criterion and functionality, product quality and customer support as output criteria. Using fuzzy AHP it was found that product quality (41.66%) is the most important criteria followed by functionality (33.29%) and customer support (25.05%). Pipedrive and Really Simple Systems were found to be relatively more efficient. In this manner a Social CRM package that best fits an organisations customer-centric work culture is selected. The Social CRM vendors can utilise these results to benchmark their packages against their competitors.
Keywords: Customer Relationship Management; Social media; Fuzzy Analytical Hierarchical Process; Data Envelopment Analysis; Relative efficiency.
An Adaptive Algorithm for Frequent Pattern Mining over Data Streams using Diffset Strategy
by Subbulakshmi Balasubramanian, Deisy Chelliah
Abstract: Frequent pattern mining using sliding window over data streams is commonly used due to its wide applicability. Determining suitable window size and detection of concept change are the major issues and can be addressed by having flexible window based on amount of changes in frequent patterns. For mining frequent patterns over data streams, vertical mining algorithms can be used. However, in these algorithms, size of transaction identifiers (tidsets) and the time for computation of intersection between tidsets is large. Moreover, presence of null transactions does not contribute any useful frequent patterns. A new algorithm called Recent Frequent Pattern mining based on Diffset with Elimination of Null Transactions (RFP-DIFF-ENT) over data streams using variable size window is proposed. It stores difference of tidsets and eliminates null transactions which minimize memory and mining time. Experimental results show that proposed algorithm saves computation time, memory usage and minimizes the number of frequent patterns.
Keywords: Frequent Itemsets; Diffset; Data Streams; Sliding Window Model; Concept Change.
Towards Developing an Automated Attendance Management System using Barcode Reader: Hashemite University as a Case Study
by Subhieh El-Salhi, Safa'a Al-Haj Saleh, Ibrahim Al-Amro
Abstract: In higher educational institutions such as colleges and universities, student attendance has a significant impact on the academic outcomes and thus on the overall educational process. Therefore, the need for an automatic attendance registration system is one of the most critical requirements in educational process nowadays; especially with the tremendous growth in technology sectors. This paper presents an Automated Attendance Management System (AAMS) where the attendance of the students is recorded automatically to overcome the manual attendance tracking system flaws. The proposed system consists of two main components, a student identification number and a hand-held scanner. The AAMS system is mainly designed for the Hashemite University, one of the leading universities in Jordan, to replace the old and inefficient current manual attendance system with a portable, simple, easy and low-cost solution of attendance registration system. Details of a real implementation of AAMS system within the university are illustrated and presented.
Keywords: Automated Attendance Management System (AAMS); Barcode Reader; Student identification card.
Investigating Q-learning approach by using reinforcement learning to decide dynamic pricing for multiple products
by Fakhrddin Maroofi
Abstract: The focus of this paper is on the benefits of application of interdependent dynamic pricing that is unlike individual pricing of products or services. This article considers a revenue management problem of multiple interdependent products, in which adjusted over a finite sales horizon to maximize expected revenue, given an initial inventory for each product. This article is to use reinforcement learning to model the ideal pricing of multiple interdependent products when demand is stochastic and its functional form unknown. We show that reinforcement learning can use to price interdependent products. Moreover, we analyze to behave the Q-learning with eligibility trace algorithm under different conditions. We explain our analysis with the pricing of services.
Keywords: Q-learning approach; Reinforcement learning; Revenue management; Service management; Simulation; Iran.
An Empirical Study on Factors Affecting the Acceptance of M-commerce Application among Small and Medium-Sized Tourism Enterprises by Integrating TTF with TAM
by Saleh Alqatan, Noor Maizura Mohamad Noor, Mustafa Man, Rosmayati Mohemad
Abstract: Tourism is an attractive sector for economic development as it offers potential economic benefits for developing countries. Most tourism sectors throughout the globe consist of Small and Medium-sized Enterprises (SMEs) and as such, tourism SMEs (SMTEs) utilization of Mobile commerce (M-commerce) is crucial in terms of added efficiency, effectiveness and innovation. However, there is a low level of acceptance for M-commerce applications in SMTEs in most developing countries. In such countries, effective applications and factors that impact the acceptance rates of M-commerce in SMEs, is still in the early stage. More importantly, the factors impacting the application of M-commerce are still ambiguous and the relevant theories for M-commerce acceptance have largely been untouched in literatures in the context of developing countries, particularly in Jordan. The paper aimed to test the factors influencing the acceptance of M-commerce application among SMTEs. The questionnaire was distributed to the target sample and the obtained data from questionnaires was analyzed through the SPSS statistical software. Results of the analysis revealed that all factors positively influenced behavioural intention to use M-commerce application in such enterprises. The study provides advanced knowledge of users acceptance of M-commerce in SMTEs, which will help the M-commerce providers in such enterprises to understand the factors that influence the acceptance of M-commerce in SMTEs, which in turn, plays an important role in increasing the acceptance level of M- commerce in SMTEs.
Keywords: M-commerce; Small and Medium-sized Tourism Enterprises; Technology Acceptance Model; Task-Technology Fit model; perceived trust.
Secure Cluster based Data Aggregation in Wireless Sensor Networks with Aid of ECC
by C. SriVenkateswaran, Sivakumar D.
Abstract: Wireless sensor networks are widely deployed for wide range of applications for gathering information about the desired application. In general, sensor nodes sense their environment, collect sensed data and transmit it to the base station. During this transmission of sensed data from node to sink there is a lot of energy get reduce. In-order to overcome this problem, some of the researchers used cluster head-based approach to send the data to the sink node. The cluster heads collects all traffic from their respective cluster and performs data aggregation before transmitting the data to the sink. In this paper, we have presented the approach for cluster head selection for data aggregation in wireless sensor network. For clustering the node, the proposed method is use hybrid k means and fuzzy c means clustering algorithm. Then we select the cluster head from each cluster. Every node in the wireless sensor network sends their sensed data to the cluster head. The data aggregation is done in the cluster head. Finally base station is received the data from one cluster head, in order to reduce the transmission time here the proposed method is remove the duplicate data and then secure transmission is done by Elliptic curve cryptography (ECC). The performance of the proposed technique is evaluated by overall running time and also the encryption and decryption time. Finally, the simulations are performed and the results are analyzed within the simulation set up to determine performance of the proposed algorithm in the sensor network.
Keywords: data aggregation; wireless sensor network; k means clustering; fuzzy c means clustering; Elliptic curve cryptography.
Intention to Adopt Mobile Banking in Bangladesh: An Empirical Study of Emerging Economy
by Md Shamimul Islam, Noorliza Karia, Muhammad Khaleel, Firdaus Bin Ahmad Fauzi, Mohamed Soliman Mohamed Soliman, Jamshed Khalid, Md. Yeasir Arafat Bhuiyan, Md. Abdullah Al Mamun
Abstract: Mobile banking is an advanced form of traditional banking. In Bangladesh, despite the initiatives by the banking companies to continuously upgrade their facilities to support mobile banking, customers' adoption rates are still low. Thus, the aim of this study is to investigate the factors influencing the behavior of customers to adopt mobile banking. By adaptation of the Unified Theory of Acceptance and Use of Technology (UTAUT), the study used Partial Least Square (PLS) and Structural Equation Modeling (SEM) to achieve the result. It was found that all the factors listed are significantly influencing the behavior of the customers, except the factor of performance expectancy. The study concluded that the mobile users outside Dhaka, the capital city of the country, are not much aware of mobile banking as compared to mobile users in the capital city. By extending the previous study, this study contributed to the existing literature and to the body of knowledge in general. The theoretical and managerial implications,as well as the directions for future research were also stated.
Keywords: mobile banking; technology adoption; UTAUT; emerging economy; Bangladesh.
Semantic Technology and Linguistic Modeling in Business Strategy Design and Evaluation
by Jozef Stasak, Peter Schmidt
Abstract: This paper addresses the problem of a knowledge based support, when designing business strategy and adequate key performance indicators (KPI). The business strategy designing is considered to be a business process and is a subject of modelling as well, while a linguistic modelling approach is applied for those purposes, where the business process model semantics plays a role of principal importance and that model is derived from text in natural language (TNL text), which describes structure and functionality of the business processes to be modelled quantified via linguistic sets, which create basis of business process model semantics and might be applied in design and implementation of Business Process Linguistic Modelling - Expert System built up base on semantic technology principles (ST-LM Expert System). The ST-LM Expert system Knowledge Base operates based on semantic networks and (SNW) and reference databases and contains knowledge concerned to KPI Indicator generation and decomposition to lower levels of management. In that paper, the ST-LM Expert System structure and functionality is described together with an appropriate knowledge base and inference mechanism.
Keywords: business process; linguistic modelling; expert system; knowledge base; inference mechanism; semantic networks; reference databases.
A hybrid model for customer credit scoring in stock brokerages using data mining approach
by Rahmat Houshdar Mahjoub, Amir Afsar
Abstract: Credit scoring has become a challenging issue for stock brokerages, as the credit industry has been facing high competition during the past decade. Many methods have been suggested to credit scoring in the literature. The purpose of this study is to set up a hybrid model for customer credit scoring in Iran's National Investment Brokerage. It also provides a way to pay appropriate facilities as tools for CRM. So, after the data preprocessing step, we convert refined data set into RFM model. Customers were clustered using two clustering algorithms, self-organizing map (SOM) and K-means. In both methods, the best optimum number of clusters was calculated at 10. Afterwards, the clusters ranked using TOPSIS and the top three clusters were considered as the target customers. Eventually, the credit score of the superior cluster members were calculated. Coefficient facilities granted to the top three clusters respectively are 0.271, 0.173 and 0.556.
Keywords: Credit scoring; Customer relationship management; RFM; SOM; K-means; Data mining; TOPSIS.
Exploring the antecedents of co-creation in hospital-supplier relationship: An empirical study on private sector hospitals in India
by Samyadip Chakraborty
Abstract: One of the biggest challenges in healthcare is cost containment. In the face of continuously spiralling cost hospitals are facing steep competition to provide increased access to high quality services. In this backdrop, network relationship become vital and offers extensive opportunities to explore hospital-supplier relationships. Past literature highlights interaction and collaborative ambience as prerequisite to value co-creation. This study focuses on co-creation aspect in the hospital-supplier relationship context (medical-surgical suppliers) and uses a Service-Dominant Logic lens besides drawing support from Relational-View and Relational-Coordination-Theory.rnThis study aims at empirically exploring the relational antecedents of co-creation and establishing Prahalad and Ramaswamys (2004) DART(Dialogue-Access-Risk-Assessment-Transparency)framework, trust and commitment as antecedents to co-creation. Data were collected from 229 private tertiary-care hospitals in and around four major urban areas in India. The relationships proposed in the research model were tested using structural equation modelling. Results indicaternthat the DART parameters and the relational variables (trust, commitment) act as antecedents to co-creation and have significant and positive relationship, thereby enhancing co-creation activities. The study also explored the impact of interdependence between hospital and suppliers on DART parameters,rntrust and commitment besides exploring trust to DART linkages and structural model outcomes indicate significant and positive relationship for the linkages.
Keywords: Healthcare; Co-creation; Hospital-supplier relationship; Supply Chain Management; Trust;Interdependence; DART; Purchasing.
Managing Privacy of Sensitive Attributes using Fuzzy based Data Transformation Methods in Privacy Preserving Data Mining Environment
by V.K. SAXENA, Shashank Pushkar
Abstract: When we extract personal, sensitive and business information in data mining applications, then certain problems occurs. Privacy attack occurs due to the misuse of individual information. It means that privacy concerns are challenging for data miners. In data mining applications privacy preservation is multifaceted effort because it assures the privacy of respective devoid of trailing the veracity of the various data mining outcomes. When analyzing the data in any company or government organizations, these types of data become very much important. In privacy preserving, data proprietor have to provide an elucidation for achieving the twin goal of privacy preservation in addition to precise clustering outcome. In centralized database environment, data transformation methods in fuzzy based data in the field of privacy preserving clustering are proposed in this paper. In first case, a fuzzy data transformation method is proposed and different experiments are conducted by changing the fuzzy membership functions such as Z-shaped fuzzy membership function, Triangular fuzzy membership function, Gaussian fuzzy membership function to transform the original dataset. In second case, a hybrid method is proposed as a combination of fuzzy data transformation approach which is specified in first case and Random Rotation Perturbation (RRP). The experimental outcome verified that the hybrid approach permits finest results for every member functions.
Keywords: Fuzzy Membership Function; Privacy Preservation; Data Transformation; Clustering; Random Rotation Perturbationrn.
Privacy preserving of intermediate dataset using hybridization of Oppositional Gravitational Search Algorithm and Elliptic Curve Cryptography
by Saravanan S, Venkatachalam V
Abstract: Distributed computing gives the gigantic capacity ability to the clients to send their applications without any infrastructure investment. Based on the application lot of intermediate dataset will be created. To protecting these intermediate dataset is a challenging task. Moreover, encrypting all dataset is a time and cost consuming. To overcome the problem, in this paper we proposed a privacy preserving of intermediate dataset using a combination of Oppositional Gravitational Search Algorithm and Elliptic Curve Cryptography (OGSA+ECC). Initially, we split the dataset into a number of the intermediate datasets, then, we choose the node corresponding intermediate dataset from the cloud using an oppositional gravitational search algorithm (OGSA). After that, we choose the sensitive data from the dataset using the information gain measure to minimize the processing time and cost. Then, using the ECC algorithm the sensitive data is encrypted and in the cloud the secure data are stored. The experimentation is carried out in terms of encryption time and memory use.
Keywords: Cloud computing; OGSA; ECC; CSP; POS; trapdoor; encryption; decryption.
Predictors of E-government adoption in India: Direct and Indirect effects of Technology Anxiety and Information Quality
by Kapil Kaushik, Rajhans Mishra
Abstract: E-government adoption has been the focus of many research studies in the past. However, few studies have explored the role of technology anxiety and information quality in the E-government adoption process. The purpose of this paper is to examine the direct and indirect effects of technology anxiety and information quality on E-government adoption. The results of our study indicate that technology anxiety indirectly influences E-government adoption. At the same time, the direct effect of technology anxiety on E-government adoption weakens in the presence of effort expectancy. Perceived information quality has positive direct effect on E-government adoption. However, we did not find any significant indirect effect of information quality on E-government adoption. This study contributes to E-government adoption frameworks by analysing the effect of computer and internet related anxiety and information quality on the adoption of E-government services. Implications for theory and practice that would help the policy makers in enhancing the effectiveness E-government services are discussed.
Keywords: E-government adoption; Information quality; Technology anxiety; Indirect effect.
To identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs.: Structural Equation Modeling Approach
by Vaibhav Narwane, Balkrishana Narkhede, Rakesh Raut, Bhaskar Gardas, Pragati Priyadarshinee, Mahesh Kavre,
Abstract: In everyday life, we come across multiple emerging applications of CloudIoT like the smart phone, smart television, smart city, smart factory, smart agriculture, etc. CloudIoT is the collaboration of cloud computing and Internet of Things technology. Even though IoT and cloud are having contradicting characteristics, the collaboration of IoT and cloud helps in solving their issues partially and gives rise to new services. The objective of this study is to develop a model using the structural equation modeling approach to identify the determinants of the CloudIoT technologies adoption in the Indian MSMEs. The determinants considered for the study were cloud computing, perceived IT security risk, social influence, Internet of Things, perceived ease of use, perceived usefulness, trust, and intention to use. The data were collected from the 500 respondents of Indian MSMEs. The results of the investigation revealed that cloud computing, social influence, Internet of Things, perceived ease of use, trust, and perceived IT security risk positively influence the intention to use. The developed model is intended to guide the organizational managers, decision, and policy makers in understanding the relationship between the various determinants and intention to use CloudIoT technologies.
Keywords: Internet of Things (IoT); cloud computing; CloudIoT; micro; small and medium enterprises (MSMEs); structural equation modeling (SEM).
Evaluation of Telecommunications Regulatory Practice in the Kingdom of Bahrain: Development and Challenges
by Adel Al-Alawi, Sara Al-Bassam
Abstract: This study has investigated the evaluation of Telecommunications Regulatory Authority (TRA) practice in the Kingdom of Bahrain. Having realized the importance of telecommunication, Bahrain has become one of the leading Information and Communication Technologies (ICT) economies in the Gulf Cooperation Council (GCC) region and is ranked among the top 30 in the world. Such a ranking has encouraged the researchers to take Bahrains TRA as the focus of this study. The aim of this paper is to evaluate and identify the factors that have influenced the TRA framework in the Kingdom and to investigate the development and challenges of TRA in Bahrain and how to lead to the best performance in the market place. The study also investigated the role of certain factors in Telecommunication Regulation. Interviews and surveys with the TRA and major operators in Bahrain were conducted. The findings show that Licensing, Interconnection, Price Regulation, Competition Policy and Universality Access are key factors influencing the telecommunication regulatory framework in Bahrain.
Keywords: TRA; telecommunication regulatory authority; Bahrain; licensing; interconnection; price regulation; foster competitive markets and universality access; Batelco; Zain; VIVA; Menatelecom .
Identification and prioritization of the critical success factors for research project-based organizations using fuzzy analytic hierarchy process
by Mehdi Tabaroki, Changiz Valmohammadi, Nader Khalesi
Abstract: The main purpose of this study is to identify and prioritize critical success factors by using analytic hierarchy process (AHP) technique in research project-based organizations which is based on literature review and related research in this field and experts opinions .To this purpose , in the model selection and validation step , a questionnaire was designed and distributed among professionals and its validity and reliability have been investigated .In order to complement and enhance the validity of the study ,experts were interviewed and then the model was presented and information was analyzed. The ranking of the main of critical success factors (CSFs) using fuzzy AHP method reveals that the project factors with a weight of 0.445 is the most important among the identified factors. Considering the current lack of understanding of CSFs within the local context, this study is one of the first attempts to gain an understanding of the CSFs in the Iranian industry context. The results of this research can be remarkably help to project leaders of these organizations in the face of project challenges and successful implementation of research projects.
Keywords: Project-based organizations; Research organizations; Critical Success Factors (CSFS); Fuzzy Analytic Hierarchy Process (FAHP); Iran.
Cluster Analysis for Diabetic Retinopathy Prediction using Data Mining Techniques
by Tanvi Anand, Rekha Pal, Sanjay Dubey
Abstract: Diabetic Retinopathy is a one of the increasing medical situation occurs due to fluctuating insulin level in the blood that leads to loss of vision. It is an ophthalmic disease which is mainly occurs due to the generation of the new abnormal blood vessels. Diabetic retinopathy with exudates are causing main health problem that leads to loss of sight. Patient suffering from diabetes are advised to undergo continual retinal test by reason of diabetic retinopathy. As the population is quite large as compared to health care system available, tests should be optimized and identification of the disease is complex and time consuming task. In this paper clustering technique is used among the various Data Mining techniques, clustering is the good approach to handle the complex task. Experiment is conducted to identify the best clustering technique which can easily identify the various impacting factors pf DR in less complex way. The experimental results reflect that the performance of K-Means is better than other clustering techniques. This analysis will help the medical practitioner to identify best algorithm for disease detection and provide preventive measures in advance.
Keywords: Clustering techniques; disease; data mining; classification.
An Exploratory SOLAP Tool for Linked Open Data
by Daniel Farias Batista Leite, Claudio De Souza Baptista, Brunna De Sousa Pereira Amorim
Abstract: Business intelligence (BI) Technologies are being successfully applied in data analytics, including in the use of spatial data. The advent of the Semantic Web brought semantically rich and semi-structured data formats, such as RDF (Resource Description Framework), which are external to the BI infrastructure. The integration of both conventional and Semantic Web data into a BI system results in a new category of analytical tools called exploratory OLAP. We extend exploratory OLAP with spatial capabilities, providing an exploratory SOLAP, called ExpSOLAP. ExpSOLAP is the first analytical tool that integrates semantic, spatial, semi-structured data with traditional spatial, structured data sources. Additionally, SOLAP queries can be posed in both data sources.
Keywords: Business Intelligence; Exploratory SOLAP; Semantic Web; Ontology; Linked Data; SPARQL; SOLAP; Open Data; RDF; DW.
The Significant of Personal Characteristics and Situational Characteristics as mediating factors in influence Information Source and Information Choice strategies of the Arab Tourists in Malaysia
by Bilal Al-khateeb
Abstract: In an attempt to further explain how information source influences the information choice strategies; the study investigates the mediating effects of both personal characteristics and situational characteristics on the relationship between information source and information choice strategies of the Arab tourists. The study covered all the Arab tourists visiting Malaysia between 2011 to 2012. A questionnaire data was generated from 358 respondents of Arab tourists in Malaysia through self-administered questionnaire procedure, and the questionnaire data was analyzed using the SmartPLS analysis technique. Overall, the study found significant mediating effects of both personal characteristics and situational characteristics on the relationship between personal characteristics and information choice strategies. The findings further show a partial mediating effect for the personal characteristic while a full mediating effect was found on the situational characteristics variable. Based on this, the study concludes that personal characteristics and situational characteristics can jointly mediate the relationship between personal characteristics and information choice strategies. The study provides some insights on the importance of personal characteristics and situational characteristics and the need to consider the two factors when planning for tourism adventures by the Arab tourists.
Keywords: Personal characteristic; Situational Characteristics; Information Source; Information Choice strategies; Tourism; SmartPLS.
Designing an e-commerce recommender system based on collaborative filtering using a data mining approach
by Samira Khodabandehlou
Abstract: E-commerce recommender systems have been converted to a very important decision-making helper for customers, due to the wide variety of goods and services offered by e-commerce companies. These systems provide online personalized recommendations using information technology and customers information. In the meantime, Collaborative Filtering (CF) recommender systems are one of the key components of successful e-commerce systems. Despite the popularity and successes of CF, these systems still face a series of serious limitations, including cold start, Sparsity of user-item matrix, scalability and change of user interest during the time that impede exact recommendations to customers. Although much research has been presented to overcome these limitations, but no comprehensive model is yet offered to reduce them. Therefore, the present research aims to eliminate the limitations of CF and to provide a comprehensive system by employing a set of data collection methods in order to present the best and most reliable recommendations to customers for product selection. The proposed system has been implemented in 5 stages including: 1. Customer segmentation based on LRFM variables in the level of product category to evaluate the Length of customer relationship with the company, Recency, Frequency, and Monetary of purchasing product categories 2. Extracting association rules based on user-category matrixes in the level of each cluster 3. Customer segmentation according to demographic variables 4. Change of user-item matrix and reduction of its dimensions 5. Developing a new similarity function by weighted combination of results of segmentation methods and CF. According to the gained results, the proposed system of this research has resulted in the removal of traditional CF constraints and presenting more accurate and appropriate recommendations for the preferences of customers.
Keywords: collaborative filtering; data mining; e-commerce; recommender system; temporal information.
E-Government Procurement Implementation in India: Evolving Decision Parameters for Project Success
by Prabir Panda, Ganesh P. Sahu, Babita Gupta
Abstract: Research indicates that up to 25% savings can accrue to the Indian Government by migrating to E-Government Procurement (E-GP). Thus improved utilization of public procurement (valued 3.4% to 5.7% of Indian GDP) would have significant impact on the overall efficiency in the government spending. However, E-GP projects, like any other e- Governance projects, have 70% chances of failure. This paper empirically studies stage-wise importance of eleven critical success factors (CSF) that were identified through extensive literature review in E-GP project outcome in the Indian context. We developed a research model for ascertaining the impact of identified CSFs on various stages of E-GP evolution building on the models of Layne and Lee (2001). Pinto and Slevin (1987), and Nasi (2005). Literature review, did not yield any study that focused on E-GP in India. Therefore, we conducted an exploratory study to understand the status of E-GP implementation in India and for fine-tuning the research model. A survey of the stakeholders involved with the E-GP system in India was conducted for testing eleven hypotheses related to eleven CSFs. We used regression analysis and mean score to empirically test the relationships identified between the CSFs and E-GP project success. The results show that five of the eleven CSFs are not important at stage 2 of E-GP project evolution, while all eleven CSFs contribute to the E-GP project success in Stages 3 and 4. This study is one of the few empirical studies conducted on the stage-wise analysis of CSFs in the E-GP domain and the first one to focus on E-GP projects in the Indian context. This study makes a significant contribution in the formulation of India specific CSF based parameters for managerial decision making for the E-GP project managers.
Keywords: Electronic Government Procurement; E-Procurement Implementation in India; Critical Success Factors; Public Procurement; Decision Parameters.
A study of relationship between Transformational leadership and task performance: The Role of social media and affective organizational commitment
by Ali Nawaz Khan, Ahsan Ali, Naseer Abbas Khan, Noor Jehan
Abstract: In today's society, social media have become an almost essential part of everyday life, particularly in the organizations where almost every employees and manager/leader use social media. Recently scholars have started to investigate leader's communication with their employees by using social media. However, leader's role in motivating their followers to use this innovation and increase performance is ignored by researchers. Using social capital theory as a base, the objectives of the present study is to examine the role of social media and affective organizational commitment between the relationship of transformational leadership (TFL) and employee's task performance (ETP). The proposed model was tested with the data collected from 254 employees from insurance companies situated in China. Model was tested by PLS-SEM with using SmartPLS 3. Findings of the study suggest that Transformational leadership has a direct positive relationship with task performance and affective organizational commitment as well as indirect positive relationship via social media on task performance. This study contributes to the existing literature in the field of Social media, leadership, commitment, and performance. Implications, limitation and future research have been discussed.e been discussed.
Keywords: Social Media; Transformational leadership; Affective commitment; Performance; Insurance Companies.
FORECASTING AGRICULTURAL COMMODITY PRICING USING NEURAL NETWORK BASED APPROACH
by Nikhila Varma, K. Padma
Abstract: Over the last decade, unprecedented spikes and drops in commodity prices have been a recurrent source of concern to both policymakers and the investors. This research paper focus on effective prediction of commodities prices which will be a key contribution to the investment world and policy makers to devise strategies. Neural Network and Multiple Regression models were built that would efficiently predict the price in advance for different forecasting ranges considering Kapas as the product. Historical prices along with various price influencing factors like inflation, rainfall, exchange rate and cottonseed oil cake price were given as input parameters to the feed forward multi-perceptron neural network and multiple regression models for forecasting prices. The results were compared using Mean Absolute Percentage Error(MAPE) as an accuracy measure. Artificial neural network models outperformed multiple linear regression model for medium term and long-term data. The results indicate that for long term predictions, neural network models have high predictive power.
Keywords: Commodities; Forecasting; Neural Networks; Multiple Regression.
A Systematic Review on Opinion Mining and Sentiment Analysis in Social Media
by Zaher Salah, Abdel-Rahman Al-Ghuwairi, Ahmad Aloqaily, Aladdin Baarah, Bar'a Qadoumi, Momen Alhayek, Bushra Alhijawi
Abstract: This paper introduced the employing of information retrieval techniques and statistical techniques in producing Systematic Literature Review (SLR). Sentiment Analysis (SA) and Opinion Mining (OM) in social media domain were considered as a case study to produce an example of SLR. The produced SLR introduced the field of sentiment analysis and opinion mining and surveyed current issues in user content based mining in social media field. The main aim of the research work described in this SLR was to investigate the use of sentiment analysis and opinion mining techniques for the analysis of social media. Social media has become one of the most important electronic phenomena in the present age; where everyone can access these networks such as Facebook, Twitter, Google+ and LinkedIn to broadcast their daily news or to express personal opinions or their sentiment orientations toward various subjects. As a result, a huge amount of data transmitted daily by users around the world and thus it may be impossible to deal with such a huge amount of data and analyse it manually. Therefore, researchers have conducted several research studies to discover new approaches, tools and techniques that can be used to analyse and explore such huge amount of data; more specifically data that are generated through social media websites. Systematic literature reviews retrieve and evaluate the multiple relevant research papers concerning specific research questions. In response to the lack of current systematic literature reviews concerning the Opinion Mining and Sentiment Analysis in Social Media, the authors present this comprehensive systematic review to introduce the field of sentiment analysis and opinion mining techniques applied to the data originated from social media and surveys the current issues and challenges for sentiment mining in the context of social media. The paper first detailed different approaches for conducting opinion mining and sentiment analysis and provided a common framework for searching and selection procedure applied to extracting the research papers that covering comprehensively the intended research directions in the field. It then discussed the most common techniques found in the literature for conducting opinion mining and sentiment analysis, which aims basically to determine whether an opinion expresses a positive or negative sentiment polarity in order to use this predicted polarity in further analysis or extensions. This systematic review investigated the opinion mining and sentiment analysis techniques that are found in more than 60 specialised research papers in the field of data mining with respect to social media in a systematic manner.
Keywords: Social Network Analysis; Opinion Mining; Sentiment Analysis; Data Mining Techniques; Information Retrieval.
A Structural Equation Model to Assess Behavioral Intention to Use Biometric Enabled e-Banking Services in India
by Ruchika Gupta, Siddharth Varma
Abstract: India has one of the largest and rapidly growing population of internet users in the world. Yet it seems that Indian banking industry has not been able to utilize this opportunity. This is reflected in a recent survey which showed that only a meager percentage of internet users does banking transactions online in the country. Security risks have been one of the prime reasons for such restrained usage. Biometric technology presents a viable solution to get over such security risks. The objective of this study is to assess the adoption of biometric enabled e-banking services in India. The paper primarily focuses on evaluating the customers behavioral intention to adopt such services. The Technology Acceptance Model has been used to determine customer intention to use biometric services. A sample of 200 respondents has been analyzed. In the first step, Confirmatory Factor Analysis (CFA) has been carried out and subsequently a Structural Equation Model has been developed using AMOS. Hypothesis testing has been done to develop the model. The study is based on a survey conducted in the National Capital Region of Delhi which includes Delhi and surrounding areas adjacent to Delhi. Perceived Ease of Use was found have a positive relationship with Perceived Usefulness which in turn was an important factor in determining Attitude towards the technology. Attitude was found to be a strong determinant for Behvioral Intention to use the technology. Demographic factors: age, income and prior use of Internet Banking were found to have no significant effect on the Attitude towards use of the technology. The implication of this result is that intention to use biometrics in banking services is unaffected by these three demographic factors which is positive news for use of biometrics. Moreover, Ease of Use has to be kept in mind while designing such systems.
Keywords: E-banking; Biometric; Customer intention; Demographic; SEM.
Use of Social Media by Professional Workers in the Basque Region of Northern Spain: A New Way of Networking
by Aitziber Nunez-zabaleta, Anjel Errasti
Abstract: Companies social media strategies have different objectives that are usually implemented by the marketing department and can therefore be said to pursue a communicational approach. Yet there are also many workers, both self-employed and employees, who use social networking sites for business purposes. This paper seeks to establish the use that these workers make of Web 2.0 tools in the professional field. We therefore conducted a survey among 283 workers from the Basque Country region in Spain to establish which specific Web 2.0 tools they are using and the possible statistical differences with certain variables related to the workers themselves and to the companies they work for. We also considered a series of studies that analysed the Social Media Strategy conducted both by companies and by their workers.
Keywords: Social Media; Professional relationship; Business Networking; Web 2.0 tools; B2B market; Self-employed; Big and Small Companies in the Web 2.0; Young and Old in SNS; Business Purpose; Contacts of professional interest.
Behavioural intentional to use computers among educators
by Loh Wai Ling, Wan Fatimah Wan Ahmad, Termit Kaur Ranjit Singh
Abstract: Abstract- This study hopes to provide an in-depth understanding on computers adoption and acceptance issues among educators in Malaysian schools. The Unified Theory of Acceptance and Use of Technology (UTAUT) model developed by Venkatesh et al. (2003) was utilized to identify the strength of predictors for educators behavioural intention to adopt, accept and utilize computers in the process of learning and teaching. Questionnaires were distributed to 40 secondary school educators in Perak Darul Ridzuan with 400 returned, and a 100% return rate. Statistical Package for the Social Sciences (SPSS) version 17 was utilized for data analysis. Structural Equation Modelling (SEM) was also used to appraise the measurement and structural model. Performance Expectancy (PE) (0.31, p < 0.05) and Effort Expectancy (EE) (0.41, p < 0.05) predicted significantly Behavioural Intention (BI) to use computers, while Social Influence (SI), Facilitating Conditions (FI) and the new construct Perceived Needs (PN) was statistically not significant. Studies in the future should include educators from other schools in other states in Malaysia for more and better reliable outcomes as well as conclusions.
Keywords: computer usage; educators; UTAUT model; predictors; SPSS and SEM.
BEFORE GAME OVER: A STUDY ON THE EXPERIENCES, PREDICTION AND VALUES OF CONSUMPTION OF PLAYERS OF SEVENTH-GENERATION VIDEOGAME CONSOLES
by Emilio Jose M. Arruda-Filho, Igor De Jesus Lobato Pompeu Gammarano
Abstract: This paper presents an exploratory qualitative analysis of the elements that influence the consumption behavior of users of seventh-generation videogame consoles. It aims to improve comprehension about consumers preferences and intentions related to brand devotion, technology convergence, hedonism versus utilitarianism, ease of use, innovation, social positioning and social interaction of videogame users in order to understand which factors are likely to motivate the adoption process of this type of technology. The categories were derived from theories of consumer behavior and marketing that deal with the use and adoption of technology products, focusing on consumers usage symbols and values. The study method used was netnography, with the data collected from blogs/discussion forums on the internet. For data analysis, thematic categories were used to describe types of users in relation to their consumption propensities on videogaming platforms such as the Xbox 360, PlayStation 3 and Nintendo Wii. The results show that factors related to consumer culture and behavior, such as social positioning (status), influence the preferences of users of seventh-generation videogames.
Keywords: Videogames; Consumer Behavior; Netnography; Technological Convergence; Consumption Culture.
Ontology based Feature-Level Sentiment Analysis in Portuguese Reviews
by Larissa Freitas, Renata Vieira
Abstract: Sentiment Analysis is the field of study that analyzes peoples opinions in texts. In the last decade, humans have come to share their opinions in social media on the Web (e.g., forum discussions and posts in social network sites). Opinions are important because whenever we need to take a decision, we want to know others points of view. Opinions may be looked at considering different levels. A general opinion expressed in a whole text or review, in a sentence, or even parts of the sentence, when one finds to figure out what are the particular features that are liked or disliked regarding a certain product, entity or event. In this work we study this more detailed level of analysis, which is called the aspect-level or feature-level. This more detailed type of analysis requires going deeper in the parts of a sentence and an effort to deal with their meaning, therefore knowledge rich approaches are specially useful. For that we use ontologies, as they can be used to represent the relevant aspects of entities, in a semantic organized way, for instance, aspects that are part-of or properties of an entity in a certain domain of knowledge. Our approach is built for Portuguese and is evaluated on a reviews data set of the accommodation sector.
Keywords: Sentiment Analysis; Feature Level; Ontology.
Relationship between Customer Loyalty and Service Failure, Service Recovery and Switching Costs in Online Retailing
by Aakash Kamble, Shubhangi Walvekar
Abstract: Service failures in e-tailing are inevitable, understanding how service failure and recovery efforts affect customer loyalty forms an important topic for discussion among researchers and practitioners. This study investigates the relationship of service failure severity, service recovery justice and perceived switching costs with customer loyalty. It also studies the moderation relationship between service recovery justice and perceived switching costs. Data collected from 306 respondents tested against the research model adopted from previous studies suggests that, service failure severity. Interactional justice, procedural justice and perceived switching costs have a significant relationship with customer loyalty, and that interactional justice can mitigate the negative relationship between service failure severity and customer loyalty.
Keywords: Customer loyalty; switching costs; service failure severity; e-tailing; service recovery; e-commerce; retailing.
Dynamic Changes of QoS Parameters in Cloud Computing Service Level Agreement
by Abdel-rahman Al-ghuwairi, Mohammad Khalaf, Zaher Salah, Ayoub Alsarhan
Abstract: Cloud computing is considered one of the most important topics in software engineering research trends. It provides many advantages and benefits for all users whether they are organizations or individuals, by compromising the needed resources and services. These resources and services could be classified into three categories: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Service Level Agreement (SLA) is a contract between cloud user and cloud provider in cloud computing environment. This contract is needed to manage, control, and monitor these services. Also, SLA is considered an essential document or factor to manage the relationship between the cloud user and cloud provider in cloud computing. SLA can be defined as a contractual agreement signed between cloud user and cloud provider in order to manage the level of access for the resources and quality of services provided. Continuous changes of technologies and requirements make updating SLA an urgent priority for both cloud user and cloud provider to ensure that the services provided are meeting their needs among multiple Quality of Service (QoS) parameters. Coping with multiple and frequent changes in QoS parameters is considered the main reason behind the intensive studies that have been presented for building a dynamic SLA. The current dynamic SLA monitoring approaches have considered the cloud provider view only; on the other hand the cloud user side view has been ignored. To solve the user concerns in dynamic SLA monitoring system, this paper proposed a dynamic SLA monitoring approach in IaaS system by generating new SLA terms based on analyzing the SLA penalties. This research paper applied a new proposed tradeoff mechanism between monthly cost and QoS guarantee values. This research paper proposed a dynamic model for updating QoS parameters of SLA in cloud computing environment. Java language was used with a QoS measurement dataset to experiment the proposed approach. Moreover; the selected database is used to compare the Static SLA (SSLA) approach with the proposed Dynamic SLA (DSLA) approach. The results of this experimental study show that the number of SLA violations in DSLA approach are less than the number of SLA violations in SSLA approach.
Keywords: Cloud Computing; Quality of Service; QoS; Service Level Agreement; SLA; Static Service Level Agreement; SSLA; Dynamic Service Level Agreement; DSLA.
Prioritizing Mobile Learning Application Requirements
by Asharul Khan, Zuhoor Al Khanjari, Mohamed Sarrab
Abstract: Mobile technology has become an integral part of human life. Nowadays people have started using mobile devices and communication network in different domains in the form of mobile education, mobile commerce, mobile health, and mobile tourism. The mobile application development research, especially Mobile Learning (M-Learning) is still in infancy. M-Learning application development is affected due to changing users requirements and technology. M-Learning stakeholders face difficulty in reaching consensus on the available requirements implementation priority during design and development of M-Learning application.
The solution to this problem lies in requirements prioritization. The review of existing literature has revealed a number of prioritization techniques. However, the common challenges to all these techniques are that they are too complex, time-consuming, and difficult to use by the novice users in M-Learning domain. There is insufficient research to draw firm conclusion on suitable method for requirements prioritization in M-Learning application development.
Therefore, this paper presents a requirement prioritization scenario for M-Learning application development. The requirements prioritization scenario has four steps. The first step is the identification of stakeholders. In the second step, the stakeholders are asked which requirements would be implemented in the First F or Next N cycle of application development. The next step is the analysis of the stakeholders prioritized requirements by analyst based on the requirements prioritization scenario rules. The last step involves the final decision by the analyst for any changes in the already prioritized requirements due to time, costs or any other constraints which are beyond the understanding of stakeholders. The process is repeated iteratively. The requirements prioritization scenario is implemented in a case study to understand the feasibility in the actual use.
Keywords: Prioritization; Requirements Prioritization; Requirements Prioritization Scenario; Mobile Learning; Mobile Learning Application; M-Learning Requirements; M-Learning Requirement Prioritization Scenario; Mobile Application Requirements Prioritization Scenario.
Multi-Strategy based E-Negotiation using Web Services
by Sheetal Vij, Avinash Agrawal, Debajyoti Mukhopadhyay
Abstract: Negotiation is an iterative process where opponent and proponent exchange offers and counter offers with each other, with each iteration opponent can be modeled in more efficient way and an appropriate strategy can be selected for a particular opponent, i.e. by treating strategy as a dynamic component. This research focuses on web-service based automated negotiation with decision-making capability about the strategy selection. Every strategy has certain applicability which needs to be established through experimentation and analysis.
Keywords: E-negotiation; Multi-Strategy; E-commerce; web-service.
Barriers to Crowdsource Software Development: Evaluating the intertwined effects
by Nitasha Hasteer, Abhay Bansal, B.K. Murthy
Abstract: The techniques to develop software have grown with time owing to the latest technological advancements. Cloud computing has changed the application development landscape. With the advent of this distributed computing, collaborative development by way of crowdsourcing the development of software artifacts, is gaining popularity. Using a cloud to outsource software development to a crowd of developers is an emerging form of software development. Developing software through crowdsourcing enables accommodating to the changes in the rapidly growing software industry in a convenient way. While on one hand crowdsourcing has merits of providing diverse innovative solutions with no investment in the manpower. On the other hand a creative intelligent task like developing software through crowdsourcing is constraint by the barriers to successful implementation. In this work we identify through literature and report the barriers to crowdsource cloud application development that hinders the maximum advantage that could be drawn out from the service oriented paradigm. We use the Decision Making Trial and Evaluation Laboratory technique to analyze and determine the direct and indirect intertwined effects amongst the identified barriers. From the results, we infer that granular nature of changing technology, lack of trust on crowdsourced platforms, lack of understanding on intellectual property issues and security apprehensions are classified as the root causes that affects coordination and collaboration amongst the contestants of the crowdsourced platform, among other barriers.
Keywords: Cloud Computing; Application Development; Decision Making Trial and Evaluation Laboratory; Cause and Effect Relationship; Crowdsourcing.
Implementation of the COD Payment Method on E-commerce Websites in the Arab Region
by Mohanad Halaweh
Abstract: The cash on delivery (COD) payment method has been increasingly used in recent years as a method of payment in e-commerce transactions. However, research within the e-commerce field to determine how widely this payment method has been adopted is limited, especially from the e-commerce websites perspective, at the global level, and specifically in Arab countries. Therefore, the aim of this paper was to study the current use of COD in the Arab region by evaluating e-commerce websites that accept this payment method. Twelve popular e-commerce websites were selected for this study and evaluated based on three criteria: acceptance of this payment option, visibility of this payment option on the website, and the clarity of related terms and conditions, including charges, international delivery, and others. The research findings showed that all surveyed e-commerce websites have adopted the COD payment method in addition to other e-payment options. The findings also revealed that there is no consistency in the sign/icon/image used to indicate acceptance of this payment method or where it is located on the website. Results also revealed that there is lack of clarity in policies pertaining to this payment method. The interpretation of the research findings and implications for e-commerce theory and practice as well as future research are discussed.
Keywords: E-commerce; Online Payment Methods; E-payment; Adoption; Cash on Delivery; Acceptance; Arab Region; COD.
Test Coverage and Impact Analysis for Detecting Refactoring Faults: A study on the Inline method
by Iyad Alazzam, Marwa Al-amri
Abstract: Using refactoring techniques is known as a good practice to enhance the software quality either by decreasing the complexity or enhance the behavior of the software. Here, we conduct a study using Inline Method refactoring technique to investigate the significance of this technique, in order to examine how this kind of refactoring affect the coverage of the test suite by applying impact analysis of test coverage. We apply Inline Method refactoring on one package of JGAP; open source java project and make some experiments. The results show the Inline Method refactoring has essential benefit in decreasing complexity. On the other hand the results reveal that this refactoring technique has a negative impact on coverage from testing perspective.
Keywords: Test Coverage; Refactoring; Inline;.
Determinants for Adoption of Cloud in Government Sector in India: A Review
by Kshitij Kushagra, Sanjay Dhingra
Abstract: Across the globe, organizations are moving towards Cloud computing due to its wide array of advantages. The amplification in Cloud adoption in near future is very predictable as it is cheaper, better and faster than traditional IT services. This review work primarily focuses on the determinants of the adoption of cloud computing in India and particularly in the government sector. Government sector requires academic research because they are complex institutions, largest employers in the country and one of the biggest spenders on technology, but have not been positioned at the cloud computing dimension so far.Indias adoption has not been accelerated at the pace which other nations across the globe have achieved. This study tries to find the gaps and bottlenecks for the adoption of cloud computing and will form the bedrock for the future research in the information technology field.
Keywords: cloud service provider; infrastructure as a service; platform as a service; software as a service;.
Measuring Internet Addiction In Europe Based Knowledge Societies: A Case Study Of France
by Habib Ullah Khan, HELMI HAMMAMI
Abstract: The technological evolution has put a new challenge, internet addiction along with the internet technology before the world. The much evolved internet addiction literature could not find a common solution to assess the nitty-gritties of it. That is, though many scales are developed to test the cause and effect of internet addiction, their subjective nature probed for the present study. The study intended to collect the data pertaining to internet usage among the residents of France with the help of modified internet addiction test tool, which is originally developed by Widyanto et al. (2011). For the original tool which has three constructs: Emotional Management, Time Management and Mood Management, an additional factor Culture is added. Because of the study limitations, data is collected from 122 respondents only. After validation, the data is analyzed using the statistical techniques in three stages - chi-square test, binary logistic regression and principal component analysis. The results are tested for 5% level of significance using latest statistical packages. The outputs of the analysis provided interesting insights. It is proved from the analysis that age has more bearing on the level of internet addiction. Yet, subtle factors are playing a role in providing a vague picture about the influence of constructs on internet usage and addiction. During first stage of analysis, the effect of emotional management is not present, during second stage effect of time management is not evident and in third stage of analysis, except the effect of emotional management index no other effect of constructs is found on the internet usage pattern. These differences could be because of the smaller size of the sample which is not a good representative of the various groups of people in France. So, studies planned by ruling out these issues can result in accurate data with minimal variation and hence better results about internet usage as well as internet addiction.
Keywords: Internet Addiction Test (IAT); Internet Addiction (IA); Internet Gaming Disorder (IGD); Online Cognitive Scale; Pathological Internet Use Scale (PIUS); Generalized Problematic Internet Use Scale; Emotional/Psychological Conflict Time management; Mood Management; Culture.
Mobile banking acceptance by the customers in Iranian banks
by Seyed Hossein Siadat, Lotfollah Najjar, Navid Nezafati
Abstract: In this research mobile banking acceptance is studied among Iranian banks from the consumers point of view. To investigate attitude towards use of mobile banking, attitude variables are studied including ease of use, effectiveness, cost, risk, and credit, and trust, compatibility with style, demographic characteristics, social influences, self-efficacy and satisfaction. Therefore, this study builds a comprehensive conceptual model consisting of both attitude and demographic factors. We collected 385 samples from five cities of Iran: Tehran, Mashhad, Bandar-Abbas, Babol and Khorram-Aabad, in the form of electronic and printed questionnaires. The research confirmed all primary assumptions with respect to attitude variables. According to the results, the proposed variables can effectively clarify the acceptance of mobile banking among Iranian customers. Regarding demographic characteristics, effect of gender on mobile banking acceptance is proven, but the effects of age, education and monthly income on mobile banking acceptance are not proven. Compatibility with life style and satisfaction were found to have the highest coefficient correlation among other variables.
Keywords: mobile banking; adoption; mobile banking acceptance; attitude; demographic characteristics.
Developers Views on the Adoption and Benefits of Software Process Improvement Programs in Canadian Software Development Firms
by Delroy Chevers, Gerald Grant
Abstract: For decades software developers have struggled in their attempts to deliver high quality software products. Against this background, Software Process Improvement (SPI) programs are viewed as one of the solutions to overcome the problem of delivering low quality software products. This study utilized a two-phase approach to ascertain the state of SPI adoption and the determinants of information systems (IS) quality and success in Canadian software development firms. The study found a moderate adoption rate of SPI programs and it was felt that user training and technical support could positively impact the success of information systems projects. Based on these arguments a proposed research model was presented with the hope of it being validated in future studies.
Keywords: Adoption; process maturity; software process improvement; software development.
The Online Educational Model and Drivers for Online Learning
by Efosa Idemudia, Ogechi Adeola, Nubi Achebo
Abstract: The rapid and constant growth of technology, hardware, and software have greatly influenced and improved online education. Universities all over the world are investing huge sums of money in online courses and degree programs. Some universities are offering these programs at all levels of study from baccaulaureate to doctoral. Given the increasing importance of online learning, stakeholders interests must be considered in designing effective learning environments to improve the acceptance of these programs, to lower their drop-out rates, and to motivate students to complete their studies. To our knowledge, there are no studies that have directly applied the stakeholder theory to online education. To address this issue and contribute to the literature, we developed an online educational model that provides insights and understanding on how to improve and develop online education. The theoretical background for our online educational model is the stakeholder theory. The theoretical and practical implications of our research are discussed.
Keywords: 24/7 Access; motivation; self-regulation; robust technology; perceived usefulness; perceived familiarity; perceived ease of use.
Business health characterization of listed Indian companies using data mining techniques
by Senthil Arasu Balasubramanian, Radhakrishna G S, Sridevi P, Thamaraiselvan Natarajan
Abstract: The purpose of our study was to predict the business health of listed Indian companies using data mining tools and algorithms called ANN-MLP and DT-QUEST and identify financial ratios that significantly affect the companys performance. We used 2000 listed Indian companies with 12000 firm-year records (cases) from 2011 to 2016 to predict the financial performances of the companies and classify them as successful or unsuccessful, based on 17 financial ratios. The final sample of data was divided into training and test set (50:50, 60:40, 70:30 and 80:20).The test results confirmed accuracy between 84 and 86 percent for the MLP technique and between 92 and 93 percent for the QUEST technique. Sensitivity analysis results showed that return on long-term fund, net profit margin, and operating margin are three critical variables that affect business health.
Keywords: Business health; Multilayer perceptron; Sensitivity analysis; decision tree; financial ratios.
A Rationale for the Choice of Enterprise Architecture Method and Software Technology in a Software Driven Enterprise
by Venkatesan Devanathan, Sridhar Sundaramoorthy
Abstract: Enterprise architecture frameworks (EAFs) provide tools and methods to categorize, document and depict interrelationship between enterprise business processes, stakeholders and information classes. It explicitly documents information generation, processing and consumption pattern facilitating communication and management. But there is a confusing variety of EAFs for organizations to choose from. There is no explicit guidance or justifiable rationale available to choose an EAF over others. This paper provides a rationale and attributes based evaluation of popular EAFs and conclude superiority of Zachman Framework (ZF) for an software-driven enterprise (SDE). Further this paper surveys salient aspects of different software technologies and provide an assessment framework to compare them and conclude suitability of agent technology for realizing information system infrastructure of an SDE. This work makes a provocative argument that many of the modern EAFs are not suited for an SDE due to their affiliation to software technologies that are found to has several limitations.
Keywords: Enterprise Architecture; EA; Enterprise Architecture Framework; EAF; Business Model Alignment; BAM; Enterprise Software; Software Architecture; Model Driven Development; MDD; System Modeling; Information Systems Design; Agent Technology; Software driven enterprise; SDE.
Hierarchically distributed Peer-to-Peer architecture for load balancing and effective dynamic group scheduling in Grid computing
by S. Gomathi Mathi, D. Manimegalai Megalai
Abstract: The Local or remote grid computing resources have been normally assigned the task of executing user jobs in a distributed environment. An important factor affecting Grid processing is the network bandwidth that differs from network to network. In order to overcome this problem, a few typical algorithms are suggested keeping in view of computing grid resources based on load balancing across the grid system. These algorithms help in improving the performance to some extent, yet none of them has been found experimentally suitable to overcome the major short falls experienced in the grid computing system. We propose a Hierarchically Distributed Peer-to-Peer (HDP2P) architecture to overcome all major problems encountered due to virtuality and heterogeneity. Results suggested that Hierarchically Distributed Peer-to-Peer (HDP2P) architecture was of great use in balancing the load and allocating to the resources to the groups of jobs keeping MIPS accountability using Grouping Based Dynamic Job Scheduling algorithm (GBDJS). Our proposed algorithm is compared with First Come First Served Job Scheduling algorithm (FCFS) and Ant Colony Optimization Job Scheduling algorithm(ACO).There is a considerable improvement achieved in performance by using this novel architecture
Keywords: Grid System; Load Balancing; Job Scheduling; Performance Evaluation ;HDP2P; GBDJS.
Leveraging Business Competitiveness by Adopting Cloud Computing in Indonesian Creative Industries
by Yudi Fernando, Syarif Achmad, Anderes Gui
Abstract: The purpose of this study is to identify determinants of the cloud computing adoption in creative industries in Indonesia, and the impact of that adoption on business competitiveness. A theoretical model was developed based on the two complementary models, the Technology Adoption Model (TAM) and Technology-Organization-Environment (TOE). An e-survey was conducted among firms that had adopted cloud-computing technology in Indonesia creative industries. This study provides sufficient statistical evidence to infer that perceived usefulness, compatibility, security and privacy, management support and competitive pressure were related to the adoption of cloud computing. Cloud vendors must consider incorporating networks that offer more user friendly and affordable solutions to the market. One factor related user friendliness is that the network must be convenient to use without any issues related to performance. Solutions tied to the cloud should be cost effective for small and medium-sized businesses.
Keywords: cloud computing; IT adoption; technology; creative industries; competitiveness; Indonesia.
Mitigating the Risks in Managing Cloud Based IT Controls
by Shafaq Naheed Khan
Abstract: Cloud computing (CC) represents a key tool in the race for innovation across industries. However, organisations are facing constraints in implementing and leveraging cloud technology for development purposes due to a lack of skills, knowledge and talent. To address this concern, this study focuses on the impact of CC on IT staffs roles and responsibilities, within cloud user organisations. Accordingly, this study suggests skills required to mitigate the risks in the accountability and responsibility of managing IT controls. The results were empirically verified by senior IT practitioners. The empirical intervention emphasised on peoples business skills, in addition to domain knowledge and the mind-set to adapt to the changed environment. The findings of this study offers new insights for scholars and it will help IT decision makers to assess their staffs capabilities to meet their business needs and to plan appropriate selection, training and hiring policies.
Keywords: Cloud computing; competencies; skills; resource management; roles; responsibilities; accountability; people; management; IT controls.
The Opinion of Post Graduate Students on Effect of Interrelationship among the Perceptual Components with Reference to Online Shopping
by R.RAJENDRA KUMAR
Abstract: This study contemplates to identify the effect of interrelationship between the components behavioural intention through the statistical techniques such as Factor Analysis and Structural Equations Modeling. Approximately 752 students aged between 18 and 25 from Arts as well as Engineering colleges were selected through Multistage sampling method. Findings revealed that while the Perceived Ease of Use has a significant positive impact on Perceived Enjoyment, the component, Perceived Enjoyment also has a denoting positive impact on purchase intention of online shopping consumers. Unexpectedly, the component Perceived Risk (PR) has an insignificant effect on Perceived Enjoyment (PE) and Perceived Ease of use (PEoU) also has a negligible effect on the Perceived Risk. This research is first of its kind especially in Indian Context and threw new aurora on the perception of online consumers.
Keywords: Perception; Preference; Perceived Risk; Perceived Enjoyment; Perceived Ease of use; Behavioural intention.
Exploring e-Service Quality and its Relation with Customer Satisfaction in the Banking Sector: An Indian Experience
by VIVEK AGRAWAL, Nitin Seth, Dinesh Seth, Vikas Tripathi
Abstract: The purpose of this study is to explore the dimensions of e-Service Quality (e-SQ) in the context of the Indian banking sector and establish its relationship with customer satisfaction. Using a structured questionnaire, data was collected from 323 banks customers. Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA) were used to evolve a validated factor structure for measuring e-SQ in the Indian banking sector. Multiple regression analysis was used to assess the relations between e-SQ and customer satisfaction.
The study identified a nine factor structure to measure e-SQ. The study also identified a positive relationship between e-SQ and customer satisfaction. The findings of this study can be used as a basis to provide the guidelines for improvement and training in e-SQ and would prove to be very useful to professionals. The findings have scalability from a single branch of the bank to the bank as a whole. This study is the first attempt to assess e-SQ dimensions in the Indian banking context using primary data.
Keywords: e-service quality; customer satisfaction; exploratory factor analysis; confirmatory factor analysis; multiple regression; banks.
Knowledge management adoption to financial institutions using Fuzzy AHP and fuzzy TOPSIS techniques
by Saba Alsadat Hosseini Sani, Mostafa Vaezi Monfard, Elahe Sarfi
Abstract: The aim of this study is to identify and prioritise the knowledge management (KM) adoption in financial institutions. Results show that Melal Financial and credit institute, Kosar financial and credit institute and Noor financial and credit institute are on the first, second and last priority, respectively. The results obtained from fuzzy AHP methods indicate that human resources are on the first priority and organisational management, technological factors and cultural factors are on the next priority. Then regarding to the organisational management scales, it is realised that, proper organisational structure to create and share knowledge is most important. Regarding to the technological factors index, it is realised that, technological infrastructure to adopt KM is most important. Regarding to cultural factors index it is realised that, willingness and sharing spirit among members is most important. Regarding to the human resources index, it is realised that, time to share knowledge is most important.
Keywords: knowledge; knowledge management; fuzzy analytic hierarchy process; AHP; fuzzy TOPSIS.
Supporting BPMN Tool Developers Through Meta-algorithms
by Carlos Habekost, Lucinéia Thom, Erika Cota, Marcelo Fantinato
Abstract: Business Process Model and Notation (BPMN) provides an extensive set of notational elements, such as activities, events and gateways, which enable the representation of a wide variety of business processes. The purpose of this paper is to propose an approach to develop logical models (referred here as "meta-algorithms"), whose goal is to express the content described in the textual rules, for each BPMN element, considering the BPMN 2.0.2 specification. We identified that there is completeness and correctness in this approach, applying decision tables and control-flow graphs to checking the proposed meta-algorithms. Beside this, the authors applied two surveys, considering a potential audience for the proposed meta-algorithms in order to check users' acceptance. For validation results, we identified that only textual rules is not enough to implement the notational elements for 84% of the survey participants.
Keywords: BPMN; tool development; notational elements; meta-algorithms.
Information Technology Investments versus the Illusion of Control Bias
by Rodrigo Malaquias, Alberto Albertin
Abstract: The literature indicates that the characteristics of managers, including behavioral biases, affect corporate investment/financing decisions. In this paper, we analyze a specific bias that, up to the best of our knowledge, has not been addressed in the context of Information Technology (IT) investments, which is the illusion of control bias. We develop the argument that managers illusion of control negatively affects the investments in IT made by firms they manage. Through a case study, the results of this paper indicate that behavioral biases of small firms managers are related with an illusion of control, which can affect decisions on IT investments. These results have important implications for owners/managers of small firms, especially for those firms from emerging economies.
Keywords: Latin America; Development; Technology Acceptance; Small Business; Brazil; Decision-Making on IT; Organizational Performance; Corporate Decisions; Competitive Advantage; Emerging Markets.
Estimating Risk in Capital Asset Pricing for Interval-Valued Data
by Dailys Reyes, Renata Souza, Francisco Cysneiros
Abstract: The models of valuation of capital assets has been widely used in
the capital market by portfolio managers using only the values of daily closing
prices; there are several reasons to suggest that the daily high and low values of
the prices are also met. Therefore, this article proposes and analyzes an approach
to estimate the systematic risk in capital asset pricing with interval-valued data,
using as variables the high and low prices contained in the financial databases to
explain the asset returns. The approach takes into account the information within
the daily intervals of high and lowasset prices instead the most popular opening or
closing prices for estimate the regression equation of the model, for calculations
involving these intervals, the basic operations on interval arithmetic were used.
Also, we propose an interpretation for the estimated interval beta-parameter. The
approximation capabilities of the proposed model are illustrated by means of its
application the daily high and low prices on Microsoft and the S&P500 index
from 01 November 2013 to 15 January 2015. Using the proposed model with
interval-valued data improves financial valuation of capital assets as compared to
that using the standard econometric parameters.
Keywords: CAPM; Interval-valued data; Symbolic data analysis; Regression.
A Conceptual Model of Institutional Information Culture and Interpersonal Conflict Which Influence the Information System Success: Users Perception
by Mohammed Aboaoga, Mohd Juzaiddin Ab Aziz, Ibrahim Mohamed
Abstract: Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to institutional information culture and interpersonal conflict which may affect information system success. Therefore, this study proposes a conceptual model for influencing information culture and interpersonal conflict factors on Information Systems Success (ISS). The proposed Model consists of three independent dimensions (a) technological, institutional information culture, and interpersonal conflict) and a dependent dimension (information system success). A number of hypotheses are formulated for measuring relations among the investigated factors. To test our hypotheses, a quantitative method is adapted in data collection and analysis. For collecting data, a structured questionnaire was distributed to a sample of experts from the Ministry of Finance (MOF), Yemen. The target users are always associated with IS in their work (in the MOF). Empirically, the results of this study indicate that there is a highly positive correlation between the independent factors and the dependent factors.
Keywords: Information System Success; Perceived Need; Interdependence; Interference; Disagreement; Instability.
DOES INFORMATION SYSTEM TECHNOLOGY SUCCEED IN HELPING MANAGE DEBT?
by D. Sukma Permana, Sutaryo Sutaryo
Abstract: Using DeLone & McLean IS success model, researcher investigate what factors influence the success of Debt Management and Financial Analysis System (DMFAS) that used by Indonesia to manage around USD 56,8 billion of government debt. Eighty-four responses from 100 DMFAS users were used as data and multiple regression analysis was applied to evaluate the model. Besides the link from system quality to intention to use and user satisfaction to intention to use, all of hypothesized relationships between six variables are significantly or marginally supported. Moreover, based on indirect and total effect of causal path, among three antecedents of quality, system quality has strongest influence to net benefit. The findings of this study can be used to assess the success of DMFAS used in other country from users perspective.
Keywords: DMFAS; Debt Management; IS success model; Mandatory System; G2G System.
Portfolio of IT Investment and Organisational Performance. Moderating role of Decentralised Decision Making
by Amri Mohamad, Yuserrie Zainuddin, Nafis Alam, Pingli Li
Abstract: This research was carried out mainly to find out the results on the relationship between Transactional, Strategic and Informational IT investment with the multidimensional performance measurement in the electrical and electronic manufacturing setting in Malaysia. The second objective for this research was to study on the moderating effects of Decentralized Decision Making on the relationship between Transactional & Strategic IT investment with firm performance. Data was collected from 74 electrical and electronic manufacturing firms in Malaysia. The results suggest that transactional IT investment did not has a positive and significant relationship with financial and customer perspective. Strategic IT investment has no significant relationship with any of the perspectives. Informational IT has a significant relationship with financial and Internal Business Process perspective only. Decentralized decision making though theoretically explained as a moderator, but statistical interaction effects suggested otherwise.
Keywords: Keywords: multidimensional performance measurement; transactional IT investment; strategic IT investment; informational IT Investment; decentralized decision making; moderating effects; productivity paradox.
The Effect of Organizational Culture on Creativity and Innovation Processes (Case Study: Tondar Department of IKCO)
by Mohammad Zeraatkar, Maryam Roudneshin, Mohammad Ali Sobhanallahi
Abstract: The automotive industry is experiencing a fast growth where new products are rapidly developed in different countries. Against this background, it is highly essential to enhance creativity and innovation to reduce costs and make more competitive products than the imported items. Note that the current strategic management system of the Tondar Department, which is developed by a balanced scorecard approach based on defined visions, missions and values, emphasizes a revision of internal processes and development of creativity and innovation processes. At the same time, literature shows that a suitable cultural context is required to enhance both creativity and innovation. Organizational culture, however, plays an important role in both factors. This study was intended to accurately examine effects of the four dimensions of the Denison organizational culture model on creativity. Accordingly, the Denison Organizational Culture Model and Randsips Creativity Questionnaire were used. The statistical population included all employees of the Tondar Department of IKCO (N = 2600), where the sample size was 383 consisted of employees from Engineering, QA, Logistics and Production Departments. Study results showed that there were direct, positive significant relationships between creativity and the dimensions of the Denison organizational culture model (i.e. involvement, adaptability, mission and consistency). The organizational culture dimensions individually had a significant relationship with creativity.
Keywords: Creativity; Organizational Culture; automotive industry.
Contributions from Organisational Collaboration to Business Intelligence Solutions Success
by José Manuel Villamarín-Garcia
Abstract: Researches on Business Intelligence (BI) show that there is still a high failure, sub-utilization, and abandonment rates to its implementation. Factors related to Organizational Collaboration (OC) could contribute to the success of this kind of solutions.
According to the multi-methodology proposed by Mingers (2006), the research was carried out in four stages: appreciation, analysis, assessment, and action. This way, a systematic literature review, a survey application to people who have participated in BI research and/or implementation projects, an exploratory factorial analysis, a composite additive indexes analysis and; finally, a Pearsons correlation analysis was developed. It resulted in fourteen factors grouped in five dimensions showing that both intra and inter-organizational factors, contribute to the success of BI solutions from a managerial-organizational perspective.
Keywords: Business intelligence; collaboration; BI; organizational collaboration; inter-organizational collaboration; intra-organizational collaboration.
How do YouTubers make money? A lesson learned from the most subscribed YouTuber channels
by Bo Han
Abstract: How to make money is getting an increasing interest from YouTubers. This study develops a new model to investigate how factors such as the number of views of a YouTubers videos, the number of subscriptions to a YouTubers channel, the after-view comment rate and the after-view attitude expression rate of a YouTubers video, and the age of a YouTubers channel can influence the YouTubers yearly revenues. Data of 57 most subscribed YouTuber channels were collected. The data analysis shows that the number of views, the after-view comment rate, and the after-view attitude expression rate all have significant positive effects on a YouTubers yearly revenues; however, the number of subscriptions to a YouTubers channel does not have a significant effect on his/her yearly revenues. In addition, a YouTubers yearly revenues decrease when his/her channel gets older. This study does not only contribute a new YouTube monetization model to the video sharing research community, but also provides several practical implications to entrepreneurial YouTubers.
Keywords: YouTube; YouTuber; monetization; video sharing; social media; business value.
Development and comparative performance evaluation of neural network classification techniques for manufacturing sector firms on the basis of new product growth rate
by Vikas Bhatnagar, Ritanjali Majhi
Abstract: Continuous changes and improvements in new product development and its process have
brought competition to its peak among the manufacturing sector firms. Incessant improvement
considers as the only option for sustainable development and growth. New products have been
launched by firms at regular interval of time to stay updated with present market trends and
followings. Recognizing current status of the firm with respect to its competitors is of utmost importance for better strategy formulation and decision making. In this study electronics, garment and metal & machinery industries are chosen for an in-depth analysis because of enormous growth shown by them in past few years. Firms are categorized into three classes termed as innovative, mediocre and traditional on the basis of their new product growth rate (NPGR). Adaptive exponential functional linked artificial neural network (AEFLANN) along with other neural network models and conventional methods of classification has been employed. An extension of AEFLANN model using derivative based (RLS) and derivative free (PSO) algorithm has been proposed. Comparative performance analysis for neural network and conventional classification algorithms has been made. Neural network classification models outperform other employed models in terms of classification accuracy.
Keywords: New product growth rate (NPGR); Discriminant analysis; Support Vector Machine (SVM); K-Nearest Neighbor (K-NN); Multilayer Perceptron (MLP); Adaptive Exponential Functional Linked Artificial Neural Network (AEFLANN); Particle Swarm Optimization (PSO).
Survival study on privacy preservation based security techniques for load balancing in cloud computing
by Jawahar Muthusamy, Sabari A
Abstract: In the field of information technology, cloud computing is an emerging technology. In cloud computing environment, cloud computing provides cloud services such as store and access the data to the user with many features. Cloud computing employed with a network of remote server hosted on the cloud to perform services on cloud data than the local server (Shen et al., 2017). Cloud act as a service provider or data center to cloud user by ensuring many resources such as Software (SaaS Software as a Service), Infrastructure (IaaS Infrastructure as a Service) and Platform (PaaS Platform as a Service) among the internet. Based on the guidelines specified by cloud service provider, the cloud user utilizes these resources. Data security is the significant task (Jiang et al., 2015) to provide privacy by assuring that the data stored on the cloud is protected from unauthorized access. Privacy preservation plays an essential role in providing of security (Gholami and Laure, 2015) to the data access on a cloud environment. The privacy preserving ensures whether the data is protected from unauthorized users. The secured cloud storage is a service to securely preserve, maintain, control and backup the data on the cloud. In addition, the balancing of load carry outs in cloud server to avoids the unauthorized access (Zhou et al., 2016). In cloud computing, security issues are obtained with third-party controls and assurance in outsourcing agreements. However, while storing data on the cloud, privacy and load balancing are the main concern to address the security issues on a cloud server. Therefore, our research work is focused on providing cloud security with load balancing in a cloud server.
Keywords: Cloud data storage; Data security; Privacy preservation; Load balancing.
Investigating employees perception of the security of medical data: an empirical analysis from India
by Vandna Sharma, Nirmalya Chakraborthy, Jayanthi Ranjan
Abstract: A large number of organizations are now considering medical data of employees as critical organizational information. Hence, these organizations are mandating their employees to submit medical checkups and health reports. This information is generally stored in electronic format within the organization. The current study aims at analyzing the perception of employees regarding issues surrounding the security of medical data in Indian organizations. A closed-ended questionnaire has been deployed to collect the responses. The respondents include employees of companies operating in the Healthcare, Telecom, and Information Technology industries in India. The questionnaire was circulated in the physical and electronic mode. Convenience sampling has been deployed in order to select the respondents. The final sample includes responses from 372 respondents. Exploratory Factor Analysis has been utilized to obtain the factors considered relevant for analyzing perceptions towards medical data security. Confirmatory Factor Analysis (CFA) has been deployed to test whether the various measures of different constructs are in accordance with their theoretical understanding. The interpretation and managerial implications have also been discussed.
Keywords: Information security; Medical Database; Confirmatory Factor Analysis; India.
Sustainability through information systems: How can information systems lead to sustainable business models?
by Wail El Hilali, Abdellah El Manouar
Abstract: Sustainability is the quest of almost every company nowadays. The rise of awareness, the willingness to reinforce the brand image and to cut costs are the main drivers that push companies to invest in this field. Finding a way to reduce environmental impact and to boost social prints without impacting revenues is the ultimate goal to reach. Many researches were done in order to find the secret sauce to achieve sustainability including the adaptation of the business models. We propose to review in this article the most important ways adopted in order to reach this equilibrium. We focus after on business models and suggest a new way of thinking by using the power of information systems to reach sustainability. We introduce later the DEMATEL method to highlight the dynamics and the mutual impacts created by the business models elements while trying to find the equilibrium between the economy, the society and the environment. We apply this approach on the case of a telecom operator in Morocco.
Keywords: Sustainability;Business models; Sustainability through information systems; Sustainable business models; Green IT; DEMATEL.
INVESTIGATION ON OPTIMIZATION, PRIORITIZING AND WEIGHT ALLOCATION TECHNIQUES FOR LOAD BALANCING AND CONTROLLING MULTIMEDIA TRAFFIC IN WIRELESS MESH NETWORK
by Raja G P, Mangai S
Abstract: Wireless Mesh Network (WMN) is a type of Wireless ad hoc network where radio nodes are wirelessly connected within sizable geographic area through mesh topology. The best path is identified by routing metrics to ensure efficient data transmission from source node to destination node. The performance of routing is concern with set of routing constraints such as bandwidth, network delay, energy consumption, load balancing and communication cost. The routing constraints are needed to be resolved to improve the WMN performance. In WSN, network load balancing plays a significant role to achieve effective routing without traffic. The energy consumption is an additional factor to provide high-quality data delivery at the destination end. Our research work is concentrated on developing the energy efficient and load balanced routing in WMN.
Keywords: Mesh; Interference; Load-balancing; Routing; Energy Consumption; Wireless Mesh Networks.
The Impact of ERP Systems Adoption on Management Accounting Practices in the Jordanian Manufacturing Companies
by Zaidoon Alhatabat
Abstract: The Enterprise Resource Planning (ERP) system is a complex and comprehensive software that integrates numerous companies functions and resources. ERP systems have become vital strategic tools in todays competitive and dynamic business environment. The aims of this study are to explore: the impact of ERP implementation on Management Accounting Practices (MAPs), and main attributes that influence the ERP implementation in Jordanian manufacturing companies. A questionnaire survey was distributed to 66 Jordanian manufacturing companies and 52 questionnaires were received, which represents a (78%) response rate. This study shows that ERP has connected and integrated a wide range of Jordanian manufacturing companies functions and resources, which offers them a new platform of information on how to manage their operations holistically. This can explain the considerable variation in the extent of MAPs adoption among the Jordanian companies, and Enterprise Systems (ES) have the potential to facilitate both conventional and advanced MAPs. Finally, dealing with changes in business operations, the best practice recommendations, and recommendations from different professional bodies were found as main institutional attributes leading to the use of ERP. Furthermore, lack of sufficient support and lack of top management support to implement new practices were the two main other factors that may prevent ERP implementation in the Jordanian context.
Keywords: ERP Systems; Management Accounting Practices; Manufacturing Companies; Jordan.
An Energy and Delay Aware Optimal Data Aggregation using Three Fold Algorithm for WSN
by Adam Raja Basha
Abstract: Wireless sensor networks (WSNs) have been regarded as an emerging and promising field in several applications like facility, health, environmental monitoring, military survival lance and target tracking. Due to their unique characteristics such networks suitable for those real-time applications, such as ease deployment, handling and self-organization. The technical challenges in terms of energy and delay are need to address here, and data aggregation is basic solution to solve those problems by forward useful datas to destination. However, the data and connection loss occurs in the data forwarding, here we propose energy and delay aware optimal data aggregation (EDODA). We make three main contributions in EDODA method: firstly, we propose a new clustering technique using an improved swarm optimization (ISO) algorithm to make balanced clusters, which minimize the energy consumption. Secondly, the modified multi-fruit fly optimization algorithm (MFOA) is used to determine aggregated nodes (AN). Thirdly, we introduce a new searching method using fish-food search (FFS) algorithm based on the destination functional characteristics, which provides routing between source-destination. The results show that the improvement of proposed EDODA method in terms of delay, energy and network lifetime
Keywords: wireless sensor network (WSN); optimal partial aggregation (OPA); multi-fruit fly optimization algorithm (MFOA); clustering; searching method (SM); time on task (ToT); fish-food searching algorithm (FFS); aggregation nodes.
Managing uncertainty in ferry terminals: A machine learning approach.
by César López-Ansorena
Abstract: Ferry service across the Gibraltar Strait usually faces with the congestion problem at ferry terminals. Recognising the need to manage this problem, port managers must be prepared in advance to reduce waiting times, give space in the car park, coordinate ferry departures, etc. With this aim we propose a Machine Learning methodology based on a Classification and Regression Tree (CART) model. Thus, by means of the CART model, port managers can predict (with a certain error) the number of vehicles (or passengers) that will use the ferry terminal in the future. The accurate prediction that the model provides is crucial not only for port managers, but also for ferry operators. Our CART gives the predicted value and the measure of the expected error. Both are presented in sunburst graphs.
Keywords: machine learning; CART; ferry terminals; decision trees; traffic prediction; passengers; vehicles; port management; classification; regression.
The Effect of Price Promotions on Impulse Buying: The Mediating Role of Service Innovation in Fast Moving Consumer Goods (FMCG)
by Seyed Hasan Hosseini, Fatemeh Haghverdi Zadeh, Majid Mohammad Shafiee, Ebrahim Hajipour
Abstract: With the global economic integration, the development of international activities reduce trade barriers in the exchange between countries, and the intensification of competition, Knowledge of customer preferences and encouraging them to buy has become vital for the survival and development of enterprises. (Spicy consumer goods or fast rotation). FMCGS the aim of this study is explain the impact of price promotions on the process of immediate buying in goods of Isfahan that based on an infinite population, the sample is 384 person. Statistical Society was customers of hyper star Store. In order to collect data, a questionnaire is used with good reliability and validity and analysis of structural equations. The results suggest hypotheses have been accepting In other words, it is effective in 95% Confidence level of price promotions on impulsive buying behavior, pricing promotions on service innovation, service innovation on impulsive buying behavior. The other results of this study is confirmation of the impact of price promotions mediator between service innovation and impulsive buying behavior of customers hyper star city.
Keywords: Price promotion strategies; Innovation Services; Impulse buying; Fast Moving Consumer Goodsrnrnrnrnrn.
ANTECEDENTS AND CONSEQUENCES TO APP ENGAGEMENT AMONG YOUNG CONSUMERS IN INDIA
by Souvik Roy, Santanu Mandal
Abstract: The purpose of this paper is to comprehend the causes and outcomes of smart phone application retention among young consumers belonging to generation Y in India. To address this question, we have proposed a construct called app engagement and have tried to establish antecedents and consequences of the same. This study conceptualizes attachment with smart phone application as app engagement from customer brand engagement perspective. Based on insights from information technology and marketing perspectives, certain antecedents and consequents of app engagement are identified. We posit app interactivity and app involvement as dominant antecedents of app engagement while trust, commitment and loyalty for apps as its valid consequences. PLS was used to analyze 232 completed survey responses for testing the validity of the proposed relationships. The empirical findings suggested app interactivity and involvement contributes greatly for app engagement which in turn positively contributes towards the development of app trust, app commitment and app loyalty among young Indian consumers. This paper contributes to both theoretical knowledge as well as managerial practice. On the theoretical front this paper, tries to explain the users app engagement behavior, while on the managerial front it tries to explicate various strategies that a manager should adopt to improve app retention/continuous usage amongst its targeted users.
Keywords: App engagement; Customer brand engagement; Mobile Apps; App involvement; App Interactivity; App commitment; App trust; App loyalty etc.
Designing Infrastructures and Requirements Model of International Markets Development in ICT Industry
by Hossein Tehrani, Aasadollah Kord Naeij, Seyed Hamid Khodadad Hosseini, Asghar Moshabbaki Esfahani
Abstract: As Iran needs to develop the competitiveness of companies active in the field of information and communication technology, researchers, according to reviewing studies and former research, at first, extracted two primary models of infrastructures and requirements. But, as extracted factors were not native and related to communications and information technology market, experts views were used with both interview and Delphi methods. Research method is a mix of quality and quantity and its purpose is also developmental and applied. First, using interviews with 10 experts, 60 factors were identified and 45 factors were also identified from literature, totally 105 factors were entered into Delphi stage. 15 experts agreed on 44 factors during three stages. Then, using the professional views of 110 experts and professionals in companies active in the field of ICT, 44 factors identified was classified using exploratory factor analysis. Results obtained classified factors into 4 groups that made the final configuration of model.
Keywords: Communications and Information Technology Industry; International Markets Development; Infrastructures and Requirements of Market Development; Mixed Qualitative and Quantitative Methods.
Effects of Perceived Ease of Use on SNSs-Addiction through Psychological Dependence, Habit: The Moderating Role of Perceived Usefulness
by Abdul Hameed Pitafi, Shamsa Kanwal, Ali Nawaz Khan
Abstract: Social Networking Sites (SNSs) provide a public platform for communication, interaction, and socialization. The intention behind conducting this research was to evaluate whether perceived ease of use and related factors influence SNSs addiction and to discover their connection with this excessive use. Theoretically, we developed a model which integrates perceived ease of use with habit and psychological dependence to predict social networking addiction and tested the model among university students in Pakistan. Further, we examined the moderating effect of the perceived usefulness of these connections. The link between perceived ease of use and social networking addiction and psychological dependence is moderated by perceived usefulness. However, perceived usefulness shows an insignificant moderating relationship with habit. This study data was collected online using a Google documents application on a sample of university students in Pakistan. In total, 336 samples were collected and analyzed with SPSS version 21. The results show that Pakistani students tend to have higher SNSs addiction because of its perceived ease of use.
Keywords: SNSs-Addiction; Perceived Usefulness; Habit; Pakistan.
Proposing a technical human resource competence model in cyberspace media: a qualitative approach
by Sayed Majid Zanjani, Ali Shaemi Barzoki, Ali Kazemi, Arash Shahin
Abstract: The purpose of this study is to identify the dimensions of the human capital capability model in the cyberspace of national media. This study is typically qualitative and the field study has been performed on the cyberspace experts in Islamic Republic of Iran Broadcasting (IRIB) organization who have been selected and interviewed by semi-structured deep interview method. The interview continued with 26 experts to reach the theoretical saturation. Then, using content analysis technique, data analysis has been performed. Findings indicate that core competencies in the field of cyberspace can be explained in five core individual capabilities including competencies, knowledge and academic competencies, interpersonal and communication competencies, organizational competencies and virtualization competencies. In addition, 85 subordinate competencies can be extracted out of the total results.
Keywords: human capital; competency; national media; cyberspace; qualitative approach; IRIB.
An Empirical Study on Effective Factors on Adoption of Cloud Computing in Electronic Banking: A Case Study of Banking Sector
by Alirez Aalizadeh, Mehri Chehrehpak, Arash Khalili Nasr, Samaneh Zamanifard
Abstract: Cloud computing as a new technology can provide significant advantages in electronic banking services. Adoption of this technology in e-banking services requires consideration of several factors. The main objective of this study is to identify and rank the effective factors on adoption of cloud computing in e-banking. The factors were identified from literature review in 4 dimension based on TOE and HOT-fit models (technological, human, environmental and organizational factors). As a result of this study, 16 factors were identified in 4 dimensions. Using fuzzy group decision-making model and pairwise comparison between factors (by a survey of 63 experts, academics and practical persons in the field), those factors were weighted and ranked. The results show that technical, environmental, human and organizational factors respectively should be considered for adoption of cloud computing in e-banking and especially "Privacy and Security", "Political problems", "Complexity" and "Compatibility" are main factors in adoption of cloud computing in Iranian e-banking services.
Keywords: Electronic banking; cloud computing; technology-organization-environment model; human-organizational-technologic fit model; fuzzy multi-criteria decision-making; Analytical Hierarchy Process (AHP).
Effective Satellite Image Enhancement Based on the Discrete Wavelet Transform
by Vani R., Soundara Rajan K.
Abstract: Satellite image enhancement and restoration is scientifically possible by applying image processing and other soft computing techniques. In this study, a comparison of various existing satellite image resolution enhancement techniques in wavelet domain has been done. I propose a new satellite image enhancement technique based on DCWT-GWO. The novel technique employs the duel tree complex wavelets which, in relation to the classical wavelets, permit a faster execution of the wavelet transforms and furnish incredible flexibility in the generation of the wavelets. An effective system for noise reduction have designed in the backdrop of diverse categories of noise, where an optimal threshold is chosen for each sub band at diverse scales by means of the Gray Wolf Optimization (GWO) algorithm. The optimal threshold will denoise the image effectively. The fitness of the optimization algorithm determine the quality of the image.
Keywords: Satellite image enhancement; Discrete Complex Wavelet Transform; Gray wolf optimization.
The Role of Social Platforms in Establishing Brand Awareness for B2C E-Commerce: Empirical Study.
by Radwan Al-Dwairi, Yousra Harb, Issa Shehabat
Abstract: Social media are computer-mediated technologies that facilitate and create an online environment. Hence, firms can use such media as an effective marketing and advertising tool to reach different categories of customers locally and globally and create brand awareness. Little evidence is available of how social media tools influence the creation of brand awareness among consumers. Also, not all companies are successful in this endeavor. Therefore more research is essential in this domain. In response, this paper offers a good opportunity to seek and study the key factors that might participate in establishing such behavior and proposes a model for such phenomena. Results of the study showed that e-wom, user-generated-content, and product quality have a positive significant impact on customer's establishment of brand awareness. The results contribute to understanding of the value-enhancing potential of social media campaigns and demonstrate how the perception of brands is influenced through this new communication channel.
Keywords: Social media; Brand awareness; user-generated-content; e-wom; interactivity; information quality; credibility; intention.
THE ENDOWMENT EFFECT IN THE PREFERENCE FOR NON-MONETARY MOTIVATIONAL FACTORS
by Alagirisamy Kamatchi Subbiah Sukumaran
Abstract: Employees attached more preference for current benefits of non-monetary factors than future benefits, confirming the endowment effect. The current benefits of motivation exhibited direct effect on employee performance. The distant benefits had no direct effect but exhibited mediation effect by contributing to the current benefits. The employees having low level of literacy and those in the operative cadre were more inclined towards the current benefits when compared with their counterparts. Marital status of the employees was found not influencing the preference for the current benefits. The study is probably the first to attempt an examination of the endowment effect on non-monetary motivational factors in employee performance.
Keywords: Endowment effect; Non-monetary motivational factors; current benefits; distant benefits; employee performance.
THE INTERSECTION OF HEDONIC AND UTILITARIAN VALUES ON INTEGRATED-SOCIAL MEDIA RETAILERS
by Gaffar Hafiz Sagala, Sumiyana Sumiyana
Abstract: This study investigated the e-commerce success using a new model that integrates the hedonic and utilitarian values. This study posits two new model constructed by Wang and Scheepers (2007) and Wang (2008). The studys results suggested that the hedonic and utilitarian values could explain users behavior, especially in their satisfaction and intention to repurchase. It also means that the unified hedonic and utilitarian concepts could improve the success model. Even though the most previous studies show that the utilitarian value-based model has a better goodness fit than that of the hedonic model, this study infers that both hedonic and utilitarian characteristics are alliance. This result implies that all system designers and developers should induce both hedonic and utilitarian contents into the information systems when they built. Because of this value integration, e-commerce managers could get broader market adoption and achieve their business sustainability.
Keywords: hedonic-utilitarian value; online retailers; IS-success; repurchase intentions.
Making the Information Technology (IT) Business Alignment Works: A Framework of IT-based Competitive Strategy
by Ira Puspitasari, Ferry Jie
Abstract: Seamless ITbusiness integration enables superior performance and provides value creation opportunities for an enterprise to achieve a sustainable competitive advantage. Yet, creating IT-business alignment remains a challenge. Some users consider the existing IT-business alignment methodologies too complicated for practical implementation. This paper proposes a simplified and practical framework, an IT-based competitive strategy framework, to align an IT strategy with enterprise businesses based on a design science research methodology. The framework consists of three elements to formulate a comprehensive IT-based strategy, i.e., value drivers of IT implementation, competitive factors, and an IT competitive strategy. The framework evaluation includes interviewing experts and practitioners, applying the proposed framework in an Indonesian enterprise, and assessing the framework benefits on a qualitative basis. The observational evaluation with the experts concludes that the proposed framework is helpful for the targeted users. The framework application in a company also demonstrates the advantage and the usefulness of the proposed framework.
Keywords: IT business alignment; IT management; IT-based competitive strategy; IT business alignment framework; competitive strategy; IT strategy.
Green IS information system framework to support environmental sustainability of firms
by Somnath Debnath
Abstract: With increasing awareness of sustainability issues, businesses are being scrutinized to reduce their ecological footprints and resource intensity. Information technology and systems (IT/IS) being the backbone to support information needs of firms, cannot shy away from the responsibility of supporting firms with sustainability choices, much of which has remained confined to short-term strategies like reducing energy usage and carbon footprint of IT landscape. By leveraging process-oriented view of organizational functions, we explore how green IS can partner with the business processes (green or red) to encapsulate inherent and desired environmental considerations, and bring other IS elements like technologies, systems, and users together to interact. This, we postulate, not only introduces elements like uncertainty, complexity, and dynamism, that characterizes green IS (as a field of study) and differentiates it from traditional IS, but also challenges green IS to deal with a new and evolving information space.
Keywords: green IS/IT; green BPM; business process; sustainability; green processes.
Toward Automatic Web Service Composition based on Multilevel Workflow Orchestration and Semantic Web Service Discovery
by Arul Uthirapathy, Prakash Savarimuthu
Abstract: Revolutionary development of Service Oriented Architecture (SOA) fosters the integration of software components from different distributed platforms and facilitates modelling of web service composition. However, the existing four stage framework used for Automatic Web Service Composition (AWSC), which has drawbacks and incompleteness in terms of dynamic change of user goals, adopting the functional properties for describing behavior of candidate services and implementing unified composition framework. To overcome these drawbacks, we propose a framework for automatic and dynamic service composition that requires adding advances of semantics to web services and modifying the existing four stage framework. We provide a multilevel workflow orchestration using an enhanced five stage composition framework for achieving dynamic change of user requests and scalability for automatic composition. This proposed framework can able to handle both functional and non-functional requirements through transformation techniques for providing a feasible composition solution. Furthermore, it provides a solution for the problem of discovering and selecting the most suitable service candidates using Semantic Web Service Discovery (SWSD) mechanism.
Keywords: Service Oriented Architecture; SOA; Automatic Web Service Composition; AWSC; workflow orchestration; non-functional requirements; service discovery.
An Information Systems Ownership Framework
by Alta Van Der Merwe, Adri Swanepoel, Johan Van Loggerenberg
Abstract: Organisations deploy information systems (IS) with the exclusive intention to pursue their business objectives. Executive managers assign ownership of IS to business leaders, expecting them to leverage the IS towards achieving the objectives of the business areas. Many business leaders are reluctant to take ownership of the IS in their business areas, placing the organisation at risk that IS may not be optimally utilised and business areas not attaining their objectives. Little guidance exists to understand what taking ownership of IS entails. In the research a framework for understanding IS ownership was developed through a process of induction. The IS ownership framework discusses the different perspectives of the role-players with respect to defining IS ownership, the rationale for IS ownership, the criteria for having ownership and the rights, obligations and expectations associated with IS ownership.
Keywords: Information Systems; IS ownership; psychological IS ownership; formal IS ownership.
Determinants of Cloud ERP Adoption in Jordan: an Exploratory Study
by Mannam Zamzeer Makasees, Yazan Alshamaileh, Hamad Alsawalqah, Malak Al-hassan, Esraa Fannas, Sara Sameer Almbaidin
Abstract: Enterprise resource planning (ERP) systems are usually adopted through two major options: cloud computing or on-premise infrastructure. The issues related to hardware, servers, implementation costs, and facilities, which are necessary to run on-premise ERP systems, are rather great for small and mid-sized enterprises (SMEs). The purpose of this research is to highlight the factors influencing cloud ERP adoption among SMEs. The technological, organisational, and environmental (TOE) model will be used as a theoretical base. This qualitative, exploratory study gathers data from thirteen different SMEs and cloud ERP service providers through semi-structured interviews, focusing on SMEs in Jordan. According to our results, support from both service providers and top management within the company play an important role in whether a firm adopts cloud ERP services, in addition to a number of other factors at varying rates. Research findings can be used by service providers and business owners to enhance their approach to cloud ERP by showing the reasons why some SMEs chose to adopt this technology and others did not. Cloud ERP providers need to intensify their efforts to build a progressive environment for their services that will eliminate any ambiguity regarding this type of technology.
Keywords: Cloud; enterprise resource planning; TOE framework; Jordan; small- and mid-sized enterprises; information and communication technology.
Understanding Citizens Continuance Intention to use e-Government services: The case of the Indian Railway e-ticket booking Site
by Jose Puthur, A.P. George, Lakshman Mahadevan
Abstract: The emergence and expansion of e-government initiatives has brought interesting facets of e-services on the internet. To sustain such initiatives, it is important to understand the factors that improve the users intention to re-use such e-services. This research tries to identify the factors that influence the citizens to avail the e-services provided by the Ministry of Railways, Government of India. The result of this study shows that the two major determinants of technology acceptance (TAM) namely Perceived Usefulness and Perceived Ease of Use along with Trust and Computer Self-efficacy explain over seventy percent of the variance in the users intention to reuse the e-ticket booking site of the Indian railways. The findings have important implications for e-Government portals such as the Indian railway booking site that strive to meet citizen expectations. Specifically, the e-ticketing website should contain user-friendly, high-quality information content, and excellent website quality in order to enhance citizens intent to re-use their services.
Keywords: e-government; Indian railways; e-booking; Intention to reuse.
DISCREPANCIES IN INFORMATION TECHNOLOGY STRATEGIC ALIGNMENT IN HEALTHCARE
by Soleil FARAH, Marc BONNET, Kamar DAMAJ
Abstract: Information technology contributes significantly to the healthcare industry. Healthcare IT, if efficiently managed, can decrease expenses; enhance hospitals processes, patient satisfaction and care. From this perception, the necessity to improve Information Systems Management becomes a significant governance and structural concern in hospitals. Therefore, it is fundamental to set an appropriate IT strategy, provide means to manage and implement it. IT Strategic Alignment is crucial to developing and maintaining all kind of information and communication that supports patients treatment processes, business operations and ameliorates organizational social and economic performances. This study is a kind of action research project, and more specifically a Qualimetrics Intervention Research methodology, a transformative approach, conducted in a private hospital in Lebanon. As technical systems are turning out to be more complex and progressively indispensable to healthcare organizations, there is a rising awareness to keep up a sustainable environment, through maintaining intellectual, social and operational strategy of the organization.
Keywords: IT Strategic Alignment; Operational Alignment; IT management; Efficiency; Sustainable environment; Qualimetrics Intervention Research; Healthcare.
Role of Contextual Factors in Influencing User Evaluation of Information System: An Analytic Hierarchical Process approach
by Meenakshi Jakhar, Sanjay Kumar
Abstract: Continuous evaluation of information systems (IS) is critical for their improvement. The context in which a system is embedded is a critical determinant for evaluation of its success. The paper explores the role of contextual factors in impacting the user evaluation of IS with regards to two key dimensions: information quality (IQ) and interface usability (IU), using a multi criteria decision making (MCDM) technique, Analytic Hierarchical Process. The contextual factors include organisation size, industry of operation, type of IS, functional area and managerial level of user. The results show that excluding industry, all contextual factors significantly influence the user perception of IS evaluation. Additionally, IQ attributes of accuracy and reliability and IU attributes of efficiency and guidance are perceived as most significant by the users for IS evaluation.
Keywords: Information system evaluation; Information Quality; Interface Usability; User perception; Contextual factors; Analytic Hierarchical Process.
Road Map for the Implementation of Enterprise Resource Planning: A Grey Relational Analysis Approach
by Amir Karbassi Yazdi, Yong Wang, Ghanbar Abbaspour Esfeden
Abstract: Helping managers effectively allocate limited strategic resources in the organization, enterprise resource planning (ERP) is one of the most important organizational systems that assist accurate and on-time decisions. The aim of this study is to rank critical successful factors (CSFs) for the implementation of ERP in the insurance industry. Although many organizations have adopted ERP, only a few of them are able to achieve the strategic goals. In this study, CSFs for ERP implementation are identified and then ranked by employing grey relational analysis (GRA). The results reveal 12 CSFs, and among them, organizational culture, advanced technology, and staff are considered the highest priority. Based on the results, research and managerial implications are provided.
Keywords: Enterprise Resource Planning (ERP); Uncertainty Environment; Grey Relational Analysis (GRA); Critical Successful Factors (CSFs).
Acceptance and Use of e-hailing Technology: A Study of Uber Based on the UTAUT2 Model
by João Soares, Juliana Christino, Marlusa Gosling, Luciana Vera
Abstract: For the first time in Brazil, an article presents an assessment of the technology employed in the provision of the e-hailing sharing economy service from the perspective of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2), developed by Venkatesh et al. (2012). It aims at providing an understanding of the factors that predict the Behavioural Intention of the service. In order to achieve this goal, 311 users of the Uber service in Brazil were interviewed for a survey. Uber, as an e-hailing service, enjoys significant use in Brazil and worldwide. The analysis of the data was done by means of exploratory factor analysis and structural equation modelling methods. The results pointed out that the factors Price Value, Performance Expectancy and Habit were the most relevant aspects influencing the customers choice of e-hailing.
Keywords: Sharing Economy. e-hailing. Uber. Unified Theory of Acceptance and Use of Technology 2 (UTAUT2).
MODEL PAYMENT ORDER IN THE SEPA SYSTEM
by Miodrag Sretenovic, Bozidar Kovacic
Abstract: The process of modernisation, rationalisation and automation aimed at increasing productivity and cost-efficiency is not feasible without the continuous investment and application of modern information technology. Single Euro Payment Area (SEPA) is a single payment system in EUR, within and between the European Union (EU) member states and the European Economic Community (EEC). Performing payment transactions by manual or semi-automatic input (template) is time-consuming and includes a high probability of error. Development of a model for automating the execution of a payment order enables faster and errorless execution of payment transactions. This paper describes a platform for the exchange of digitised contents for payment orders in the SEPA system and methods used in the development of an automated system for the exchange of data with business banks. The paper presents the improvement in the execution of payment orders using the SEPA system and also offers directions for further development.
Keywords: SEPA; e-business; payment system; payment order; data modelling; model payment order.
Cloud Computing in Healthcare - A vision, challenges and future directions
by Rakesh Raut, Balkrishna Narkhede, Vaibhav Narwane, Bhaskar Gardas
Abstract: In the era of cloud computing (CC), many organisations have successfully adopted and leveraged CC capabilities to improve their business performance and economic performance. However, past literature on CC has put the limited focus on cloud-healthcare domain. In this context, this paper aims to provide a systematic literature review of cloud computing in healthcare (CCH) capabilities, usages, and other challenges across countries over a period of the healthcare industry. The paper presents the bibliometric analysis of research papers of 750 found on CC from 2011 to 2017 and after scrutinising 81 articles were considered for the review, which was related to CCH. This article contributes to theorising CC capabilities in the context of healthcare and provides future direction of research in this field.
Keywords: Cloud computing; Healthcare; Health-4.0; Cloud health issues; Big-data analytics.
Towards Development of a Cyber Security Capability Maturity Model (CSCMM)
by Durga Prasad Dube, R.P. Mohanty
Abstract: Business processes are increasingly becoming technology driven. Disruptive technologies like social, mobility, analytics and cloud (SMAC) and internet of things (IOTs) have made a paradigm shift in the information technology space. With this evolution, the cyber security threats to digital infrastructure also have been increasing manifold and are a concern for the sustenance of business growth scenario. There is a need for a continuous improvement program in the cyber security posture of the organisations to keep pace with the increasing threats. Capability maturity models help to achieve this purpose. This paper presents the formulation and validation of a new cyber security capability maturity model (CSCMM) by comparing the strengths and limitations of nine contemporary maturity models and performing an empirical analysis of inputs from 200 odd relevant cross industry sector professionals. CSCMM is expected to improve the cyber security posture of the organisations to combat to the new generation threats.
Keywords: Information Security; Maturity Model; Security Controls; Cyber Security; Continuous Improvement Plan.
An E-health Decision Support framework to predict the heart disorders
by Sruthi Sivakumar, Padmavathi S
Abstract: The current evolutionary usage of data mining techniques can be imparted for the development of medical applications to analyze the health metrics. The web-based decision support framework is proposed in this work would provide the pre-guidance report based on the decision generated by Bayesian network analysis over the disease dataset. The report is generated in adherence to the mined disease patterns over the patients non-medical and medical factors which are obtained from the past medical records and predict the possibility of getting the disease for the given similar health metrics. The Bayesian model builds a decision model by analyzing the casual intervention effects of the non-medical and medical factors of each individual. The decision model would generate a pre guidance health report based on the analyzed probabilistic chances of getting the heart disorder. The predicted report is a prognostic analysis of the health metric of the individual and suspects their possibility of getting affected by heart disease.
Keywords: Bayesian Networks; Disease pattern analysis; past-clinician heart disease data; E-health care.
A Compacted triple band antenna design for GSM, Wi-Fi and WiMAX communication schemes for information computation system
by R. Saravanakumar, Vijay Kumar V.R.
Abstract: Recently, wireless communication devices like mobile phones are becoming increasingly popular. The aim of this paper is to design an antenna which can excite triple band operation with appreciable impedance bandwidth to combine WLAN/WiMAX communication specifications simultaneously in one device. A compacted triple band antenna is designed for global system for mobile (GSM) communications, WiFi and WiMax-based applications. The proposed design comprehends a rectangular ring and S-shaped strip committed to the feed line. The dimension of the antenna is relatively small (16
Keywords: Coplanar Waveguide (CPW) Fed Antenna; WiFi; WiMAX; GSM and Triple Band Antenna.
ONLINE STORE IMAGE EFFECT ON PERCEIVED RISKS TOWARDS ONLINE PURCHASING BEHAVIOUR
by Lu Man HONG, Noorshella Binti Che Nawi, Nurul Hasliana Hamsani, Wan Farha Wan Zulkiffli
Abstract: Online consumers have their own risk perception known as perceived risks. If consumers detected a variety of risks with the online purchase, consequently it will decrease the intention to shop online. The purpose of this paper is to examine the relationships between online store image towards perceived risks (financial, product-performance, time, delivery, psychological, privacy, social, and after-sale risks) and the relationship between perceived risks towards online purchasing behaviour. Data collected from 330 respondents who have experience in online purchasing suggested that online store images have influence financial, product-performance, time, psychological, social, and after-sale risks. Surprisingly, online store image has no effect on privacy and delivery risks. Meanwhile, financial, psychological, social and after-sale risks have influence on online purchasing behaviour. In other words, increased risk in product performance, financial, psychological and after-sale risks influence the online purchasing behaviour by reducing the intention to purchase the product. Therefore, online purchase platform providers, online retailers and online marketers should identify the online store image that is capable to reduce consumers perceived risks thus leading to a positive purchasing behaviour. Additionally, consumers can gain knowledge about the risks that might be faced during online shopping activities.
Keywords: Online Purchasing Behaviour; Online Store Image; Perceived Risks.
Meta-analytical structural modeling of virtual communities: The case of professional and non-professional users
by Alencar Bravo, Darli Vieira
Abstract: Currently, the factors that motivate knowledge-sharing process in a virtual community (VC) remain unclear. VCs exist in two different but similar scenarios. The first scenario involves professional VCs (PVCs) formed by professionals in similar areas looking to solve common problems. PVCs within a company often work to address similar problems in multiple plants and countries. The second scenario involves nonprofessional VCs (NPVCs). This study discusses some factors that affect knowledge sharing in virtual communities and compares the effects and behaviors between PVCs and NPVCs. We investigate these issues by quantitatively reviewing the available literature using meta-analytical structural equation modeling (MASEM) for both PVCs and NPVCs to evaluate the moderating effects of conventional professional knowledge-sharing methods. Although trust was established as a crucial element in both models, the factors associated with each model differed substantially. The absolute values of the correspondence of trust with self-efficacy and with knowledge sharing were lower for PVCs than for NPVCs. This research revealed the singularities of these different information systems applied to businesses.
Keywords: virtual communities; knowledge sharing; structural model; meta-analysis; group work; distance learning; information systems; business; motivation; MASEM.
Readiness Research for Implementing ERP Systems: A Case Study
by Faris Abu Hashish, Khalid Al-Tahat
Abstract: This research paper describes the scope of the Enterprise Resource Planning (ERP) Roadmap Recommendation for the Arab Open University (AOU) Jordan branch administrative services. It provides a high-level overview of the key processes, the major technologies supporting those processes, and the state of readiness for an ERP implementation. It also describes the result of the analysis of the various four alternatives which were identified as the most viable options for implementation of an ERP solution. Furthermore, the research also assesses the high-level As-Is business processes against the standard norms and best practices of World-Class higher education institutions and their applicability to the ERP implementation at AOU.
Keywords: Enterprise Resource Planning; Framework; Case Study; AOU-Jordan.
Developing and presenting an organizational culture model based on dimensions of Hofstede model
by Saeed Landaran, Hadi Teimouri, Mehdi Abzari
Abstract: The objective of this research is to explain and develop a model of the dominant organisational culture proposed for Fulad Mobarakeh Company. The methodology of this research is qualitative. The research population included senior managers of Fulad Company and professors of Isfahan University. Semi-structured interview was conducted with all of the subjects. Data analysis in the qualitative section was conducted based on three-step encoding of thematic analysis using Nvivo software. After examining the interviews, based on three western, traditional and Islamic subcultures, a dominant model of ruling culture in Fulad Mobarakeh Company was presented. It was confirmed by a reliable confirmatory factor analysis through LISREL software at the appropriate confidence level. According to the research results, the organisational culture model proposed for Fulad Mobarakeh Company includes the following categories and components: organisational collectivism, organisational authority and power interaction, lack of proportional uncertainty a version, organisational transgender perspective, and organisational attitudes balance.
Keywords: Western subculture; traditional subculture; Islamic subculture; and dominant culture.
Exploring Travellers Booking Factors through Online Booking Agency
by Mohd Haniff Jedin , Kohila Ranjini Annathurai
Abstract: The aim of this study is to explore the factors that travellers search for when booking the hotel through online travel agency. A survey and convenience sampling method were used in this study. For the data analysis, the researcher used 398 questionnaires which were distributed at Penang International Airport, Malaysia. The questionnaires were distributed among the travellers who travel through aviation industry. Result shows that exploratory factor analysis has identified 13 key factors of which travellers refer the most. Moreover, the result shows that, this factor analysis is appropriate and do have patterned relationship amongst the variables. Furthermore, this study provides a clear understanding for online travel agency regarding the needs of the travellers as this study helps the online travel agency to identify the factors that lead the travellers to repurchase their services which is indirectly helps the online travel agency in generating profits.
Keywords: Hotel online booking; Online travel agency; Aviation Travellers.
Factors Affecting Acceptance of Internet Banking With Technology-Organization-Environment Framework: A Perspective of Corporate Customers in Indonesia
by Yekti Wirani, Achmad Nizar Hidayanto, Muhammad Rifki Shihab
Abstract: This study is conducted to analyse factors that affect acceptance of internet banking in Indonesia from corporate customers perspective. The proposed model in this research using technology-organisation-environment (TOE) framework. This model was tested by the structural equation modelling (SEM) using AMOS 22 software. The analysis result of 334 respondents show corporate customers in Indonesia tend to consider five factor that affect acceptance of internet banking. Concerning internet banking characteristic, it was also proven that perceived cost, security, top management support, service provider support, and government support affect on internet banking acceptance.
Keywords: Technology-organization-environment; internet banking; internet banking acceptance; corporate customer; Indonesia.
A HYBRID PSO OPTIMIZED VIRTUAL MACHINE SCHEDULING ALGORITHM IN CLOUD COMPUTING
by Karthikeyan P, Alumparambil Rinta Sony
Abstract: The service to the end user in cloud computing is offered as virtual machine instances as demanded for a specified duration of time and billed on pay per use basis. A major problem faced in cloud computing is the virtual machine scheduling problem. The existing algorithms efficiently cannot satisfy the requirements with respect to resource utilisation, bandwidth utilisation, and cost. Also, most of them are of the fixed type which leads to wastage of resources. To overcome these problems, the hybrid particle swarm optimisation (HPSO) algorithm is proposed by efficiently allocating the resources to the users. This algorithm combines the genetic algorithm (GA) and the variable neighbourhood search (VNS) algorithm with the particle swarm optimisation (PSO) technique to increase the utilisation rate of the virtual machine as well as to minimise the total completion time. The proposed system is evaluated by performing simulations. The experimental results show that the proposed algorithm minimises the total completion time and increase the resource utilisation than PSO, GA and VNS algorithm.
Keywords: Cloud computing; Particle Swarm Optimization; Variable Neighborhood Search; Genetic algorithm.
The Performance evaluation of banks using Balanced Scorecard, fuzzy AHP and fuzzy TOPSIS techniques and the offering of solutions to performance improvement of banks
by Negin Akbari
Abstract: The purpose of this research is to realize how the performance evaluation of banks using balanced Scorecard and the offering of solutions to performance improvement of banks. Regarding the thematic nature of research model, experts opinion in central bank, Melli Bank as a representative of Commercial banks, Saderat bank as the representative of Specialized banks and Parsian bank as the representative of private banks have been selected. Considering that Parsian, Melli and Central Saderat banks in Semnan have been brought for this research as statistic population. Numbers of experts participating in the study were 30 persons who were interested in improving discussion. The main tools used for gathering the data in this study were company records and questionnaire. This research first summarized the evaluation indices synthesized from the literature relating to banking performance. Then, to screen these indices, 22 indices were selected for banking performance evaluation. Furthermore, the relative weights of the chosen evaluation indices were calculated by Fuzzy Analytic Hierarchy Process (FAHP) and fuzzy TOPSIS.As to the prioritization of BSCs aspects, results indicated that the financial aspect or criterion stands atop the priority list followed by the criteria of customers, learning and growth, and the internal process of the organization respectively. The results obtained from fuzzy TOPSIS method indicate that private bank is more important than specialized bank and Commercial bank in banking industry.
Keywords: performance evaluation; Balanced Score Card; Fuzzy Analytic Hierarchy Process; Fuzzy TOPSIS.
Evaluating and Redesigning of Virtual Reality Underwater Tourism Application Based on Heuristic Method
by Gede Rasben Dantes, I. Komang Sudarma, Putu Hendra Suputra, Ni Komang Arie Suwastini, Kadek Rihendra Dantes
Abstract: This study aimed at evaluating the application of VR e-Bahari in terms of the usability aspects. The method used to evaluate the usability of VR applications was semi-immersive based on Sutcliffe's 12 heuristic rules. The first step was the literature study related to the heuristic usability method and VR application. The next step was to evaluate the usability of VR e-Bahari application using the heuristic method. Finally, the researcher set out suggestions or recommendations for improvements to the application that had been evaluated for further development. The researchers also tested several positions that caused cyber-sickness symptoms. Based on the evaluation of the usability, the application of VR e-Bahari already represented the underwater environment and the completeness of 3D objects that were needed well, such as coral reef, fish, sea effect, light effect, and underwater sound effect. However the interaction between the users and applications was still less natural, sound effects and narrative information were inadequate, and there was a lack of use of the navigation buttons on the application. An important part of concern when improving the design of the application was an improvement on the VR environment constraints. There was the addition of the navigation buttons, the addition of each object's information, and the addition of air bubble effects and impact effects. While the test results of some positions indicated that the position of the head up, down, and rotate the head quickly would trigger symptoms of cyber-sickness. In addition, the users felt more comfortable using ANTVR compared to Google Cardboard.
Keywords: evaluation; usability; heuristic; semi-immersion; virtual reality; e-Bahari;.
Discovering Explicit Knowledge Using Text Mining Techniques for PeaceKeeping Documents
by Puteri Nor Ellyza Nohuddin, Zuraini Zainol
Abstract: Documents are created and converted into digital to ease users in many organisations. Sharing documents among the employees throughout the companies' computer creates a conducive environment for knowledge sharing. In knowledge management domain, contents in documents are considered as explicit knowledge that can guide employees to elevate their work production. Thus, sharing the knowledge is a competitive advantage in an organisation to develop knowledge workers. However, accumulative documents over time can be difficult to trace and reuse without a proper management system. This paper describes document analysis technique in learning knowledge contained in a set of peacekeeping training manuals. The authors adopted a text mining technique to analyse and identify the theme or subject matter of a collection training manuals. The paper also describes a demonstration using a text mining tool and describes knowledge discovery of document analysis using a visualisation technique.
Keywords: Knowledge Discovery; Knowledge Management; Explicit Knowledge; Data and Text Mining; PeaceKeeping.
A Weighted Sum Method MCDM approach for Recommending Product using Sentiment Analysis
by Gaurav Kumar, Parimala N
Abstract: In recent times, reviews of products by customers have been proliferating on the online platform. Majority of the reviews are lengthy, and going through the reviews before making a decision can be a tedious task for the user. In this paper, we extract the popular features from customers' reviews to analyse the possible opinions of these features. Choosing a product from the different combination of opinions for these features is treated as a multi-criteria decision making (MCDM) problem. Weighted sum method, a MCDM approach, is used to evaluate the priority score for each product. The product with the highest score is recommended to the user. Real-time dataset from Amazon is used to evaluate our system's performance. The experimental result shows that our proposed method produces a promising result which can help the user in the decision making process.
Keywords: Sentiment Analysis; Review Analysis; E-Commerce; Recommendation Systems; Multi-Criteria Decision Making; Weighted Sum Method.
A Comprehensive Analysis for Retinal Image Classification Methods using Real-Time Database
by M. Kavitha, Palani S.
Abstract: This paper proposes a comprehensive analysis to compare our two methods with some existing methods to prove the improvements of the proposed algorithm. Here, the comparative analysis is done by three phases like pre-processing, segmentation and classifier phase. For pre-processing, four noise removal filters like average, Laplacian, motion and unsharp are carried out to compare with Gaussian filter. The two segmentation algorithms like region growing and k-means segmentation are carried out to compare in proposed segmentation phase. For diabetic classification, the proposed classifier of Levenberg-Marquardt (LM) neural network against other four existing classifiers SCG-NN, adaptive neuro-fuzzy inference system and k-NN. Here, some different evaluation metrics such as PSNR, SSIM, sensitivity, specificity and accuracy are used to measure the performance. The test images are considered for performance analysis in real-time. The proposed approach obtained 97.5% in terms of accuracy for real-time database, which is high compared to existing techniques.
Keywords: Abnormal; Normal; Hard; Soft; Diabetic Retinopathy; Classifier; Retinal Image.
A proposed model for achieving cloud computing strategic alignment using a mixed method approach: Cloud Service Providers
by Mozhgan Marashi, Neda Abdolvand
Abstract: Comparing traditional businesses, new technologies such as cloud computing have faced new challenges to achieve strategic alignment between IT and business. Therefore, identifying the factors affecting the strategic alignment in the cloud-computing environment is essential. Hence, this study aims to introduce a model for cloud computing strategic alignment considering the role of IT governance. In this regard, the Luftmans strategic alignment framework was used as a reference model and was analyzed using qualitative and quantitative approaches. In the qualitative part, the meta-synthesis approach was used to identify the factors, and then these factors were placed in appropriate categories using experts ideas. Next, in the quantitative part, the Chi-square test was used to analyze the hypothesis and the Friedman test was used to prioritize the concepts, categories, and subcategories. The results indicate that IT governance plays an important role in creating the strategic alignment in a cloud. Moreover, two factors of security service management and the contextual and environmental factors of the cloud were identified as the important factors which help managers create value through IT investments.
Keywords: Cloud Computing; Strategic Alignment; IT Governance; Meta-Synthesis; Cloud Service Providers.
Feature Set Processing using Multi-Objective Optimization Algorithm to Improve Content-based Image Retrieval System
by B. Syam, Y. Srinivasa Rao
Abstract: We propose a framework of genetic algorithms to search for Pareto optimal solutions (i.e., non-dominated solutions) of multi-objective optimisation problems. Our approach differs from single-objective genetic algorithms in its selection procedure and elite presence strategy. The selection procedure in our genetic algorithms selects individuals for a crossover operation based on a sum of multiple objective functions. The characteristic feature of the selection procedure is that the weights attached to the multiple objective functions are not constant but randomly specified for each selection. This might most likely decry the classification accuracy and increase noise once it extracts type content type pictures. To avoid these drawbacks, a brand new technique is planned to induce retrieval performance. The implementation results show the effectiveness of projected optimisation technique in retrieving all pictures. Furthermore, the performance of the proposed technique is evaluated by comparing with the other optimised CBIR methods.
Keywords: Multi-objective optimization; Genetic Algorithms; Pareto solutions; Feature Extraction.
Aspect-level Sentiment Analysis on Goods and Services Tax (GST) Tweets with Dropout DNN
by Venkatramaphanikumar S, Venkata Krishna Kishore K, Deepak Chowdary E
Abstract: Sentiment analysis (SA) is a primary use case for natural language processing, where data scientists analyse comments on social media to get instant feedback and improvement in future product releases. In this study, SA was performed on the goods and services tax (GST), which is one of the greatest tax reforms in India. In this study, crucial statements (tweets) about GST were analysed using POS-N-gram tokenisation approach to extract word tokens for classifying sentiments or opinions. The objective of this proposed work is to improve the sentiment classifications accuracy of the review data with an optimal number of reduced terms. In this study, a novel approach improved PCA is proposed for dimensionality reduction and a dropout deep neural network classifier is proposed for sentiment classification. These methods are evaluated on the proposed dataset (Corpus-1) and two other benchmark datasets like movie reviews (Corpus-2) and SemEval 2016 (Corpus-3) datasets. Experimental results clearly evident that the proposed approach outperforms the existing methods.
Keywords: Goods and Services Tax; Natural Language Processing; Sentiment Analysis; Improved PCA; PLSA; Dropout Deep Neural Network.
Design Principles for Business Domain-Specific e-Collaboration: A Solution for Integrated e-Collaboration in Enterprise Systems Based on the Example of the Product Costing Domain
by Diana Lück, Christian Leyh, Susanne Strahringer
Abstract: In this paper, we present design principles for business domain-specific e-collaboration (BDSpeC) - a concept that focuses on integrating e-collaboration into the core processes of particular business domains and the corresponding transactional enterprise systems (ESs) supporting these core processes. These principles are based on our research results regarding collaboration support in product costing as pilot domain. In this domain, we discovered a specific lack of integrated e-collaboration to enable communication, coordination, and information exchange in direct connection to the core processes with their daily work routines and data sources. In a design science research project, we created artefacts for the product costing domain and derived design principles for a broader scope of contexts. The design principles for BDSpeC illustrate how such an integration can be achieved in various business domains with similarities to product costing. By focusing on design principles, we have abstracted and codified design knowledge that is useful for both, research and practice. In design practice, the design knowledge can be used to develop other instances as solutions to a class of problems sharing similarities with product costing. In design research, it is intended to encourage exaptation by supporting the transfer of our solution into other domains.
Keywords: Business Domain-Specific e-Collaboration; e-Collaboration Integration; Enterprise Systems; Product Costing; Product Development; Product Lifecycle Management; IS Design Principles.
A Conceptual Model for Software Ecosystem Governance
by Joyce Aline De Oliveira Marins, Carina Frota Alves, George Valença
Abstract: In a software ecosystem, organisations work collaboratively to survive market changes. To ensure the healthy growth of software ecosystems, governance is essential because it defines suitable strategies and processes to manage relationships in the software ecosystem. Software ecosystem governance is all process by which an actor creates value, coordinates relationships and defines control. Understanding the elements and relationships involved in the software ecosystem governance supports companies to discover which elements act as enabler or barrier to the health of the ecosystem. We proposed a conceptual model to govern software ecosystems. The model was built using design science research and was evaluated through an expert survey and interviews with practitioners. The model increases the theoretical body of knowledge in the field and practitioners can apply it to create governance strategies to foster the healthy evolution of the ecosystem.
Keywords: Software ecosystem; governance; conceptual model; design science.
The Effect of Country-of-Origin on the Consumer Purchase Intention Considering the Mediating Role of the Brand Equity Dimensions
by Seyyed Milad Shirvani, Negar Motamedi, Rahim Mohtaram
Abstract: The objective of the present study was to examine the effect of country-of-origin on the consumer purchase intention considering the mediating role of the dimensions of brand equity. The population of this study included buyers of home appliances in Tehran. Random sampling was used to determine the sample of the study. Infinite sample size determination formula was used to determine the sample size. 384 people were selected as the sample of the study. A researcher-made questionnaire was used for data collection; the validity of the questionnaire was confirmed by some experienced professors and experts and the reliability of that was obtained as 95.7% and confirmed by using Cronbach's alpha. PLS software and the implementation of the structural equation modelling were used for data analysis. The results showed that the country-of-origin image significantly affects the dimensions of the brand equity (brand awareness, perceived quality, brand association, and brand loyalty); moreover, the brand equity dimensions significantly affect the purchase intention.
Keywords: the country?of?origin image; brand awareness; perceived quality; brand association; brand loyalty.
Cost-Effective Privacy Preserving of Intermediate Data using Group Search Optimization Algorithm
by G. Jaikrishna, Sugumar Rajendran
Abstract: Cloud computing provides huge storage ability to clients, in order to convey their applications without any infrastructure investment. Alongside those applications, an extensive set of intermediate datasets will be created, and it is a challenging issue to protect the security of those intermediate datasets. Therefore, in this paper, we preserve only sensitive information which reduces the time and cost. For privacy preserving of the intermediate dataset, in this paper, we propose a combination of group search optimisation (GSO) and advanced encryption standard (AES). At first, the original dataset is split into an intermediate dataset and we select the corresponding node from the cloud for each intermediate dataset using GSO algorithm. After that, we separate the sensitive data using information gain. Finally, we apply the AES to encrypt the sensitive data. The performance of proposed methodology is in terms of encryption time and memory usage.
Keywords: Cloud computing; Group search optimization; advanced encryption technique standard; information gain; intermediate data and sensitive data.
Validation of Objective based ERP Value Factors Measuring Intangible Benefits-Indian Higher Education Context
by Pratima Dabholkar, Hema Date
Abstract: The purpose of this paper is to identify and validate objective based Enterprise Resource Planning (ERP) value measurement factors. This study was conducted in the context of Indian Higher Educational Institutes (HEIs). Although educational institutes have been adopting ERP systems for many years, the literature reveals that little attention has been given to research on ERP in educational institutes in general and ERP value in particular. ERP implementation is said to be successful only when it able to create value in post-implementation stage. Though ERP is able to create value in post-implementation stage, literature suggest that HEIs achieve ERP value more in terms of intangible benefits than the tangible benefits. Therefore, Identifying and measuring ERP value is more complicated in HE environment. To determine ERP success in HEIs, this study considered intangible benefits which are mapped with the objectives of ERP implementation for measuring ERP Value. The value of ERP can be assessed on different parameters. For this study ERP value factors are mapped with the objectives of the ERP implementation on six different parameters: Improved Academic Processes (IAP), Effective Integration (EI), Improved Decision Making (IDM), Maximized Effectiveness (ME), Improved Efficiency (IE) and Increased Self Efficacy (ISE). These measurement factors are confirmed with the congeneric reliability and confirmatory factors analysis. However, future studies may include tangible and intangible benefits to get more concrete results. This reliable and valid ERP value measurement factors will help higher educational institutes to measure ERP success in ERP post-implementation stage. The ERP value measurement factors can be used as a guideline to ensure a positive outcome of the ERP implementation in higher educational institutes.
Keywords: Enterprise Resource Planning; ERP; ERP Value; Indian higher educational institutes; higher educational institutes; Wave analysis; congeneric reliability; structural equation modeling.
The role of brand perception in the information search and processing behavior of mutual fund investors
by Alagirisamy Kamatchi Subbiah Sukumaran
Abstract: Investment decision efforts of the mutual fund investors could be brought down when equipped with brand information. Brand perception enabled the investors to evaluate the investment risk. The investors did not take much effort to process the fund-specific information as such information was available in the public domain. The investors sought professional and personal help for processing fund-specific information but not general-purpose information of mutual funds. The mutual fund marketers can save advertisement and promotional expenses by promoting the brand perception of the investors. The positive relationship found by the study between perceived risk and subjective knowledge suggested the availability of abundant information, as abundant information might have caused uncertainty in the minds of the investors. The regulatory agencies were suggested to frame suitable guidelines to reduce the dissemination of superfluous information to the investors.
Keywords: Brand perception; Information search and processing; Mutual fund investors; Subjective Knowledge; Perceived Purchase Risk; Purchase Decision Involvement.
A Comparative Study of Malaysian and Indonesian Students Entrepreneurial Characteristics and Career Choices Resulting from the Digital Economy
by Nadiah Abd Hamid, Florentina Kurniasari T., Hakimah Aisyah Mohamad Taib, Nor Hasnah Mad Saheh, Tengku Fairuz Tengku Embong
Abstract: The purpose of this paper is to identify the effects of digital economy on students' entrepreneurial characteristics and entrepreneurship as career choices, comparatively between Malaysia and Indonesia. A sample of university students was selected in each country. Confirmatory factor analysis (CFA), the foundation of structural equation modelling (SEM) has been used. The results evidenced that digital economy in both countries significantly influencing the entrepreneurial characteristics of the students. All four dimensions of digital economy in Indonesia significantly affecting the students' entrepreneurial traits, while only two dimensions are significant in Malaysia, i.e., social and cultural environment dimension and the consumer and business adoption dimension. It also discovered that the university students in Malaysia are reluctant to become entrepreneurs in future contrarily with Indonesian university students. Therefore, Malaysian and Indonesian governments need to keep on supporting the development of digital economy to encourage students to choose entrepreneurship as their careers in future.
Keywords: Career Choices; Digital Economy; Entrepreneurial Characteristics; Indonesia; Malaysia.
SHOPPING ON SOCIAL NETWORKS: IS THIS THE STOREFRONT OF THE FUTURE?
by Melanie Wiese
Abstract: Consumers are moving towards social networking technologies as an alternative channel for shopping. This research extended the technology acceptance model (TAM) to investigate the factors that predict Facebook users' behavioural intentions towards the adoption of Facebook shopping, as well as the moderating role of trust. A convenience sample of 384 South African Facebook users completed the online survey. Confirmatory factor analysis (CFA) and structural equation modelling (SEM) were used to test the hypotheses. The results revealed that perceived enjoyment and perceived usefulness were the most important predictors of shopping on Facebook, while privacy risk and social norms did not significantly influence intent to shop. Although the moderating role of trust could not be confirmed it seems as if consumers are more positive about shopping on Facebook than general online shopping. The implications offered will assist in the formulation of effective marketing strategies to drive the up-take of shopping on Facebook.
Keywords: Social networks; Facebook; S-commerce; F-commerce; online shopping; Technology Acceptance Model (TAM).
A Survey on Adoption Factors of Cloud-based Enterprise Systems and Their Differences in Iranian SMEs
by Neda Abdolvand, Saeedeh Rajaee Harandi, Darya Tarani
Abstract: This paper documents the difference between adoption factors in cloud-based enterprise systems (ES) in small and medium organisations [small and medium-sized enterprises (SMEs)] in Iran. These factors include enterprise resource planning (ERP), supply chain management (SCM), and customer relationship management (CRM). To assess the determinants that influence the adoption of cloud-based ES, a research model based on the innovation characteristics from the diffusion of innovation (DOI) theory and the technology-organisation-environment (TOE) framework was developed. The results of the field study among 200 Iranian SMEs revealed that while top management support has the greatest impact on cloud SCM, relative advantage has the most impact on cloud CRM adoption. Moreover, technological readiness was identified as the most effective factor in the adoption of cloud ERP among SMEs.
Keywords: Cloud Computing; Technology Adoption Model of TOE and DOI; Enterprise Resource Planning; Supply Chain Management; Customer Relationship Management.
Automatic topic labelling for text document using Ontology of graph-based concepts and dependency graph
by Phu Pham, Phuc Do, Chien D.C. Ta
Abstract: Topic labelling is an important task of text mining. It supports to assign proper topic labels to the text documents. In this paper, we present a novel approach of using graph-based concept matching approach in solving automatic topic labelling task. Our proposed model demonstrates that the quality of automatic topic labelling task for text documents can be improved, in comparison with traditional keyword-based concept matching approach. In this paper, we propose a novel approach of automatic ontology-driven topic labelling. Our proposed model is considered as a semi-supervised approach. It uses existed ontologies as the pre-knowledge base for topic identification in text documents. We performed the experiments on the real-world ACMs documents to show the effectiveness of our proposed model in solving topic labelling task. The experimental results on real-world and standard datasets demonstrate that our proposed model can leverage the output accuracy of topic labelling task in text documents.
Keywords: automatic topic labelling; ontology-driven topic labelling; dependency graph parsing; graph-based concept; frequent subgraph mining.
Impact of Enterprise Architecture Management (EAM) on Business Benefits through Information Technology Benefits in Companies in Indonesia
by Qorib Munajat, Nita Arryani Sari, Puspa Sandhyaduhita, Achmad Nizar Hidayanto, Kongkiti Phusavat
Abstract: This research aims to study the relationship between components of enterprise architecture management (EAM) and its impact towards IT benefits and business benefits. This research was conducted using quantitative approach involving 92 samples of state-owned enterprises and private enterprises. The data were processed using partial least square (PLS). The results showed that the EAM was proven to have positive correlations on the IT benefits especially towards IT efficiency and IT-business strategic alignment. Subsequently, IT benefits were proven to have positive correlations towards business benefits especially towards customer closeness and product leadership. It was also found that EAM has positive correlations on business benefits through IT benefits, especially towards operational excellence and strategic intelligence. Thus, it can be concluded that EAM can improve business performance through improved IT performance.
Keywords: Enterprise Architecture (EA); Enterprise Architecture Management (EAM); EA Benefit; Business Benefit; Information Technology (IT) Benefit.
Indicators in Process Improvement for Software Maintenance: A Systematic Review of the Literature
by Victor José Aguiar Teixeira De Melo França, Gislaine Camila Lapasini Leal, Renato Balancieri, Ana Rouiller
Abstract: The requirements of the software market make the organisations need mature processes capable of achieving quality and productivity demands, especially in organisations that deal with maintenance and evolution software. Several models and norms have emerged, which grouped recommendations for software process improvement, however, despite the effort of the technical-scientific community, there are still gaps. One of them is establishing guidelines for the measurement process in software maintenance companies. Based on a systematic review of the literature, this paper aims at identifying indicators, benefits and difficulties from the primary studies in the period of 20072017. 30 relevant articles were selected that addressed process improvement by focusing on measurement in maintenance organisations. As a result, a high measurement potential was seen to contribute to a better understanding of software maintenance, which may motivate necessary changes in processes and methods in order to assist and stimulate increasingly robust processes.
Keywords: Indicators; Software maintenance; Systematic review; Software Process Improvement.
Influence of Knowledge Management Enablers in Manufacturing Organizations: A Multi- Criteria Decision Making in Indian Context
by HITESHKUMAR SHAH, Ravi Kant
Abstract: This paper intends to examine the impact of knowledge management enablers (KMEs) for enhancing the organisational performance of Indian manufacturing organisations using integrated fuzzy analytic hierarchy process (AHP) and fuzzy multi-objective optimisation by the ratio analysis (MOORA)-based framework. The fuzzy AHP is used to obtain the weights of the KMEs, and fuzzy MOORA is used to rank the manufacturing organisations practicing knowledge management (KM). The applicability of the proposed framework approach is established with empirical case study of four Indian bearing manufacturing organisations. The finding suggests that better implementation of KMEs results into the improved KM performance which results into enhanced organisational performance. This study reveals that how KM practices in the organisation influence their organisational performance.
Keywords: AHP; Knowledge Management; KM; KMEs; MOORA.
The influence of text classification on facebook with AISAS method
by PORNPIMON KACHAMAS, Achara Chandrachai, Dr.Sukree Sinthupinyo
Abstract: Social media marketing has never been closely tied like it is now. Online marketing managers thus need to actively analyse and understand this fact beyond sentiments of the visitors of their webs. The objective is to comprehend emotions, feelings towards their threads and participation. This research aims to study the text classification that is used to analyse Dentsus AISAS patterns of posts in order to understand clients thinking. The study applies na
Keywords: Machine Learning; Naive-Bayes Classification; Social media; AISAS; Social Media Analytics.
Does the benevolence value matter when social media burnout strikes?
by Bo Han, Shih Yung Chou, Tree Chang
Abstract: Social media burnout has become a new issue to many users. This study introduces a new model to test if a users benevolence value can have a mediation effect when he/she experiences social media burnout. We recruited Facebook users from a student population at a US university to participate in a survey-based study. 290 valid and complete responses were received. The data analysis result shows that benevolence has a strong negative effect on a users social media burnout perceptions such as ambivalence and emotional exhaustion, and can significantly positively influence the users social media continuance. Our study is the first of its kind that integrates benevolence value into a users post-adoption experience research. The newly proposed model can help social media research community to gain more insights on the roles a users value plays in his/her perceptions and intentions in the post-adoption stage.
Keywords: social media burnout; value; benevolence; ambivalence; emotional exhaustion; depersonalization; conflict; Facebook.
Exploring the Change of Attitude among Healthcare Professionals toward Adopting a National Health Information System: The Case of Jordan
by Yazan Alnsour, Mohammad Alsharo, Ahmad Al-Aiad
Abstract: National health information systems (HISs) are spreading globally at a rapid pace. Therefore, it is important to understand the socio-technical factors that influence their adoption by healthcare professionals (HCPs). This study explores the change in attitudes of HCPs toward adopting a national HIS in Jordan. Data were collected from public hospitals and healthcare centres using surveys in two phases over two years and empirically tested using partial least squares (PLS). The first phase results showed that HCPs had positive attitudes toward the national HIS and perceived it to be useful but difficult to use. In the second phase, results showed that users attitudes positively changed regarding both ease of use and usefulness. This research contributes to both theory and practice by investigating how HCPs attitudes can be changed regarding adopting a national HIS over time. This provides insights for healthcare providers to better understand and improve HISs adoption among HCPs.
Keywords: national health information systems; health information systems adoption; healthcare professionals attitude; attitude change; technology acceptance model.
The determinants of electronic commerce in saving and credit cooperative societies: An empirical study from Kenya
by Evanson Karanja, Richard Odawa
Abstract: The study investigates determinants of electronic commerce within the context of Kenyan SACCOs. The study was conducted in Nairobi County and all the licensed SACCOs under (SASRA) Sacco Society Regulatory Authority in Kenya were included in the study. Key findings indicated that 76% of the companies can be classified as adopters. The implication here is that nearly three out of every four SACCOs have adopted at least one form of e-commerce to support their business operations. The key factors identified in the study to influence e-commerce adoption in the participating SACCOs were technology cost (88%), available budget (41%), and senior management support that were captured from about 25% of the respondents. From the study, two critical barriers to effective utilisation of e-commerce for SACCOs in their business operations are the conservative organisation cultures that can be summed up as resistant to change and lack of peerage on the industry standards.
Keywords: Electronic Commerce; Technology Adoption; Business Process; Diffusion of Innovation Theory.
Applying Data Mining Algorithms to Encourage Mental Health Disclosure in the Workplace
by Gonen Singer, Maya Golan
Abstract: The importance of sharing mental health issues with supervisors is well established. However, the decision to disclose such intimate information is complex and is influenced by many intrinsic and extrinsic variables. The purpose of this study is to use machine-learning algorithms to develop a tool that supervisors may use to enhance disclosure of mental health issues among their employees. Several interpretable machine-learning algorithms are established based on a Kaggle dataset of more than 1,400 participants that measures attitudes towards mental health and prevalence of mental health disorders in the tech workplace. The C4.5 algorithm is chosen as the best classifier of willingness to disclose a mental health disorder to supervisors, based on a variety of classification performance measures. Tailored intervention programs are applied and are shown to have the potential to increase the probability of disclosure by between 20% and 60%.
Keywords: Data Mining; Decision tree; Classification; Mental illness; Mental health disclosure.
IoT for Dynamic Information Systems: Concepts and Principles
by Khaled Sabry
Abstract: Adopting the internet of things (IoT) model for dynamic information systems (DIS) requires careful and comprehensive understanding of the technology, opportunities and challenges that may be encountered. IoT can be sought as an enabler and promoter for interactive and dynamic services for businesses. This paper explores and discusses IoT and its relevance to DIS. It explores such technology as a pivotal component of the next generation DIS that requires full understanding, looking at possible opportunities and challenges that may be encountered. The paper views IoT in the larger context of DIS through proposing an IoT-DIS conceptual model, so that influencing factors can better be recognised. It concludes with a reflection on IoT future directions and research.
Keywords: IoT; information systems; dynamic information systems; global system thinking; dynamic information systems ecosystem; next generation information systems; IoT dynamic model of computing.
AN EMPIRICAL ANALYSIS INVESTIGATING THE ADOPTION OF E-COMMERCE IN LIBYAN SMALL-MEDIUM ENTERPRISES
by Mansaf M. Elmansori, HAMED F. HAMED OMAR
Abstract: The research aim is to investigate behavioural intention of customers for e-commerce usage provided by the SMEs. The main challenge of the small and medium enterprises is to increase retention of customers by increasing their technology usage. A number performance problem in e-commerce stemmed customers choice of websites in meeting their transaction requirements. This becomes necessary in this study in order to improve business transaction via-commerce website which is fast, convenient and cheap. Users perception explains the intention to transact business online. This study followed the quantitative method and the sample frame contained of 296 questionnaires and the data was analysed using SEM. The finding of the study indicated that by allowing people to transact business online and make payment requiring personal information and account information of customers. This contribution of the current piece of research is a development of a new framework of e-commerce usage involving the factors related to trustworthiness and empirically validates by self-administered survey questionnaire amongst customers in Libya having experience of e-commerce usage provided by the enterprises.
Keywords: Behavioral Intention; SMEs; SEM; TAM; E-commerce; Libya.
What is inside the mind of teenagers on Instagram?
by Nur Rakhmawati, Irmasari Hafidz, Tetha Valianta, Azmi Pratama, Doddy Ridwandono, Lolanda Hamim Annisa
Abstract: Instagram is one of the most used social media with 45 million active users on each month. In Indonesia, the highest number of internet users is between the age of 1334 years old. It shows that most of the new internet users are young people. In this research, we create a topic model for the Instagram caption of teenager users in Surabaya, Indonesia, using latent dirichlet allocation (LDA) method. By using pen and paper questionnaire, we collected total number of Instagram 494 valid accounts with 4,664 captions. The data were collected from January 2014 to June 2017. The process of modelling using LDA was performed by experimenting with a set of number of topics: 2, 3, 4 and 5. The two topics were selected because it has a small value of perplexity, which indicates that the model has a good level of conformity. The two topics represents two categories: school and relationship. It was found that the topic model was dominated by the relationship category.
Keywords: Instagram; Captions; Topic Model; Teenager; Latent Dirichlet Allocation.
Examining Mobile Marketing Technology Adoption from an Evolutionary Process Perspective: The Study of UK Service SMEs
by Sunday Chinedu Eze, Vera C. Chinedu-Eze, Tony Nwanji, Adenike O. Bello
Abstract: This paper attempts to examine mobile marketing technology adoption research and practice in small and medium enterprises (SMEs) from an evolutionary and dynamic process perspective using the concept of dynamic capabilities (CDCs). This study adopted a qualitative method to explore how small services oriented SMEs regularly engage in mobile marketing technology adoption. Two stages of interviews (unstructured and semi-structured) were carried out with a total of 26 interviewees. Data collected from the interviews were analysed using a thematic approach to understand the evolutionary and dynamic nature of the mobile marketing technology adoption process, entities involved and how they interact. The findings revealed the reiterative and the evolutionary nature of mobile marketing technology adoption and the continuous interactions and negotiations of numerous entities in the process, underpinned by the concept of dynamic capabilities and validated by the empirical data. The study developed a framework depicting the process of mobile marketing technology adoption, significant activities and entities involved in the process. The study advances mobile marketing technology adoption research and practice by developing a framework that describes the interactive, dynamic and evolutionary nature of mobile marketing technology adoption, entities associated with the framework and their interactions in the process.
Keywords: Mobile marketing; technology adoption; Dynamic Capabilities; SMEs; qualitative approach.
Mobile word of mouth (mWOM) in mobile messaging applications: An exploration of its antecedents and consequences
by Fulya Acikgoz, Ismail Erkan, Mushfiqur Rahman, Nisa Akin, Abdulaziz Elwalda
Abstract: The emergence of mobile communication has resulted in many messaging applications (e.g., WhatsApp, Line, Telegram, Viber). Such applications enable consumers to make brand related conversations; this process being called mobile word of mouth (m-WOM). Yet, both consumers and mobile message application providers are not fully conversant with the antecedents and consequences of mobile word of mouth (m-WOM). Therefore, the purpose of this research is to explore both the antecedents and consequences of mobile word of mouth (m-WOM) in mobile messaging applications. With this aim, we have developed a theoretical framework of m-WOM by applying information credibility, trust, and attitude, which were considered to be the most robust components, to understand consumer behaviours. In this study, an online survey of 385 respondents was conducted by using structural equation modelling (SEM). The theoretical model developed in this study enables a deeper understanding of m-WOM for future research purposes.
Keywords: mobile word of mouth (mWOM); messaging applications; WhatsApp; mobile purchase intention.
Adoption of mobile fitness and dietary apps in India: an empirical study
by Brinda Sampat, Bala Prabhakar, Nilay Yajnik, Ashu Sharma
Abstract: The use of mobile health (m-health) applications (apps) to provide healthcare services is on the rise in developing countries. However, their adoption in India is in its infancy. There is a rise in non-communicable diseases in India due to urbanisation, sedentary lifestyles and changing diets. Mobile fitness and dietary (MF&D) apps provide various features that can help promote healthy living. The purpose of this paper is to develop and empirically test a conceptual model by extending technology acceptance model (TAM) to establish how factors such as trust, social influence and perceived behavioural control influence the adoption of MF&D apps. A conceptual model with the hypothesised causal paths among the constructs have been empirically validated with the help of structural equation modelling (SEM) using AMOS with a sample of 234 MF&D app users. Results reveal perceived usefulness and trust are the most important factors that lead to adoption of MF&D apps.
Keywords: mHealth; mobile fitness dietary apps; Technology Acceptance Model; TAM; Trust; Social Influence; Perceived Behavioural Control; developing countries; India.
Examining the Influence of Antecedents of Continuous Intention to Use an Informational App: The Role of Perceived Usefulness and Perceived Ease of Use
by T. Sai Vijay, Priyanka Gupta, Chandan Parsad, Sanjeeve Prashar
Abstract: The 4G revolution has enhanced smartphone penetration by 21.3%. Subsequently, the rapid expansion of different categories of mobile applications has changed the way consumers think, exchange information, shop, play games, and connect socially. This study, based on information mobile applications (apps), aims to predict and identify the specific antecedents that influence consumers to use an information app on a continuous basis, with the mediating effects of perceived usefulness and ease of use. Using structural equation modelling, causal analysis found relationships between perceived usefulness and interactivity and between perceived ease of use and information quality, system quality, and interactivity. Moreover, both mediating variables lead to continuous intention to use the app. The paper concludes with practical implications for m-commerce users.
Keywords: Mobile application; Perceived usefulness; Perceived ease of use; Information quality; System quality; Continuous intention to use.
A survey of XBRL adoption impact on financial software development processes and software quality
by Marcelo Cerqueira, Paulo Caetano
Abstract: XBRL technology is currently used by several government institutions and companies around the world. The literature includes many papers related to the uses and benefits of XBRL in the areas of finance and accounting. However, there is a research gap on its benefits to software engineering. This paper seeks to identify the XBRL impacts on financial software development processes and software quality factors. Identifying such impacts may help software development companies better understand the advantages related to XBRL use and increase the adoption in other companies. This, in turn, may contribute to software quality improvement, facilitating the implementation of better financial software development frameworks in organisations.
Keywords: Software Process; Software Quality Factors; Software Engineering; XBRL; Multidimensional Data Metamodel.
Recent themes in social media research: A systematic review
by RAHUL BODHI, Tripti Singh, Subiya Rahman
Abstract: Social media is emerging as an essential media for communication both at the personal and organisational level. The present paper applies a systematic literature review methodology for identification of relevant articles in the area of social media and generational cohorts. The objective is to undertake a thematic review, recognise issues related to social media to identify research gaps and thus draft an agenda for future studies. The main concentration of research has been related to utilities and functions of social media, personal, workplace, and social aspects, and usage pattern of social media by generational cohorts. It establishes that social media is recognised not only because of its advantages but also certain negative aspects which have an effect on both physical and mental well-being of individuals. Thus, the main area of concern is to formulate as well as implement appropriate policies and programs for its effectiveness. Suggestions are based on reviewed articles for future studies.
Keywords: Generation; Social Networking; Research agenda; Thematic Analysis.
Towards a Trustworthy RFID System
by Yanjun Zuo
Abstract: This paper presents a comprehensive, layered framework for a trustworthy radio frequency identification (RFID) system, which has been applied in various fields such as supply chain management, inventory tracking, healthcare, transportation and logistics, manufacturing, library, agriculture, payment and asset management. RFID provides real-time data and analytics, which allow organisations to have more accurate information at all time for improved decision making. Our proposed framework addresses technical challenges of building trustworthy RFID systems given the resource-constricted RFID components as well as high mobility and sensitivity of RFID devices. The framework offers the following merits: 1) it can be used in vastly distributed environment to support large scope RFID-enabled business processes; 2) it is appropriate for resource-restricted RFID system components; 3) it provides users with the most trustworthy information about RFID tagged items despite malicious attacks; 4) it can tolerate attacks at RFID system level and higher-application level.
Keywords: RFID; trustworthy; security; business activity; threat.
An Exploratory Study of the Information Security Awareness of Business School Students in UAE
by Saadat Alhashmi
Abstract: The objective of this paper is to understand the status of information security awareness among business school students in the Middle East. Based on the literature review, the authors developed a questionnaire to understand the attitude of business college students about information security. Universities and companies, especially in the Middle East, can identify the awareness level of students. This is an ongoing work and needs a better understanding of how future-leaders of business look at this serious issue. Besides universities, firms must, therefore, manage these concerns and opportunities promptly. Overall, the empirical results show that the impact of technology and awareness coefficients is insignificant while students are comfortable answering technology and fraud related issues.
Keywords: Fraud; Technology Use; Training; Impact of Technology.
Profit Maximization in Long-Term e-Service Agreements
by Zaki Malik, Hussain Aljafer, Khayyam Hashmi, M. Mustafa Rafique
Abstract: Due to the wide spread use of web-based services, there is competition among service providers to attract the highest number of users either by the competitive pricing of the services, by performance of the services, or both. In this paper, we address this matter by proposing a web service pricing model for the service providers to help generate the highest profit. We dynamically alter the price, based on the market equilibrium techniques to achieve the maximum resource distribution. Our approach also tackles the problem of resources that have low or no demand by the users, by generating bundles such that these resources can be distributed, and generate more profit. Finally, the approach utilises an automated negotiation mechanism for service replacement where we may have an offer from a new user resulting in more profit, but there are not enough resources.
Keywords: Web service; long-term profit; service-level agreement; information system.
Modelling and Predicting Students Academic Performance Using Classification Data Mining Techniques
by Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Kamal Uddin Sarker, Ali Abbas
Abstract: This study focuses on student success analysis and prediction modelling improving the quality in terms of teaching, delivery and satisfaction. Data mining techniques are used to analysis and prediction the performance of the student in the specific module or within the timeline of the studies. Supervised learning approach has been adopted with different classification models were tested against the dataset distributed over different levels of study and specialisations. Student grades and online activity on the learning management system were considered as the factors to construct the classifying model. In this study, different algorithms were tested for efficiency and accuracy with the provided dataset for better prediction using WEKA. Random forest was found better and accurate in predicting the students academic performance. Employing these techniques, it will lead to student preservation and strive for better student satisfaction.
Keywords: Student Prediction; Learning Management System; WEKA; Data Mining; Student Performance; Decision Tree; Virtual Learning Environment; Classification.
Ontological Practice for Software Quality Control
by Kamal Uddin Sarker, Aziz Deraman, Raza Hasan
Abstract: Recent statistical report on software project has been reflected the significant software project failure rate is existed till now. Failure can be partial, complete or compromising in functional or non-functional factors. The EBSPM public software project data repository has been analysed to reflect the relationship among cost, time, effective hours and functional points to identify eternal influencing factors. The literature review has identified the root causes of failure. Software quality control is a formal approach to make the project successful but until now ambiguous with the integration of quality factors. Our proposed ontology reduces the complexity of project management. This research has established the way of developing an ontology by including maximum quality factors. The way of collaborative working is included in the ontology to ensure formal, transparent, accountable and responsible manner. The ontology model is developed with descriptive logic and diagrams. Theoretical evaluation has been done at the end of the research based on the criteria of standardisation organisations.
Keywords: Software project failure rate; understanding project failure; project failure reasons; ontology; software quality control; descriptive logic.
Factors Influencing Electronic Banking Continuance Usage Intention in Developing Economies: A Study of Nigeria
by Fowokemi Ogedengbe, Yurita Yakimin Abdul Talib
Abstract: The purpose of this study is to examine the factors that determine bank customers satisfaction and continuance usage intention of electronic banking (e-banking). Using the expectation-confirmation model (ECM), the study developed a theoretical framework to explain how bank customers develop their satisfaction and intention to continue use the e-banking. To test the proposed model, the authors test its validity on data collected from Nigerian students in a public University. The result indicates that confirmation of expectation influences e-banking users satisfaction. Perceived privacy and satisfaction are factors that influence users continuance usage behaviour while perceived security and perceived privacy do not have an impact on users satisfaction. Moreover, the study finds out that perceived security does not have an influence on continuance usage behaviour of e-banking users.
Keywords: Nigeria; Continuance Usage; E-banking; Perceived Security; Perceived Privacy; Confirmation; Satisfaction.
Strategic information systems planning in Kingdom of Bahrain: factors and impact of adoption
by Jaflah Hassan Al-Ammary, Sara Al-Doseri, Zahra Al-Blushi, Noor Al-Blushi, Manar Aman
Abstract: SISP in most of the Arabian countries is merely tackled to plan for resources allocation and project-based planning without considering the strategic role of IT in achieving the business goals. Therefore, the current research tackled to investigate the current situation regarding the adoption of SISP in the Kingdom of Bahrain. Moreover, the influence of the internal and external factors on the adoption of SISP as well as the impact of such strategic planning on the organisation competitive advantage was explored. Four hundred surveys were distributed to different levels of management from selected sectors in Kingdom of Bahrain. The results identified many indications on the importance of SISP and its positive perception on the impact of SISP in supporting the business strategy and improving the organisation overall performance. Such results will encourage more efforts in developing SISP in order to enhance the strategic role of IT and gains more sustainable competitive advantage.
Keywords: strategic information systems planning SISP; top management involvement; external environment; IT and business alignment; competitive advantage; social pressure; Kingdom of Bahrain.
Role of electronic word of mouth on purchase intention
by Wajeeha Aslam, Kashif Farhat, Imtiaz Arif
Abstract: The purpose of this study is to explore the impact of electronic word of mouth (Ewom) on brand image (BIM) and customer satisfaction (CS) and their impact on purchase intention (PI). Impact of online websites (OWs) on Ewom and impact of receiver's perspective (RP) on CS and BIM was also checked. A Likert scale questionnaire was used to gather the responses of 253 and then was tested empirically. The study finds out the positive impact of Ewom and RP on CS and BIM. Also, CS and BIM have a significant impact on PI. Result also confirms that OW has a positive impact on Ewom. This research explains theory of stimulus- organism- response paradigm to identify the impact of Ewom which effect BIM and CS in online and technological generation. The paper provides valuable information to marketers that how quality website generates positive word of mouth which leads to purchase intention.
Keywords: electronic word of mouth; Ewom; brand image; customer satisfaction; social media; online websites; receiver's perspective; purchase intention; technology.
Impact of technology evolution on the materialised views: current issues and future trends
by Abderrazak Sebaa, Amina Nouicer, Abdelkamel Tari
Abstract: To improve query performance materialised views were largely used for such purpose. So far, this technique has been a success as testified by the large and increasing interest among industrial and research communities in the use of this technique. In this paper, we investigate the related issues of materialised views and the most important solutions and framework of the literature review. Then, we explore the information technology impact on the evolution of materialised view applications, related environments and data models. Finally, we summarise the opportunities and future challenges caused by combination and trends of such evolution.
Keywords: materialised view; view selection; view maintenance; data models; application; web; data warehouse; database; query; information technology.
Building federated data warehouse schema using web service approach
by Nouha Arfaoui, Faîçal Felhi, Jalel Akaichi
Abstract: The data warehouse is considered as a repository that stores data from disparate sources. It is used mainly in the process of decision making. Because of the diversity of the applications, their heterogeneity and their physical spacing, building a data warehouse, to make decisions in a federated architecture, is a very complicated task. To overcome this problem, we propose a new approach for the design of a federated data warehouse schema based on the web services. The latter are applied because of their capacity to solve many technical problems related to the integration of data source in a federated environment. The proposed solution is based on the bottom-up approach where the data warehouse schema is generated from the set schemas of the data mart. It is composed by two steps. In the first one, a web service is used to generate the schemas of the data mart one for each data source. In the second step, a second web service is used to merge the generated schemas to build the final schema of the data warehouse.
Keywords: federated architecture; federated data warehouse schema; data mart schema; web service; schema integration; schema merging.
Defining one product data for a product
by Risto Silvola, Arto Tolonen, Janne Harkonen, Harri Haapasalo, Tarja Mannisto
Abstract: The growing importance of product data management and master data necessitate companies to have practices for deriving product master data from their corporate strategy. Business drivers need to be understood from the perspective of corporate strategy to capture product master data in relevant systems in a straightforward manner. Ideally master data is created only once and used through the life-cycle of the product. This study clarifies the foundations for determining one product data from corporate strategy. Data definitions are analysed to understand its linkages to business drivers, whereas main business processes are used to support categorisation. The practices of three companies are analysed to understand how business drivers for new products impact product data requirements. The results highlight the importance of business drivers in defining one product data based on the product master data, business-process related product data and IT systems over the product life-cycle.
Keywords: one product data; product data; product master data; master data management; strategy; IT systems; business information systems; product life-cycle; business processes.