us

A Methodology for Increasing Business Process Maturity in Public Sector




us

An Evolutionary Software Project Management Maturity Model for Mauritius




us

Criteria for the Evaluation of Business Process Simulation Tools




us

Experiences in Building and Using Decision-Support Systems in Postgraduate University Courses




us

Expectancy Theory and Behavioral Intentions to Use Computer Applications




us

From Tailored Databases to Wikis: Using Emerging Technologies to Work Together More Efficiently




us

Performance Attributions: A Cross Cultural Study Comparing Singapore, Japan and US Companies




us

An Improved SMS User Interface Result Checking System




us

User Acceptance of the E-Government Services in Malaysia: Structural Equation Modelling Approach




us

Pedagogy for Mobile ICT Learning Using Video-Conferencing Technology




us

Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL)




us

Discovering Interesting Association Rules in the Web Log Usage Data




us

Factors Determining the Balance between Online and Face-to-Face Teaching: An Analysis using Actor-Network Theory




us

Transaction Flow in Card Payment Systems Using Mobile Agents




us

Using Research Techniques to Teach Management of IT Concepts to Postgraduate Business Students




us

Examining a Flow-Usage Model to Understand MultiMedia-Based Learning




us

The Use of ICT for Economic Development in the Silesian Region in Poland




us

Web Usage Association Rule Mining System




us

Using eTechnologies for Active Learning




us

(GbL #3) Innovative Teaching Using Simulation and Virtual Environments




us

Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland




us

Determinants of Intent to Continue Using Online Learning: A Tale of Two Universities




us

The Influence of User Efficacy and Expectation on Actual System Use




us

A Knowledge Integration Methodology for Developing Customized Maintenance Documents




us

The Impact of Business Intelligence on Healthcare Delivery in the USA




us

An Examination of Home Internet and Mobile Device Use in the U.S.




us

How the Use of ICT can Contribute to a Misleading Picture of Conditions – A Five-Step Process

This paper contributes to the limited research on roles ICT can play in impression-management strategies and is based on case studies done in the Swedish Police. It also gives a theoretical contribution by adopting a holistic approach to explain how ICT can contribute to giving a misleading picture of conditions. Output generated by ICT has nowadays a central role in follow-up activities and decision-making. Even if this type of output, often in colourful, presentable, graphical arrangements, gives the impression of being accurate and reliable there is a risk of defective data quality. The phenomena can be described as a process divided into five steps. The first step is about how the data is generated and/or collected. The second step is linked to how the data is registered. The third step is about the output generated from the ICT-systems. The fourth step is how the output of ICT is selected for presentation. The fifth step concerns how output generated by ICT is interpreted. This paper shows that ICT can easily be used in impression-management strategies. For example, that personnel take shortcuts to affect the statistics rather than applying methods that may give the desired effects.




us

Employees’ Involuntary Non-Use of ICT Influenced by Power Differences: A Case Study with the Grounded Theory Approach

Power differences affect implementation of information and communication technology (ICT) in a way that creates differences in ICT use. Involuntary non-use of new ICT at work occurs when employees want to use the new technology, but are unable to due to factors beyond their control. Findings from an in-depth qualitative study show how involuntary non-use of new ICT can be attributed to power differences between occupational groups in the same organization. The findings suggest that experience is a moderating variable and that closeness to formal power holders as well as closeness to the new technology increases the probability for expert control of the ICT-organization processes. These power differences favor ICT experts over ICT novices and result in a high-quality learning environment for the ICT experts characterized by autonomy, inclusion, and adequate work processes and technological solutions. The ICT novices try to navigate in a learning-hostile work environment characterized by marginalization through expert control, isolation, and inadequate work processes and technological solutions. This led to involuntary non-use by the ICT novices, while the experts became more proficient in ICT use. These findings give managers facing a technological organizational change tools to understand important mechanisms for implementing the change in their own organization, and help them take the right actions to integrate new technology and new organization of work.




us

Intention to Use and Satisfaction of e-Learning for Training in the Corporate Context

Together, the fields of education and information technology have identified the need for an online solution to training. The introduction of e-learning has optimised the learning process, allowing organisations to realise the many advantages that e-learning offers. The importance of user involvement in the success of e-learning makes it imperative that the forces driving intention to use e-learning and satisfaction thereof be determined. The purpose of this paper is to investigate the relationships between the metrics influencing intention to use and the satisfaction of using e-learning in companies. The results of a survey distributed amongst a South African software development company’s customer base revealed that the 94 respondents have positive enjoyment and self-efficacy levels, and low computer anxiety levels. Correlation analysis revealed significant relationships between enjoyment and self-efficacy and between enjoyment and satisfaction. Companies should therefore ensure that users enjoy using e-learning as it can directly influence satisfaction and self-efficacy.




us

Does Usability Matter? An Analysis of the Impact of Usability on Technology Acceptance in ERP Settings

Though the field of management information systems, as a sector and a discipline, is the inventor of many guidelines and models, it appears to be a slow runner on practical implications of interface usability. This usability can influence end users’ attitude and behavior to use IT. The purpose of this paper was to examine the interface usability of a popular Enterprise Resource Planning (ERP) software system, SAP, and to identify related issues and implications to the Technology Acceptance Model (TAM). A survey was conducted of 112 SAP ERP users from an organization in the heavy metal industry in Bangladesh. The partial least squares technique was used to analyze the survey data. The survey findings empirically confirmed that interface usability has a significant impact on users’ perceptions of usefulness and ease of use which ultimately affects attitudes and intention to use the ERP software. The research model extends the TAM by incorporating three criteria of interface usability. It is the first known study to investigate usability criteria as an extension of TAM.




us

Facilitating mCommerce Growth in Nigeria through mMoney Usage: A Preliminary Analysis

A general belief is that Mobile Money (mMoney) has the catalytic effect of spurring mCommerce growth and driving financial inclusion in developing nations like Nigeria. In Nigeria, mMoney service is certainly a new financial service innovation in the country, and as a result critical issues surrounding its early critical mass adoption, including its perceived usefulness, remain largely opaque. In this paper, our aim was to explore factors influencing perceived usefulness of mMoney by using the extended technology acceptance model (TAM) as the theoretical underpinning of our work. This work is based on a usable sample of 127 respondents from two major cities in Nigeria. Overall, the study’s results indicate that perceived regulator assurance, service affordability, convenience, proximity to the nearest bank branch, and worry over ease of use are significant predictors of mMoney perceived usefulness. The work helps shed new insights about the significant factors that are closely related to the consumer’s perception of the relevance of mMoney services (to his/her financial needs). In sum, the study is an initial step to addressing the issue of perceived usefulness of mMoney service, including its pivotal importance to laying a solid foundation for mCommerce growth in Nigeria and similar sub-Saharan African (SSA) coun-tries.




us

Factors Affecting the Adoption and Usage of ICTs within Polish Households

Information and communication technologies (ICTs) encompassing computer and network hardware and software, and so on, as well as various services and applications associated with them, are assuming a growing presence within the modern homestead and have an indelible impact on the professional and everyday life of people. This research aims to explore factors influencing the successful adoption and usage of ICTs within Polish households. Based on prior literature and practical experiences, a framework of success factors is provided. The required data was collected from a survey questionnaire administered to a sample of Polish households to examine this framework and identifies which factors are of greatest importance for the adoption and usage of ICTs within households in Poland. Based on 751 questionnaires the paper indicates that the adoption of ICTs within households is mainly influenced by the economic status of households and cost of ICTs, perceived economic benefits from the usage of ICTs, technological availability and security of ICTs, ICT competences and awareness, as well as satisfaction with the adoption of ICTs. Furthermore, gender, education, and place of residence do not reflect significant differences on the factors. Yet, there are significant differences among the factors that could be attributed to age. Both, policy makers and ICT providers can benefit from the findings with regard to bridging the gap of ICT adoption and use in the Polish households.




us

External Variables as Antecedents of Users Perception in Virtual Library Usage

Several studies extended the Technology Acceptance Model (TAM) by examining the antecedents of perceived usefulness and perceived ease of use; the present study looks at demographic aspect of external variables in virtual library use among undergraduate students. The purpose of this study is to identify the demographic factors sex, level of study, cumulative grade point average, and computer knowledge that act as external factors that are antecedents of perceived usefulness and perceived ease of use. The university management makes a large investment in the provision of a virtual library; investigation of the virtual library acceptance by students is important. TAM and theory of reasoned action (TRA) are utilised to theoretically test a model for the extension and to predict virtual library acceptance and usage. In a survey study, data was collected by using a structured questionnaire given to 394 randomly selected participants in a private university. Data were analysed by Pearson product moment correlation, multiple and hierarchical regression. The result of the study is consistent with TAM factors examined for explaining virtual library usage. The extension model accounts for 2.5% variance in perceived usefulness, 2.1% in perceived ease of use, 11.7% - 15.2% on intention to use and 7.2% on actual use of virtual library. Implications of the findings of the study on user’s virtual library training are discussed.




us

An Empirical Examination of Customers’ Mobile Phone Experience and Awareness of Mobile Banking Services in Mobile Banking in Saudi Arabia

Aim/Purpose: This work aims to understand why a disparity between the popularity of smart phones and the limited adoption of m-banking exists. Accordingly, this study investigates factors that affect a person’s decision to adopt m-banking services. Such an investigation seeks to determine if and to what extent customers’ mobile phone experience as well as their awareness of m-banking services influence their intention to use such services? Background: This study developed a conceptual model to determine the influence that users’ mobile phone experience as well as users’ awareness of m-banking services had on users’ behavioral intention to use m-banking in Saudi Arabia. Methodology: The quantitative method used to collect data was a survey questionnaire tech-nique. A questionnaire with non-structured (close-ended) questions was formulated. A random sample, targeting banking customers in Saudi Arabia, was selected. This study collected data using a cross-sectional survey. Of those surveyed, 389 provided valid responses eligible for data analysis. SPSS v.22 was used to analyze the data. Contribution: This study produced helpful results and a new m-banking conceptual model. The developed conceptual model focused integrally on users’ awareness and experience as antecedents of m-banking adoption and highlighted the im-portance of differentiating between measuring the users’ characteristics in adopting e-banking in general and m-banking services in particular. In addition, this type of model has the ability to synthesize new control variables as well as to study technology acceptance in developing countries. This study, based on an extended UTAUT model, set out to discover what factors might affect customers’ intentions to use m-banking in Saudi Arabia. Findings: The results show that service awareness has a direct effect on performance and effort expectancy, but not on perceived risk. Moreover, mobile phone experience fails to impact the relationships in the same hypothesized direction. As anticipated, performance expectancy, effort expectancy, and perceived risk have direct and significant effects on behavioral intentions to use m-banking. However, customer awareness fails to impact the relationships of performance expectancy, effort expectancy, and perceived risk on behavioral intentions to use m-banking. Recommendations for Practitioners: Banks should target customers by distributing useful information and applying measures to increase acceptance. Banks need to introduce something imaginative to convince bank customers to abandon existing service channels and adopt m-banking services. Banks should make m-banking services the easiest service for conducting bank transactions and/or help customers conduct transactions that they cannot do any other way. Recommendation for Researchers: Other factors, such as trust, culture, and/or credibility should be investigated along with user’s awareness and experience factors in m-banking services. There is a need to focus on a specific type of m-banking. Thus, it may be fruitful to study the adoption of different systems of m-banking services. Impact on Society: This study suggests that m-banking services should be designed and built based on a deep understanding of customers’ needs using extensive testing to assure that applications and sites function well in a mobile setting. Future Research: Future researchers should apply the conceptual model developed in this study in different settings, different countries, and to different technologies.




us

Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries

Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries.




us

Reasons for Poor Acceptance of Web-Based Learning using an LMS and VLE in Ghana

Aim/Purpose: This study investigates the factors that affect the post implementation success of a web-based learning management system at the University of Professional Studies, Accra (UPSA). Background: UPSA implemented an LMS to blend Web-based learning environment with the traditional methods of education to enable working students to acquire education. Methodology: An explanatory sequential mixed method was adopted, under the pragmatic paradigm, to investigate the level of acceptance of web-based learning by students. The effects of perceived usefulness, perceived ease of use, and other social factors were investigated. In all, 4500 final and third-year undergraduate students of UPSA made up the population. A sample size of 870 was used for this study. Contribution: This paper contributes to the body of knowledge by identifying the factors that hinder post-implementation of LMS at the tertiary level in Ghana and adds to the general literature available. Findings: The level of acceptance of LMS seems very low due to poor IT infrastructure, inadequate training, and the relevance of the system to quality lecture delivery. However, students’ intention to use LMS and the usefulness of LMS were perceived to be high, especially among students in higher levels. Recommendations for Practitioners: The authors recommend that IT infrastructure, especially reliable and fast internet connectivity, and adequate training should be provided. Recommendation for Researchers: Further research should be done to confirm if the provision of a more reliable internet system will boost students’ internet proficiency, which in turn will improve their utilisation of the LMS. Impact on Society: Help create awareness of schooling while pursuing a career and also improve interactions between students and lecturers. It will also improve enrolment and possibly reduce the cost of education in the long-run. Future Research: Researchers can look at the possibility of implementing total virtual learning systems at the tertiary level in Ghana.




us

ICT-Platform to Transform Car Dealerships to Regional Providers of Sustainable Mobility Services

Aim/Purpose: The topic of this study is the ICT-enabled transformation of car dealerships to regional providers of sustainable mobility (e.g., car sharing). Background: Car dealerships offer specific conditions that enable a sustainable mobility offer, based on individual motorized transport like car sharing. This is especially useful in small towns or rural areas where people’s mobility is strongly dominated by private cars, and public transport coverage is limited. However, these new mobility services are combined services with the need of a deep integration of information systems, and these services are not yet related to car dealerships and customer acquisition has to be supported. Methodology: An empirical study with an inductive approach was chosen. The study consists of interviews with three focus groups of different stakeholders of car dealerships. Within the frame of the research project, “ReCaB – Regional Car-Balancing” a qualitative research approach was chosen. Within a design science approach the existing SusCRM architecture was adapted based on the elaborated requirements. Contribution: A software architecture is proposed, where Customer Relationship Management (CRM) components to market new sustainable mobility offers are vital parts and existing information systems of car dealerships are integrated. Findings: The basic feasibility of the establishment and customer acceptance has been demonstrated, at least in the area of car sharing within ReCaB. The execution in the car sharing field has already started and a number of car dealerships are already bringing their own offers to market. Major findings for the SusCRM architecture have been elaborated in a design science approach in the national German research project “Showcase for electro mobility”. Recommendations for Practitioners: There is still no fully functional prototype developed for this specific use case and evaluated in the car dealership environment. An implementation only, based on own efforts, is difficult for car dealerships because of the dealership’s lack of know-how as well as tight IT budgets. However, this approach appears particularly successful in rural areas where public transport services are heavily declining. For full implementation, the presented ICT support is imperative. Recommendation for Researchers: The research on the retailer level, especially in combination with a digital trans-formation by the use of ICT systems, is still fragmentary. Research in this area that both addresses sustainability goals on a general level and supports economical goals on the company level of automotive retailers would be useful. Impact on Society: Creation of sustainable offers as a substitute or supplement for mobility based on their own car is a promising way to reduce negative effects of mobility. Enhancement of the mobility of the people in rural areas is leading to a more active lifestyle by reaching the leisure facilities, workplaces and educational institutions in a sustainable manner. Future Research: In terms of the fast changing mobility landscape, especially on a technical level with the development of autonomous vehicles and digitalization of entire businesses new solutions are becoming accessible, that have to be integrated in further research.




us

Factors Affecting Re-usage Intentions of Virtual Communities Supporting Cosmetic Products

Aim/Purpose: This study uses a cosmetic virtual community (VC) as the research context and the UTAUT model as the theoretical structure aim to explore factors affecting the re-usage intentions of VC members. Background: The Internet use rate of VC was up to 50%, thereby implying that VC gained the attention of Internet users. Therefore, operating a VC will be an effective way to communicate with customers. However, to maintain an existing member is more efficient than creating a new one. As such, understanding determinants of VC members’ re-use intentions becomes important for firms. Methodology: Through an online survey, 276 valid responses were gathered. The collected data were examined by performing confirmatory factor analysis, structural equation modelling procedures, as well as the moderator analysis. Contribution: This study shows the importance in the context of online cosmetics-related VC, which was rarely explored before. We provide issues for future research, despite the accumulated academic literature related to UTAUT and VC. Findings: Results show that only performance expectancy and social influence significantly affecting re-usage intentions and only gender has moderating effects on the path from performance expectancy to VC re-use intention and from trust to VC re-use intention. Recommendations for Practitioners : This study found that users emphasized performance expectancy most of all. A cosmetic product-related VC should introduce products abundantly, offer useful information, and help people accomplish tasks quickly and productively. Recommendation for Researchers: Future researchers may use our findings to conduct further positivist research in the area of social influence using different subjects and research contexts.




us

Socio-Technical Approach, Decision-Making Environment, and Sustainable Performance: Role of ERP Systems

Aim/Purpose: This explanatory study aimed to determine the mediating role of ERP in the relation between the effect of a socio-technical approach and decision-making environment, and firms’ sustainable performance. Background: Although earlier studies have discussed the critical success factors of the failure or success of an ERP system and the extent to which it achieves its desired objectives, the current study focused on the significant impact of socio-technical elements and decision-making environment on the success of the ERP system (i.e., sustainable performance). In addition, the lack of research on ERP as a mediator in the above relationship motivated this study to bridge the literature gap. Methodology: The data was collected using questionnaires distributed to 233 randomly selected employees of three multinational companies (BP, LUKOIL, and Eni) operating in Iraq. The structural equation modeling was employed to test the hypothesized relationships. Contribution: The study contributes to the literature by examining the mediating role of the ERP system in the relationship between socio-technical elements and the decision-making environment, as well as, the moderating role of organizational culture in the relationship between socio-technical elements and ERP systems. Findings: The results showed that ERP is a significant mediator between the linkage of socio-technical elements and the decision-making environment while organizational culture has an insignificant moderating role in the relationship between socio-technical elements and ERP systems. Recommendations for Practitioners: In a developing country like Iraq, there is a need to implement ERP to achieve better sustainable performance through change management and organizational development that ultimately work towards enhancing individual capabilities, knowledge, and training. Recommendation for Researchers: The researchers are recommended to conduct an in-depth study of the phenomenon based on theoretical and empirical grounds, particularly in light of the relationship of socio-technical elements and decision-making environments. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in using ERP systems to minimize pollution in Iraqi context. Future Research: A more in-depth study can be performed using a bigger sample, which not only includes the oil industry but also the other industries.




us

Predicting the Adoption of Social Media: An Integrated Model and Empirical Study on Facebook Usage

Aim/Purpose: This study aims at (1) extending an existing theoretical framework to gain a deeper understanding of the technology acceptance process, notably of the Facebook social network in an unexplored Middle East context, (2) investigating the influence of social support theory on Facebook adoption outside the work context, (3) validating the effectiveness of the proposed research model for enhancing Facebook adoption, and (4) determining the effect of individual differences (gender, age, experience, and educational level) amongst Facebook users on the associated path between the proposed model constructs. Background: Social networking sites (SNSs) are widely adopted to facilitate social interaction in the Web-based medium. As such, this present work contends that there is a gap in the existing literature, particularly in the Middle East context, as regards an empirical investigation of the relationship between the social, psychological, individual, and cognitive constructs potentially affecting users’ intention to accept SNSs. The present research, therefore, attempts to address this deficit. The relevance of this work is also considered in light of the scarcity of empirical evidence and lack of detailed research on the effect of social support theory with regard to SNS adoption in a non-work context. Methodology: A quantitative research approach was adopted for this study. The corresponding analysis was carried out based on structural equation modelling (SEM), more specifically, partial least squares (PLS), using SmartPLS software. Earlier research recommended the PLS approach for exploratory studies when extending an existing model or developing a new theory. PLS is also a superior method of complex causal modelling. Moreover, a multi-group analysis technique was adopted to investigate the moderating influence of individual differences. This method divides the dataset into two groups and then computes the cause and effect relationships between the research model variables for each set. The analysis of an in-person survey with a sample of Facebook users (N=369) subsequently suggested four significant predictors of continuous Facebook use. Contribution: This study contributes to the body of knowledge relating to SNSs by providing empirical evidence of constructs that influence Facebook acceptance in the case of a developing country. It raises awareness of antecedents of Facebook acceptance at a time when SNSs are widely used in Arab nations and worldwide. It also contributes to previous literature on the effectiveness of the unified theory of acceptance and use of technology (UTAUT) in different cultural contexts. Another significant contribution of this study is that it has reported on the relevance of social support theory to Facebook adoption, with this theory demonstrating a significant and direct ability to predict Facebook acceptance. Finally, the present research identified the significant moderating effect of individual differences on the associated path between the proposed model constructs. This means that regardless of technological development, individual gaps still appeared to exist among users. Findings: The findings suggested four significant predictors of continuous Facebook use, namely, (a) performance expectancy, (b) peer support, (c) family support, and (d) perceived playfulness. Furthermore, behavioral intention and facilitating conditions were found to be significant determinants of actual Facebook use, while individual differences were shown to moderate the path strength between several variables in the proposed research model. Recommendations for Practitioners: The results of the present study make practical contributions to SNS organizations. For example, this research revealed that users do not adopt Facebook because of its usefulness alone; instead, users’ acceptance is developed through a sequence of variables such as individual differences, psychological factors, and social and organizational beliefs. Accordingly, social media organizations should not consider only strategies that apply to just one context, but also to other contexts characterized by different beliefs, perceptions, and cultures. Moreover, the evidence provided here is that social support theory has a significant influence on SNSs acceptance. This suggests that social media organizations should provide services to support this concept. Furthermore, the significant positive effect of perceived playfulness on the intention to use SNSs implied that designers and organizations should pay further attention to the entertainment services provided by social networks. Recommendation for Researchers: To validate the proposed conceptual framework, researchers from different countries and cultures are invited to apply the model. Moreover, a longitudinal research design could be implemented to gather data over a longer period, in order to investigate whether users have changed their attitudes, beliefs, perceptions, and intention by the end of the study period. Other constructs, such as individual experience, compatibility, and quality of working life could be included to improve the power of the proposed model. Impact on Society: Middle Eastern Facebook users regard the network as an important tool for interacting with others. The increasing number of Facebook users renders it a tool of universal communication and enjoyment, as well as a marketing network. However, knowledge of the constructs affecting the application of SNSs is valuable for ensuring that such sites have the various functions required to suit different types of user. Future Research: It is hoped that our future research will build on the results of this work and attempt to provide further explanation of why users accept SNSs. In this future research, the proposed research model could be adopted to explore SNSs acceptance in other developing countries. Researchers might also include other factors of potential influence on SNSs acceptance. The constructs influencing acceptance of other social networks could then be compared to the present research findings and thus, the differences and similarities would be highlighted.




us

The Role of Social Network in Family Business Diversification: Evidence from South Eastern Nigeria

Aim/Purpose: This study seeks to investigate if participation in business association’s programs through the traditional and new media platforms influences family businesses in South Eastern Nigeria to diversify into similar or different businesses. Background: Before the advances in information and communication technology, businesses were carried on via the traditional media. The application of these advances has changed the way business communications and transactions are conducted globally in both family and non-family businesses. Businesses are adapting to today’s turbulent environment by opening similar or different businesses in the same or different locations that are hinged on the traditional and new media platforms. Nigerians are largely involved in social network through the traditional (face-to-face contact) and new media (e.g., Facebook, WhatsApp, Twitter, YouTube and Instagram). Moreover, in spite of the commonplaceness of family businesses in Nigeria, these businesses still experience weak diversification, bankruptcy and loss of socio-emotional wealth. Consequent upon the foregoing, this paper specifically investigates if involvement in social network via the traditional media (i.e., participation in business association’s meetings, workshops, seminars) and the new media (i.e., participation in the business association’s interactive sessions on trending business issues through the association’s online social platform like WhatsApp, Twitter), influence family businesses in South Eastern Nigeria to diversify into similar or different businesses. Methodology: The study adopted a qualitative methodology. The qualitative data were generated via interview involving 30 purposively selected businesses from South Eastern Nigeria. This comprises 15 family businesses each that have respectively adopted related and unrelated diversification strategies. Two respondents (i.e., the business owner and a top level manager) each were drawn from the selected businesses. In all, 60 respondents were interviewed. Since the unit of analysis is the family business, the interview transcriptions from all the respondents were subjected to thematic content analysis on the basis of the family businesses. Contribution: Active involvement and participation in all the meetings, discussions, workshops and seminars of the social network via the traditional and new media platforms facilitates the adoption of related or unrelated diversification in family businesses. Moreover, the adoption of similar social network platforms like WhatsApp and Twitter in all the relationships among and between employees and managers, and the transactions of the businesses is one of the key factors for achieving successful related or unrelated diversification in family businesses. Findings: In spite of the risky nature of the business environment, the adoption of related diversification strategies is significantly influenced by resources such as business consultancy services garnered through the traditional and new media platforms of the social network. Also, family businesses that are actively involved in a social network where the actors interact through the traditional and new media are influenced by the resources acquired to consider adopting unrelated diversification. These resources include: better understanding of the nature of business challenges, environments and experiences; and different lines of businesses. Thus, the traditional and new media platforms are complementary in their roles. Recommendations for Practitioners: Family business owner-managers could use the findings to develop related or unrelated strategies for diversifying into existing or new markets. This can be through the localization of manufacturing plant, improvement of product packaging, sitting of sales outlet closer to the consumers, introduction of lower prices for products/services, introduction of new and better ways of service delivery, or development of more compelling promotion strategies. Recommendation for Researchers: As a veritable guide, this study could guide future researchers in the formulation of their objectives, selection of instrument for data collection and respondents, and adoption of method of data analysis. Impact on Society: Successful diversification suggests the establishment of new or more businesses. Consequently, these new or more family businesses are expected to translate to more employment opportunities and by extension reduction in unemployment and poverty rates in the society. Future Research: Further studies should be carried out to enhance the development of family businesses, contribute to the existing literature and ensure the generalization of the findings.




us

The Relationship between Ambidextrous Knowledge Sharing and Innovation within Industrial Clusters: Evidence from China

Aim/Purpose: This study examines the influence of ambidextrous knowledge sharing in industrial clusters on innovation performance from the perspective of knowledge-based dynamic capabilities. Background: The key factor to improving innovation performance in an enterprise is to share knowledge with other enterprises in the same cluster and use dynamic capabilities to absorb, integrate, and create knowledge. However, the relationships among these concepts remain unclear. Based on the dynamic capability theory, this study empirically reveals how enterprises drive innovation performance through knowledge sharing. Methodology: Survey data from 238 cluster enterprises were used in this study. The sample was collected from industrial clusters in China’s Fujian province that belong to the automobile, optoelectronic, and microwave communications industries. Through structural equation modeling, this study assessed the relationships among ambidextrous knowledge sharing, dynamic capabilities, and innovation performance. Contribution: This study contributes to the burgeoning literature on knowledge management in China, an important emerging economy. It also enriches the exploration of innovation performance in the cluster context and expands research on the dynamic mechanism from a knowledge perspective. Findings: Significant relationships are found between ambidextrous knowledge sharing and innovation performance. First, ambidextrous knowledge sharing positively influences the innovation performance of cluster enterprises. Further, knowledge absorption and knowledge generation capabilities play a mediating role in this relationship, which confirms that dynamic capabilities are a partial mediator in the relationship between ambidextrous knowledge sharing and innovation performance. Recommendations for Practitioners: The results highlight the crucial role of knowledge management in contributing to cluster innovation and management practices. They indicate that cluster enterprises should consider the importance of knowledge sharing and dynamic capabilities for improving innovation performance and establish a multi-agent knowledge sharing platform. Recommendation for Researchers: Researchers could further explore the role of other mediating variables (e.g., organizational agility, industry growth) as well as moderating variables (e.g., environmental uncertainty, learning orientation). Impact on Society: This study provides a reference for enterprises in industrial clusters to use knowledge-based capabilities to enhance their competitive advantage. Future Research: Future research could collect data from various countries and regions to test the research model and conduct a comparative analysis of industrial clusters.




us

Prosumers’ Engagement in Business Process Innovation – The Case of Poland and the UK

Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing. Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts. Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK. Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process. Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services. Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations. Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement. Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research.




us

A Multicluster Approach to Selecting Initial Sets for Clustering of Categorical Data

Aim/Purpose: This article proposes a methodology for selecting the initial sets for clustering categorical data. The main idea is to combine all the different values of every single criterion or attribute, to form the first proposal of the so-called multiclusters, obtaining in this way the maximum number of clusters for the whole dataset. The multiclusters thus obtained, are themselves clustered in a second step, according to the desired final number of clusters. Background: Popular cluster methods for categorical data, such as the well-known K-Modes, usually select the initial sets by means of some random process. This fact introduces some randomness in the final results of the algorithms. We explore a different application of the clustering methodology for categorical data that overcomes the instability problems and ultimately provides a greater clustering efficiency. Methodology: For assessing the performance of the proposed algorithm and its comparison with K-Modes, we apply both of them to categorical databases where the response variable is known but not used in the analysis. In our examples, that response variable can be identified to the real clusters or classes to which the observations belong. With every data set, we perform a two-step analysis. In the first step we perform the clustering analysis on data where the response variable (the real clusters) has been omitted, and in the second step we use that omitted information to check the efficiency of the clustering algorithm (by comparing the real clusters to those given by the algorithm). Contribution: Simplicity, efficiency and stability are the main advantages of the multicluster method. Findings: The experimental results attained with real databases show that the multicluster algorithm has greater precision and a better grouping effect than the classical K-modes algorithm. Recommendations for Practitioners: The method can be useful for those researchers working with small and medium size datasets, allowing them to detect the underlying structure of the data in an intuitive and reasonable way. Recommendation for Researchers: The proposed algorithm is slower than K-Modes, since it devotes a lot of time to the calculation of the initial combinations of attributes. The reduction of the computing time is therefore an important research topic. Future Research: We are concerned with the scalability of the algorithm to large and complex data sets, as well as the application to mixed data sets with both quantitative and qualitative attributes.




us

Critical Success Factors for Implementing Business Intelligence Projects (A BI Implementation Methodology Perspective)

Aim/Purpose: The purpose of this paper is to identify Critical Success Factors (CSFs) for Business Intelligence (BI) implementation projects by studying the existing BI project implementation methodologies and to compare these methodologies based on the identified CSFs. Background: The implementation of BI project has become one of the most important technological and organizational innovations in modern organizations. The BI project implementation methodology provides a framework for demonstrating knowledge, ideas and structural techniques. It is defined as a set of instructions and rules for implementing BI projects. Identifying CSFs of BI implementation project can help the project team to concentrate on solving prior issues and needed resources. Methodology: Firstly, the literature review was conducted to find the existing BI project implementation methodologies. Secondly, the content of the 13 BI project implementation methodologies was analyzed by using thematic analysis method. Thirdly, for examining the validation of the 20 identified CSFs, two questionnaires were distributed among BI experts. The gathered data of the first questionnaire was analyzed by content validity ratio (CVR) and 11 of 20 CSFs were accepted as a result. The gathered data of the second questionnaire was analyzed by fuzzy Delphi method and the results were the same as CVR. Finally, 13 raised BI project implementation methodologies were compared based on the 11 validated CSFs. Contribution: This paper contributes to the current theory and practice by identifying a complete list of CSFs for BI projects implementation; comparison of existing BI project implementation methodologies; determining the completeness degree of existing BI project implementation methodologies and introducing more complete ones; and finding the new CSF “Expert assessment of business readiness for successful implementation of BI project” that was not expressed in previous studies. Findings: The CSFs that should be considered in a BI project implementation include: “Obvious BI strategy and vision”, “Business requirements definition”, “Business readiness assessment”, “BI performance assessment”, “Establishing BI alignment with business goals”, “Management support”, “IT support for BI”, “Creating data resources and source data quality”, “Installation and integration BI programs”, “BI system testing”, and “BI system support and maintenance”. Also, all the 13 BI project implementation methodologies can be divided into four groups based on their completeness degree. Recommendations for Practitioners: The results can be used to plan BI project implementation and help improve the way of BI project implementation in the organizations. It can be used to reduce the failure rate of BI implementation projects. Furthermore, the 11 identified CSFs can give a better understanding of the BI project implementation methodologies. Recommendation for Researchers: The results of this research helped researchers and practitioners in the field of business intelligence to better understand the methodology and approaches available for the implementation and deployment of BI systems and thus use them. Some methodologies are more complete than other studied methodologies. Therefore, organizations that intend to implement BI in their organization can select these methodologies according to their goals. Thus, Findings of the study can lead to reduce the failure rate of implementation projects. Future Research: Future researchers may add other BI project implementation methodologies and repeat this research. Also, they can divide CSFs into three categories including required before BI project implementation, required during BI project implementation and required after BI project implementation. Moreover, researchers can rank the BI project implementation CSFs. As well, Critical Failure Factors (CFFs) need to be explored by studying the failed implementations of BI projects. The identified CSFs probably affect each other. So, studying the relationship between them can be a topic for future research.




us

IDCUP Algorithm to Classifying Arbitrary Shapes and Densities for Center-based Clustering Performance Analysis

Aim/Purpose: The clustering techniques are normally considered to determine the significant and meaningful subclasses purposed in datasets. It is an unsupervised type of Machine Learning (ML) where the objective is to form groups from objects based on their similarity and used to determine the implicit relationships between the different features of the data. Cluster Analysis is considered a significant problem area in data exploration when dealing with arbitrary shape problems in different datasets. Clustering on large data sets has the following challenges: (1) clusters with arbitrary shapes; (2) less knowledge discovery process to decide the possible input features; (3) scalability for large data sizes. Density-based clustering has been known as a dominant method for determining the arbitrary-shape clusters. Background: Existing density-based clustering methods commonly cited in the literature have been examined in terms of their behavior with data sets that contain nested clusters of varying density. The existing methods are not enough or ideal for such data sets, because they typically partition the data into clusters that cannot be nested. Methodology: A density-based approach on traditional center-based clustering is introduced that assigns a weight to each cluster. The weights are then utilized in calculating the distances from data vectors to centroids by multiplying the distance by the centroid weight. Contribution: In this paper, we have examined different density-based clustering methods for data sets with nested clusters of varying density. Two such data sets were used to evaluate some of the commonly cited algorithms found in the literature. Nested clusters were found to be challenging for the existing algorithms. In utmost cases, the targeted algorithms either did not detect the largest clusters or simply divided large clusters into non-overlapping regions. But, it may be possible to detect all clusters by doing multiple runs of the algorithm with different inputs and then combining the results. This work considered three challenges of clustering methods. Findings: As a result, a center with a low weight will attract objects from further away than a centroid with higher weight. This allows dense clusters inside larger clusters to be recognized. The methods are tested experimentally using the K-means, DBSCAN, TURN*, and IDCUP algorithms. The experimental results with different data sets showed that IDCUP is more robust and produces better clusters than DBSCAN, TURN*, and K-means. Finally, we compare K-means, DBSCAN, TURN*, and to deal with arbitrary shapes problems at different datasets. IDCUP shows better scalability compared to TURN*. Future Research: As future recommendations of this research, we are concerned with the exploration of further available challenges of the knowledge discovery process in clustering along with complex data sets with more time. A hybrid approach based on density-based and model-based clustering algorithms needs to compare to achieve maximum performance accuracy and avoid the arbitrary shapes related problems including optimization. It is anticipated that the comparable kind of the future suggested process will attain improved performance with analogous precision in identification of clustering shapes.




us

Social Media Use and Its Effect on Knowledge Sharing: Evidence from Public Organisations in Delta State, Nigeria

Aim/Purpose: This study investigates social media use and its effect on knowledge sharing. Based on the review of related literature, we hypothesised that social media use has a significant effect on outward and inward knowledge sharing. Background: While the notion of social media use in work organisations has been progressively developed, empirical studies linking social media to the context of knowledge sharing have only begun to emerge. Even so, literature on social media use and its impact on public organisation is still tentative and remains a developing area. Methodology: The partial least square method was utilised in testing of hypotheses with data collected from 103 employees, who by virtue of their position and job function(s) interface with the public for the purpose of sharing knowledge via the social media space. Contribution: The study made contributions to the social knowledge management literature in two ways. First, the study developed a research model that links social media use to the two distinct dimensions of knowledge sharing. Second, the study provides a quantitative approach, where statistical techniques were applied to validate the social media use and knowledge sharing link. Findings: Statistically, the public organisations utilise social media partly for knowledge sharing, with its effect being significant on outward knowledge sharing and insignificant on inward knowledge sharing. This indicates that social media were deployed mainly for information dissemination “outward knowledge sharing” and not for stakeholders’ feedback and interaction “inward knowledge sharing”. Recommendations for Practitioners: Public organisations should develop a policy framework and guidelines for social media use to encourage the full use of this technology to inform and interact with stakeholders. It is important for this policy document to adopt best practices regarding interactive spaces so that both knowledge sharing dimensions manifest themselves in social media communications. Second, it is necessary to carry out staff training for the professional use of this technology for knowledge sharing. Recommendation for Researchers: Future studies should extend to more populations in different contexts to validate findings Impact on Society: This paper intends to influence practices adopted by organisations in the public sector to improve the knowledge sharing dimensions via the social media space. Future Research: Future studies may extend to public organisations in other geographical locations around Nigeria. It will be useful for studies to provide an international perspective by sampling public organisations from different countries or by comparing and contrasting the findings of other studies, specifically those from other countries. A longitudinal study should be encouraged to detect advancement or development with regards to the subject matter over a period of time.




us

Students’ Continuance Intention to Use Moodle: An Expectation-Confirmation Model Approach

Aim/Purpose: This study aims at investigating the factors that influence students’ continuous intention to use Moodle, as an exemplar of learning management systems (LMSs), in the post-adoption phase. Background: Higher education institutions (HEIs) have invested heavily in learning management systems (LMSs), such as Moodle and BlackBoard, as these systems enhance students’ learning and improve their interactions with the educational systems. While most studies on LMSs have focused on the pre-adoption or acceptance phases of this technology, the determinant factors that influence students’ continuance intention to use LMSs have received less attention in the information systems (IS) literature. Methodology: The theoretical model for this study was primarily drawn from the expectation-confirmation model (ECM). A total of 387 Kuwaiti students, from a private American University in the State of Kuwait, participated in this study. Partial least squares (PLS) was employed to analyze the data. Contribution: This study contributes to the existing scientific knowledge in different ways. First, this study extends the expectation confirmation model (ECM) by integrating factors that are important to students’ continuous intention to use LMSs, including system interactivity, effort expectancy, attitude, computer anxiety, self-efficacy, subjective norms, and facilitating conditions. Second, this study adds on a Kuwaiti literature context by focusing on the continuous intention to use LMSs, which is, to the best of our knowledge, the first study that extends and empirically assesses the applicability of the ECM in the LMSs context in a developing country – Kuwait. Third, this study conceptually and empirically differentiates between satisfaction and attitude, as two separate affect constructs, which were taken as interchangeable factors in ECM, and were disregarded by a large number of prior ECM studies concerned with continuous use intention. Finally, this study aims to assist HEIs, faculty members, and systems’ developers in understanding the main factors that influence students’ continuance use intention of LMSs. Findings: While subjective norms were not significant, the results mainly showed that students’ continuous intention to use Moodle is significantly influenced by performance expectancy, effort expectancy, attitude, satisfaction, self-efficacy and facilitating conditions. The study’s results also confirmed that satisfaction and attitude are two conceptually and empirically different constructs, conflicting with the views that these constructs can be taken as interchangeable factors in the ECM. Recommendations for Practitioners: This study offers several useful practical implications. First, given the significant influence of system interactivity on performance expectancy and satisfaction, faculty members should modify their teaching approach by enabling communication and interaction among instructors, students, and peers using the LMS. Second, given the significant influence of performance expectancy, satisfaction, and attitude on continuous intention to use the LMS, HEIs should conduct training programs for students on the effective use of the LMS. This would increase students’ awareness regarding the usefulness of the LMS, enhance their attitude towards the LMS, and improve their satisfaction with the system. Third, given the significant role of effort expectancy in influencing performance expectancy, attitude, and students’ continuous intention to use Moodle, developers and system programmers should design the LMS with easy to use, high quality, and customizable user interface. This, in turn, will not only motivate students’ performance expectancy, but will also influence their attitude and continuous intention to use the system. Recommendation for Researchers: This study conceptually and empirically differentiates between satisfaction and attitude, as two separate affect constructs, which were taken as interchangeable factors in ECM and were disregarded by a large number of prior ECM studies concerned with continuous use intention. Hence, it is recommended that researchers include these two constructs in their research models when investigating continuous intention to use a technology. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other LMSs, such as Blackboard. Future Research: This study focused on how different factors affected students’ continuous intention to use Moodle but did not consider all determinants of successful system, such as system quality, information quality, and instructional as well as course content quality. Thus, future research should devote attention to the effects of these quality characteristics of LMS.




us

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




us

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.