se An evaluation of customer trust in e-commerce market based on entropy weight analytic hierarchy process By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to solve the problems of large generalisation error, low recall rate and low retrieval accuracy of customer evaluation information in traditional trust evaluation methods, an evaluation method of customer trust in e-commerce market based on entropy weight analytic hierarchy process was designed. Firstly, build an evaluation index system of customer trust in e-commerce market. Secondly, the customer trust matrix is established, and the index weight is calculated by using the analytic hierarchy process and entropy weight method. Finally, five-scale Likert method is used to analyse the indicator factors and establish a comment set, and the trust evaluation value is obtained by combining the indicator membership. The experiment shows that the maximum generalisation error of this method is only 0.029, the recall rate is 97.5%, and the retrieval accuracy of customer evaluation information is closer to 1. Full Article
se Study on marketing strategy innovation of mobile payment service under internet environment By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of low efficiency, low user satisfaction and poor customer growth rate under the traditional marketing strategy, this paper studies the innovative strategy of mobile payment business marketing strategy under the internet environment. First of all, study the status quo of mobile payment business marketing in the internet environment, obtain mobile payment business data through questionnaire survey, and analyse the problems in mobile payment business marketing. Secondly, build a user profile of mobile payment business marketing, and classify user attributes, consumption characteristics and user activity through K-means clustering method; Finally, the marketing strategy is innovated from three aspects: product marketing, pricing marketing and channel marketing. The results show that the marketing benefit after the application of this strategy is 19.52 million yuan, the user satisfaction can reach 98.9%, and the customer growth rate can reach 21.3%, improving the marketing benefit of mobile payment business. Full Article
se Can artificial intelligence replace whistle-blowers in the business sector? By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves. Full Article
se Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei). Full Article
se Stock market response to mergers and acquisitions: comparison between China and India By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This research delves into the wealth effect of shareholders from bidding firms created by mergers and acquisitions (M&A) in China and India, two of the world's most populous nations. The study reveals that on average, M&A deals create wealth for shareholders of the acquiring firms, as determined by abnormal percentage returns in a five-day event window. Regarding the further classification of acquiring firms based on industry, the abnormal percentage returns vary in different sectors in both countries. In China, shareholders benefit in seven out of ten industries, while in India, they gain in five out of nine industries. Moreover, the stock markets' responses vary depending on the type of M&A in each country. Cross-industry M&A deals in China generate higher gains for shareholders than within-industry deals, whereas, in India, within-industry M&A deals generate higher gains. Full Article
se A prototype for intelligent diet recommendations by considering disease and medical condition of the patient By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The patient must follow a good diet to lessen the risk of health conditions. The body needs vitamins, minerals, and nutrients for illness prevention. When the human body does not receive the right amount of nutrients, nutritional disorders can develop, which can cause a number of different health issues. Chronic diseases like diabetes and hypertension can be brought on by dietary deficiencies. The human body receives the nutrients from a balanced diet to function properly. This research has a prototype that enables patients to find nutritious food according to their health preferences. It suggests meals based on their preferences for nutrients such as protein, fibre, high-fibre, low-fat, etc., and diseases such as pregnancy and diabetes. The process implements the recommendation based on the patient's profile (content-relied, K-NN), recommendation relied on patients with similar profiles, and recommendation based on the patient's past or recent activity. Full Article
se International Journal of Business and Systems Research By www.inderscience.com Published On :: Full Article
se Visualizing Research Data Records for their Better Management By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 As academia in general, and research funders in particular, place ever greater importance on data as an output of research, so the value of good research data management practices becomes ever more apparent. In response to this, the Innovative Design and Manufacturing Research Centre (IdMRC) at the University of Bath, UK, with funding from the JISC, ran a project to draw up a data management planning regime. In carrying out this task, the ERIM (Engineering Research Information Management) Project devised a visual method of mapping out the data records produced in the course of research, along with the associations between them. This method, called Research Activity Information Development (RAID) Modelling, is based on the Unified Modelling Language (UML) for portability. It is offered to the wider research community as an intuitive way for researchers both to keep track of their own data and to communicate this understanding to others who may wish to validate the findings or re-use the data. Full Article Articles digital information research data management visual forms of communication information presentation Information Management Information Visualization
se Preserving and delivering audiovisual content integrating Fedora Commons and MediaMosa By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 The article describes the integrated adoption of Fedora Commons and MediaMosa for managing a digital repository. The integration was experimented along with the development of a cooperative project, Sapienza Digital Library (SDL). The functionalities of the two applications were exploited to built a weaving factory, useful for archiving, preserving and disseminating of multi-format and multi-protocol audio video contents, in different fruition contexts. The integration was unleashed by means of both repository-to-repository interaction, and mapping of video Content Model's disseminators to MediaMosa's Restful services. The outcomes of this integration will lead to a more flexible management of the dissemination services, as well as to economize the overproduction of different dissemination formats. Full Article Articles repositories preservation multimedia Digital Libraries Digital Repositories Preservation
se FISHNet: encouraging data sharing and reuse in the freshwater science community By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 This paper describes the FISHNet project, which developed a repository environment for the curation and sharing of data relating to freshwater science, a discipline whose research community is distributed thinly across a variety of institutions, and usually works in relative isolation as individual researchers or within small groups. As in other “small sciences”, these datasets tend to be small and “hand-crafted”, created to address particular research questions rather than with a view to reuse, so they are rarely curated effectively, and the potential for sharing and reusing them is limited. The paper addresses a variety of issues and concerns raised by freshwater researchers as regards data sharing, describes our approach to developing a repository environment that addresses these concerns, and identifies the potential impact within the research community of the system. Full Article Articles freshwater biology data sharing data publication data reuse data repositories DOI Fedora Digital Libraries Social Consequences Usability of Digital Information Digital Repositories Scholarly Communication
se Beyond The Low Hanging Fruit: Data Services and Archiving at the University of New Mexico By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 Open data is becoming increasingly important in research. While individual researchers are slowlybecoming aware of the value, funding agencies are taking the lead by requiring data be made available, and also by requiring data management plans to ensure the data is available in a useable form. Some journals also require that data be made available. However, in most cases, “available upon request” is considered sufficient. We describe a number of historical examples of data use and discovery, then describe two current test cases at the University of New Mexico. The lessons learned suggest that an instituional data services program needs to not only facilitate fulfilling the mandates of granting agencies but to realize the true value of open data. Librarians and institutional archives should actively collaborate with their researchers. We should also work to find ways to make open data enhance a researchers career. In the long run, better quality data and metadata will result if researchers are engaged and willing participants in the dissemination of their data. Full Article Articles open data curation e-science repositories data Digital Repositories Information Management Scholarly Communication
se Kindura: Repository services for researchers based on hybrid clouds By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 The paper describes the investigations and outcomes of the JISC-funded Kindura project, which is piloting the use of hybrid cloud infrastructure to provide repository-focused services to researchers. The hybrid cloud services integrate external commercial cloud services with internal IT infrastructure, which has been adapted to provide cloud-like interfaces. The system provides services to manage and process research outputs, primarily focusing on research data. These services include both repository services, based on use of the Fedora Commons repository, as well as common services such as preservation operations that are provided by cloud compute services. Kindura is piloting the use of the DuraCloud2, open source software developed by DuraSpace, to provide a common interface to interact with cloud storage and compute providers. A storage broker integrates with DuraCloud to optimise the usage of available resources, taking into account such factors as cost, reliability, security and performance. The development is focused on the requirements of target groups of researchers. Full Article Articles
se REDDNET and Digital Preservation in the Open Cloud: Research at Texas Tech University Libraries on Long-Term Archival Storage By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 In the realm of digital data, vendor-supplied cloud systems will still leave the user with responsibility for curation of digital data. Some of the very tasks users thought they were delegating to the cloud vendor may be a requirement for users after all. For example, cloud vendors most often require that users maintain archival copies. Beyond the better known vendor cloud model, we examine curation in two other models: inhouse clouds, and what we call "open" clouds—which are neither inhouse nor vendor. In open clouds, users come aboard as participants or partners—for example, by invitation. In open cloud systems users can develop their own software and data management, control access, and purchase their own hardware while running securely in the cloud environment. To do so will still require working within the rules of the cloud system, but in some open cloud systems those restrictions and limitations can be walked around easily with surprisingly little loss of freedom. It is in this context that REDDnet (Research and Education Data Depot network) is presented as the place where the Texas Tech University (TTU)) Libraries have been conducting research on long-term digital archival storage. The REDDnet network by year's end will be at 1.2 petabytes (PB) with an additional 1.4 PB for a related project (Compact Muon Soleniod Heavy Ion [CMS-HI]); additionally there are over 200 TB of tape storage. These numbers exclude any disk space which TTU will be purchasing during the year. National Science Foundation (NSF) funding covering REDDnet and CMS-HI was in excess of $850,000 with $850,000 earmarked toward REDDnet. In the terminology we used above, REDDnet is an open cloud system that invited TTU Libraries to participate. This means that we run software which fits the REDDnet structure. We are beginning to complete the final design of our system, and starting to move into the first stages of construction. And we have made a decision to move forward and purchase one-half petabyte of disk storage in the initial phase. The concerns, deliberations and testing are presented here along with our initial approach. Full Article Articles digital preservation digitial collections digital libraries digital preservation digital libraries digital information academic libraries cloud computing collaboration
se Building a Community of Curatorial Practice at Penn State: A Case Study By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 The Penn State University Libraries and Information Technology Services (ITS) collaborated on the development of Curation Architecture Prototype Services (CAPS), a web application for ingest and management of digital objects. CAPS is built atop a prototype service platform providing atomistic curation functions in order to address the current and emerging requirements in the Libraries and ITS for digital curation, defined as “... maintaining and adding value to a trusted body of digital information for future and current use; specifically, the active management and appraisal of data over the entire life cycle” (Pennock, 2006)[7]. Additional key goals for CAPS were application of an agile-style methodology to the development process and an assessment of the resulting tool and stakeholders’ experience in the project. This article focuses in particular on the community-building aspects of CAPS, which emerged from a combination of agile-style approaches and our commitment to engage stakeholders actively throughout the process, from the construction of use cases, to decisions on metadata standards, to ingest and management functionalities of the tool. The ensuing community of curatorial practice effectively set the stage for the next iteration of CAPS, which will be devoted to planning and executing the development of a production-ready, enterprise-quality infrastructure to support publishing and curation services at Penn State. Full Article Articles curation microservices agile infrastructure stakeholders Digital Curation Curation Microservices Community of Practice Agile Methodology
se Repository as a Service (RaaS) By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 In his oft-quoted seminal paper ‘Institutional Repositories: Essential Infrastructure For Scholarship In The Digital Age’ Clifford Lynch (2003) described the Institutional Repository as “a set of services that a university offers to the members of its community for the management and dissemination of digital materials created by the institution and its community members.” This paper seeks instead to define the repository service at a more primitive level, without the specialism of being an ‘Institutional Repository’, and looks at how it can viewed as providing a service within appropriate boundaries, and what that could mean for the future development of repositories, our expectations of what repositories should be, and how they could fit into the set of services required to deliver an Institutional Repository service as describe by Lynch. Full Article Articles Digital Repositories Services
se Agricultural informatics: emphasising potentiality and proposed model on innovative and emerging Doctor of Education in Agricultural Informatics program for smart agricultural systems By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 International universities are changing with their style of operation, mode of teaching and learning operations. This change is noticeable rapidly in India and also in international contexts due to healthy and innovative methods, educational strategies, and nomenclature throughout the world. Technologies are changing rapidly, including ICT. Different subjects are developed in the fields of IT and computing with the interaction or applications to other fields, viz. health informatics, bio informatics, agriculture informatics, and so on. Agricultural informatics is an interdisciplinary subject dedicated to combining information technology and information science utilisation in agricultural sciences. The digital agriculture is powered by agriculture informatics practice. For teaching, research and development of any subject educational methods is considered as important and various educational programs are there in this regard viz. Bachelor of Education, Master of Education, PhD in Education, etc. Degrees are also available to deal with the subjects and agricultural informatics should not be an exception of this. In this context, Doctor of Education (EdD or DEd) is an emerging degree having features of skill sets, courses and research work. This paper proposed on EdD program with agricultural informatics specialisation for improving healthy agriculture system. Here, a proposed model core curriculum is also presented. Full Article
se Cognitive biases in decision making during the pandemic: insights and viewpoint from people's behaviour By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 In this article, we have attempted to study the ways in which the COVID-19 pandemic has gradually increased and impacted the world. The authors integrate the knowledge from cognitive psychology literature to illustrate how the limitations of the human mind might have a critical role in the decisions taken during the COVID-19 pandemic. The authors show the correlation between different biases in various contexts involved in the COVID-19 pandemic and highlight the ways in which we can nudge ourselves and various stakeholders involved in the decision-making process. This study uses a typology of biases to examine how different patterns of biases affect the decision-making behaviour of people during the pandemic. The presented model investigates the potential interrelations among environmental transformations, cognitive biases, and strategic decisions. By referring to cognitive biases, our model also helps to understand why the same performance improvement practices might incite different opinions among decision-makers. Full Article
se International Journal of Enterprise Network Management By www.inderscience.com Published On :: Full Article
se LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%. Full Article
se e-HR and Employee Self Service: A Case Study of a Victorian Public Sector Organisation By Published On :: Full Article
se A Computer Hardware/Software/Services Planning and Selection Course for the CIS/IT Curriculum By Published On :: Full Article
se Exploring Change and Innovation by ICT Teaching Staff in the New Zealand Polytechnic Sector By Published On :: Full Article
se What to Teach Business Students in MIS Courses about Data and Information By Published On :: Full Article
se Higher Education Course Content: Paper-Based, Online or Hybrid Course Delivery? By Published On :: Full Article
se A Data Model Validation Approach for Relational Database Design Courses By Published On :: Full Article
se A Comparison of Learning and Teaching Styles – Self-Perception of IT Students By Published On :: Full Article
se Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance By Published On :: Full Article
se Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use By Published On :: Full Article
se Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia By Published On :: Full Article
se Challenge or Chaos: A Discourse Analysis of Women’s Perceptions of the Culture of Change in the IT Industry By Published On :: Full Article
se Do Project Manager’s Utilise Potential Customers in E-Commerce Developments? By Published On :: Full Article
se Retrofitting Generic Graduate Attributes: A Case-Study of Information Systems Undergraduate Programs By Published On :: Full Article
se Restructuring an Undergraduate Database Management Course for Business Students By Published On :: Full Article
se Technology and Marginalization: A Case Study of the Limited Adoption of the Intranet at a State-owned Organization in Rural Australia By Published On :: Full Article
se Assessing the Impact of Instructional Methods and Information Technology on Student Learning Styles By Published On :: Full Article
se ERP Systems and User Perceptions: An Approach for Implementation Success By Published On :: Full Article
se The Human Dimension on Distance Learning: A Case Study of a Telecommunications Company By Published On :: Full Article
se Students’ Pedagogical Preferences in the Delivery of IT Capstone Courses By Published On :: Full Article
se A Single Case Study Approach to Teaching: Effects on Learning and Understanding By Published On :: Full Article
se The Roles of Challenge and Skill in the Flow Experiences of Web Users By Published On :: Full Article