se An Overlapless Incident Management Maturity Model for Multi-Framework Assessment (ITIL, COBIT, CMMI-SVC) By Published On :: 2018-07-02 Aim/Purpose: This research aims to develop an information technology (IT) maturity model for incident management (IM) process that merges the most known IT frameworks’ practices. Our proposal intends to help organizations overcome the current limitations of multiframework implementation by informing organizations about frameworks’ overlap before their implementation. Background: By previously identifying frameworks’ overlaps it will assist organizations during the multi-framework implementation in order to save resources (human and/or financial). Methodology: The research methodology used is design science research (DSR). Plus, the authors applied semi-structured interviews in seven different organizations to demonstrate and evaluate the proposal. Contribution: This research adds a new and innovative artefact to the body of knowledge. Findings: The proposed maturity model is seen by the practitioners as complete and useful. Plus, this research also reinforces the frameworks’ overlap issue and concludes that some organizations are unaware of their actual IM maturity level; some organizations are unaware that they have implemented practices of other frameworks besides the one that was officially adopted. Recommendations for Practitioners: Practitioners may use this maturity model to assess their IM maturity level before multi-framework implementation. Moreover, practitioners are also incentivized to communicate further requirements to academics regarding multi-framework assessment maturity models. Recommendation for Researchers: Researchers may explore and develop multi-frameworks maturity models for the remaining processes of the main IT frameworks. Impact on Society: This research findings and outcomes are a step forward in the development of a unique overlapless maturity model covering the most known IT frameworks in the market thus helping organizations dealing with the increasing frameworks’ complexity and overlap. Future Research: Overlapless maturity models for the remaining IT framework processes should be explored. Full Article
se Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector By Published On :: 2018-03-15 Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature. Full Article
se The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector By Published On :: 2018-02-10 Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems. Full Article
se The Adoption of CRM Initiative among Palestinian Enterprises: A Proposed Framework By Published On :: 2019-11-03 Aim/Purpose: This study aimed to examine the relationships among compatibility, relative advantage, complexity, IT Infrastructure, security, top Management Support, financial Support, information Policies, employee engagement, customer pressure, competitive pressure, information integrity, information sharing, attitude toward adopting technology factors, and CRM adoption Background: Customer relationship management (CRM) refers to the use of the process, information, technology, and people for the management of the interactions between the organization and its customers. Therefore, there is a need for SMEs to implement CRM practices in their businesses for competitive advantage. However, in developing nations, the adoption rate of such practices remains low. This low rate may be attributed to the lack of important factors that guide CRM adoption, and as such, the present study attempts to investigate the factors affecting CRM adoption in Palestinian SMEs. This paper used the Diffusion of Innovation Theory (DOI), Resource-Based View (RBV), and Technology, Organization, and Environment Framework (TOE) framework to identify the determinant factors from the technological, organizational, environmental, and information culture perspectives. Methodology: This study uses a quantitative approach to investigate the relationships between the variables. A questionnaire was designed to collect data from 420 SMEs in Palestine. 331respondents completed and returned the survey. The Partial Least Square-Structural Equation Model (PLS-SEM) approach was used to assess both the measurement and structural models. Contribution: This study contributes to both theory and practitioners by providing insights into factors that affect CRM adoption in Palestinian SMEs, which did not explore before. Future research suggestions are also provided. Findings: The results of the study prove that the adoption of CRM depends on compatibility (CMP), security (SEC), top management support (TMS), information policies (INP), financial resources (FR), employee engagement (EEN), competitive pressure (COP), customers pressure (CUP), attitude toward adopting technology (ATA), information integrity (INI), and information sharing (INS). Surprisingly, complexity (CMX), IT infrastructure (ITI), and relative advantage (RLA) do not play any role in CRM adoption in Palestine. Recommendations for Practitioners: This study provides practitioners with the important factors for CRM adoption upon its successful implementation in the context of Palestinian SMEs. Recommendation for Researchers: Our findings may be used to conduct further studies about compatibility, security, top management support, information policies, financial resources, employee engagement, competitive pressure, customers pressure, attitude toward adopting technology, information integrity, information sharing factors, and CRM adoption by using different countries, procedure, and context. Impact on Society: The proposed framework provides insights for SMEs which have significant effects for research and practice to help facilitate the adoption of CRM Future Research: The findings may also be compared to other studies conducted in different contexts and provide deeper insights into the influence of the examined contexts on the employees’ intention toward CRM adoption in banking and universities. It would be fruitful to test whether the results hold true in developed and developing countries. Full Article
se Crisis and Disaster Situations on Social Media Streams: An Ontology-Based Knowledge Harvesting Approach By Published On :: 2019-10-20 Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring, collaborative problem-solving mechanism, and decision-making process. With the prolific utilization of disaster-based ontological framework, a strong disambiguation system is realized, which further enhances the searching capabilities of the user request and provides a solution of unambiguous in nature. Background: Even though social media is information-rich, it has created a challenge for deriving a decision in critical crisis-related cases. In order to make the whole process effective and avail quality decision making, sufficiently clear semantics of such information is necessary, which can be supplemented through employing semantic web technologies. Methodology: This paper evolves a disaster ontology-based system availing a framework model for monitoring uses of social media during risk and crisis-related events. The proposed system monitors a discussion thread discovering whether it has reached its peak or decline after its root in the social forum like Twitter. The content in social media can be accessed through two typical ways: Search Application Program Interfaces (APIs) and Streaming APIs. These two kinds of API processes can be used interchangeably. News content may be filtered by time, geographical region, keyword occurrence and availability ratio. With the support of disaster ontology, domain knowledge extraction and comparison against all possible concepts are availed. Besides, the proposed method makes use of SPARQL to disambiguate the query and yield the results which produce high precision. Contribution: The model provides for the collection of crisis-related temporal data and decision making through semantic mapping of entities over concepts in a disaster ontology we developed, thereby disambiguating potential named entities. Results of empirical testing and analysis indicate that the proposed model outperforms similar other models. Findings: Crucial findings of this research lie in three aspects: (1) Twitter streams and conventional news media tend to offer almost similar types of news coverage for a specified event, but the rate of distribution among topics/categories differs. (2) On specific events such as disaster, crisis or any emergency situations, the volume of information that has been accumulated between the two news media stands divergent and filtering the most potential information poses a challenging task. (3) Relational mapping/co-occurrence of terms has been well designed for conventional news media, but due to shortness and sparseness of tweets, there remains a bottleneck for researchers. Recommendations for Practitioners: Though metadata avails collaborative details of news content and it has been conventionally used in many areas like information retrieval, natural language processing, and pattern recognition, there is still a lack of fulfillment in semantic aspects of data. Hence, the pervasive use of ontology is highly suggested that build semantic-oriented metadata for concept-based modeling, information flow searching and knowledge exchange. Recommendation for Researchers: The strong recommendation for researchers is that instead of heavily relying on conventional Information Retrieval (IR) systems, one can focus more on ontology for improving the accuracy rate and thereby reducing ambiguous terms persisting in the result sets. In order to harness the potential information to derive the hidden facts, this research recommends clustering the information from diverse sources rather than pruning a single news source. It is advisable to use a domain ontology to segregate the entities which pose ambiguity over other candidate sets thus strengthening the outcome. Impact on Society: The objective of this research is to provide informative summarization of happenings such as crisis, disaster, emergency and havoc-based situations in the real world. A system is proposed which provides the summarized views of such happenings and corroborates the news by interrelating with one another. Its major task is to monitor the events which are very booming and deemed important from a crowd’s perspective. Future Research: In the future, one shall strive to help to summarize and to visualize the potential information which is ranked high by the model. Full Article
se Contextualist Inquiry into E-Commerce Institutionalization in Developing Countries: The Case of Mozambican Women-led SMMES By Published On :: 2019-10-18 Aim/Purpose: This study explores how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce by focusing on the ongoing interaction between the SMME, its context, and process of e-commerce institutionalization. Background: It is believed that institutionalization of e-commerce provides significant benefits of unlimited access to new markets, and access to new, improved, inexpensive and convenient operational methods of transacting. Although prior studies have examined the adoption of e-commerce and the enabling and constraining factors, few have examined e-commerce (i) institutionalization (that is, post-adoption), and (ii) from a gender perspective. This study aims to respond to this paucity in the literature by exploring how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce. Methodology: The study follows a qualitative inquiry approach for both data collection and analysis. Semi-structured interviews were adopted for data collection and thematic analysis implemented on the data. SMMEs were purposively sampled to allow for the selection of information-rich SMMEs for study and specifically those that have gone through the experience of adoption and in some cases have institutionalized e-commerce. Contribution: The empirical findings explain how the institutionalization process from interactive e-commerce to transactive e-commerce unfolds in the Mozambican context. Findings: Transition from interactive to transactive e-commerce is firstly influenced by (i) the type of business the SMME is engaged in; and (ii) customer and trading partner’s readiness for e-commerce. Secondly, the transition process is influenced by the internal factors of (i) manager’s demographic factors; (ii) mimetic behaviour arising from exposure to (foreign) organizations in the same industry that have mature forms of e-commerce; (iii) the business networks developed with some of these organizations that have mature forms of e-commerce; (iv) access to financial resources; and (v) social media technologies. Thirdly, the process is influenced by external contextual factors of (i) limited government intervention towards e-commerce endeavors; (ii) limited to lack of financial institutions readiness for e-commerce; (iii) lack of local available IT expertise; (iv) consumer’s low purchasing power due to economic recessions; (vi) international competitive pressure; and (vii) sociocultural practices. Recommendations for Practitioners: The study provides SMME managers, practitioners, and other stakeholders concerned with women’s development with a better understanding of the process in order to develop appropriate policies and interventions that are suitable for the reality of women-led SMMEs in Mozambique and other developing countries with similar contextual characteristics. Recommendation for Researchers: The study contributes to the existing debate of e-commerce and the use of ICT for development in developing countries by providing a distinct contribution of the institutionalization process and how the contextual structures influence this process. Impact on Society: Women-led SMME managers can learn from the different experiences, and compare their e-commerce efforts with SMMEs that were able to institutionalize and make strategies for improvements within their organizations. Future Research: The manner in which women-led SMMEs employ e-commerce requires further investigation to understand how issues related to gender, the cultural context, and different regions or countries impact this process. Full Article
se Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector By Published On :: 2019-09-09 Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes. Full Article
se Prosumers’ Engagement in Business Process Innovation – The Case of Poland and the UK By Published On :: 2019-04-26 Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing. Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts. Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK. Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process. Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services. Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations. Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement. Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research. Full Article
se Agile Self-selecting Teams Foster Expertise Coordination By Published On :: 2019-04-16 Aim/Purpose: This paper aims to discuss the activities involved in facilitating self-selecting teams for Agile software development projects. This paper also discussed how these activities can influence the successful expertise coordination in Agile teams. Background: Self-selecting teams enable Agile team members to choose teams based on whom they prefer to work with. Good team bonding allows Agile team members to rely on each other in coordinating their expertise resources effectively. This is the focal point where expertise coordination is needed in Agile teams. Methodology: This study employed Grounded Theory by interviewing 48 Agile practitioners from different software organizations mainly based in New Zealand. This study also carried out several sessions of observations and document analysis in conjunction with interviews. Contribution: This study contributes to the body of knowledge by identifying the way self-selecting teams support expertise coordination. Findings: Our findings indicated that the activities involved tend to influence the successful expertise coordination in Agile teams. Self-selecting teams are essential to supporting expertise coordination by increasing inter-dependencies between Agile team members, ensuring a diverse range of knowledge and skills in teams. Recommendations for Practitioners: The self-selecting team activities can be used as a guideline for Agile software organizations in forming self-selecting teams in the fastest and most efficient way. It is vital for management to facilitate the process of self-selecting teams in order to optimize successful expertise coordination. Recommendation for Researchers: There is potential for further Grounded Theory research to explore more activities and strategies involved in self-selecting teams. Impact on Society: Self-selecting teams in Agile software developments projects tend to boost the productivity of software development. Future Research: Several hypotheses can be tested through a deductive approach in future studies. Full Article
se Improving Webpage Access Predictions Based on Sequence Prediction and PageRank Algorithm By Published On :: 2019-01-20 Aim/Purpose: In this article, we provide a better solution to Webpage access prediction. In particularly, our core proposed approach is to increase accuracy and efficiency by reducing the sequence space with integration of PageRank into CPT+. Background: The problem of predicting the next page on a web site has become significant because of the non-stop growth of Internet in terms of the volume of contents and the mass of users. The webpage prediction is complex because we should consider multiple kinds of information such as the webpage name, the contents of the webpage, the user profile, the time between webpage visits, differences among users, and the time spent on a page or on each part of the page. Therefore, webpage access prediction draws substantial effort of the web mining research community in order to obtain valuable information and improve user experience as well. Methodology: CPT+ is a complex prediction algorithm that dramatically offers more accurate predictions than other state-of-the-art models. The integration of the importance of every particular page on a website (i.e., the PageRank) regarding to its associations with other pages into CPT+ model can improve the performance of the existing model. Contribution: In this paper, we propose an approach to reduce prediction space while improving accuracy through combining CPT+ and PageRank algorithms. Experimental results on several real datasets indicate the space reduced by up to between 15% and 30%. As a result, the run-time is quicker. Furthermore, the prediction accuracy is improved. It is convenient that researchers go on using CPT+ to predict Webpage access. Findings: Our experimental results indicate that PageRank algorithm is a good solution to improve CPT+ prediction. An amount of though approximately 15 % to 30% of redundant data is removed from datasets while improving the accuracy. Recommendations for Practitioners: The result of the article could be used in developing relevant applications such as Webpage and product recommendation systems. Recommendation for Researchers: The paper provides a prediction model that integrates CPT+ and PageRank algorithms to tackle the problem of complexity and accuracy. The model has been experimented against several real datasets in order to show its performance. Impact on Society: Given an improving model to predict Webpage access using in several fields such as e-learning, product recommendation, link prediction, and user behavior prediction, the society can enjoy a better experience and more efficient environment while surfing the Web. Future Research: We intend to further improve the accuracy of webpage access prediction by using the combination of CPT+ and other algorithms. Full Article
se A Cognitive Knowledge-based Model for an Academic Adaptive e-Advising System By Published On :: 2020-10-08 Aim/Purpose: This study describes a conceptual model, based on the principles of concept algebra that can provide intelligent academic advice using adaptive, knowledge-based feedback. The proposed model advises students based on their traits and academic history. The system aims to deliver adaptive advice to students using historical data from previous and current students. This data-driven approach utilizes a cognitive knowledge-based (CKB) model to update the weights (values that indicate the strength of relationships between concepts) that exist between student’s performances and recommended courses. Background: A research study conducted at the Public Authority for Applied Education and Training (PAAET), a higher education institution in Kuwait, indicates that students’ have positive perceptions of the e-Advising system. Most students believe that PAAET’s e-Advising system is effective because it allows them to check their academic status, provides a clear vision of their academic timeline, and is a convenient, user-friendly, and attractive online service. Student advising can be a tedious element of academic life but is necessary to fill the gap between student performance and degree requirements. Higher education institutions have prioritized assisting undecided students with career decisions for decades. An important feature of e-Advising systems is personalized feedback, where tailored advice is provided based on students' characteristics and other external parameters. Previous e-Advising systems provide students with advice without taking into consideration their different attributes and goals. Methodology: This research describes a model for an e-Advising system that enables students to select courses recommended based on their personalities and academic performance. Three algorithms are used to provide students with adaptive course selection advice: the knowledge elicitation algorithm that represents students' personalities and academic information, the knowledge bonding algorithm that combines related concepts or ideas within the knowledge base, and the adaptive e-Advising model that recommends relevant courses. The knowledge elicitation algorithm acquires student and academic characteristics from data provided, while the knowledge bonding algorithm fuses the newly acquired features with existing information in the database. The adaptive e-Advising algorithm provides recommended courses to students based on existing cognitive knowledge to overcome the issues associated with traditional knowledge representation methods. Contribution: The design and implementation of an adaptive e-Advising system are challenging because it relies on both academic and student traits. A model that incorporates the conceptual interaction between the various academic and student-specific components is needed to manage these challenges. While other e-Advising systems provide students with general advice, these earlier models are too rudimentary to take student characteristics (e.g., knowledge level, learning style, performance, demographics) into consideration. For the online systems that have replaced face-to-face academic advising to be effective, they need to take into consideration the dynamic nature of contemporary students and academic settings. Findings: The proposed algorithms can accommodate a highly diverse student body by providing information tailored to each student. The academic and student elements are represented as an Object-Attribute-Relationship (OAR) model. Recommendations for Practitioners: The model proposed here provides insight into the potential relationships between students’ characteristics and their academic standing. Furthermore, this novel e-Advising system provides large quantities of data and a platform through which to query students, which should enable developing more effective, knowledge-based approaches to academic advising. Recommendation for Researchers: The proposed model provides researches with a framework to incorporate various academic and student characteristics to determine the optimal advisory factors that affect a student’s performance. Impact on Society: The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advice to students. The proposed approach can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to learning. Future Research: In future studies, the proposed algorithms will be implemented, and the adaptive e-Advising model will be tested on real-world data and then further improved to cater to specific academic settings. The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advisory to students. The approach proposed can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to course recommendation. Full Article
se A Multicluster Approach to Selecting Initial Sets for Clustering of Categorical Data By Published On :: 2020-10-04 Aim/Purpose: This article proposes a methodology for selecting the initial sets for clustering categorical data. The main idea is to combine all the different values of every single criterion or attribute, to form the first proposal of the so-called multiclusters, obtaining in this way the maximum number of clusters for the whole dataset. The multiclusters thus obtained, are themselves clustered in a second step, according to the desired final number of clusters. Background: Popular cluster methods for categorical data, such as the well-known K-Modes, usually select the initial sets by means of some random process. This fact introduces some randomness in the final results of the algorithms. We explore a different application of the clustering methodology for categorical data that overcomes the instability problems and ultimately provides a greater clustering efficiency. Methodology: For assessing the performance of the proposed algorithm and its comparison with K-Modes, we apply both of them to categorical databases where the response variable is known but not used in the analysis. In our examples, that response variable can be identified to the real clusters or classes to which the observations belong. With every data set, we perform a two-step analysis. In the first step we perform the clustering analysis on data where the response variable (the real clusters) has been omitted, and in the second step we use that omitted information to check the efficiency of the clustering algorithm (by comparing the real clusters to those given by the algorithm). Contribution: Simplicity, efficiency and stability are the main advantages of the multicluster method. Findings: The experimental results attained with real databases show that the multicluster algorithm has greater precision and a better grouping effect than the classical K-modes algorithm. Recommendations for Practitioners: The method can be useful for those researchers working with small and medium size datasets, allowing them to detect the underlying structure of the data in an intuitive and reasonable way. Recommendation for Researchers: The proposed algorithm is slower than K-Modes, since it devotes a lot of time to the calculation of the initial combinations of attributes. The reduction of the computing time is therefore an important research topic. Future Research: We are concerned with the scalability of the algorithm to large and complex data sets, as well as the application to mixed data sets with both quantitative and qualitative attributes. Full Article
se Enterprise Knowledge Generation Driven by Internet Integration Capability: A Mediated Moderation Model By Published On :: 2020-08-18 Aim/Purpose: Drawing on theories of organizational learning, this study analyzes the mechanism of Internet integration capability affecting knowledge generation by 399 Chinese enterprises. This paper will further explore whether there is a moderating role of learning orientation in the mechanism of Internet integration capability affecting enterprise knowledge generation. Background: The Internet has gradually integrated into the enterprise innovation system and penetrated into all aspects of technological innovation, which has promoted the integration and optimization of resources inside and outside the organization. However, there is limited understanding of how the combination of the Internet and integration capability can drive enterprise knowledge generation. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet integration capability, organizational learning, knowledge generation, and uses PROCESS macro program to test the mediated moderation effect of learning orientation. Contribution: First, this study provides empirical evidence for managers to better build Internet integration capability and ambidextrous learning to promote enterprise knowledge generation. Second, this study highlights the important moderating role of learning orientation in the mediating role of ambidextrous learning. Findings: First, the study confirms the mediating role of exploratory learning and exploitative learning in knowledge generation driven by Internet integration capability. Second, the results show that when organizations have a strong learning orientation, the indirect path of Internet integration capability influencing knowledge generation through exploratory learning will be enhanced. Recommendations for Practitioners: Enterprises should pay full attention to the improvement of internet integration capability and ambidextrous learning to promote knowledge generation. In addition, enterprises should establish a good learning atmosphere within the organization to strengthen the bridge role of exploratory learning between Internet integration capability and knowledge generation. Recommendation for Researchers: Researchers could collect data from countries with different levels of economic development to verify the universal applicability of the proposed theoretical model. Impact on Society: This study provides references for enterprises using Internet integration capability to promote their knowledge generation capability under the internet background. Future Research: Future research can compare the impact of Internet integration capability on knowledge generation in different industries. Full Article
se The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel By Published On :: 2020-07-02 Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter. Full Article
se IDCUP Algorithm to Classifying Arbitrary Shapes and Densities for Center-based Clustering Performance Analysis By Published On :: 2020-05-04 Aim/Purpose: The clustering techniques are normally considered to determine the significant and meaningful subclasses purposed in datasets. It is an unsupervised type of Machine Learning (ML) where the objective is to form groups from objects based on their similarity and used to determine the implicit relationships between the different features of the data. Cluster Analysis is considered a significant problem area in data exploration when dealing with arbitrary shape problems in different datasets. Clustering on large data sets has the following challenges: (1) clusters with arbitrary shapes; (2) less knowledge discovery process to decide the possible input features; (3) scalability for large data sizes. Density-based clustering has been known as a dominant method for determining the arbitrary-shape clusters. Background: Existing density-based clustering methods commonly cited in the literature have been examined in terms of their behavior with data sets that contain nested clusters of varying density. The existing methods are not enough or ideal for such data sets, because they typically partition the data into clusters that cannot be nested. Methodology: A density-based approach on traditional center-based clustering is introduced that assigns a weight to each cluster. The weights are then utilized in calculating the distances from data vectors to centroids by multiplying the distance by the centroid weight. Contribution: In this paper, we have examined different density-based clustering methods for data sets with nested clusters of varying density. Two such data sets were used to evaluate some of the commonly cited algorithms found in the literature. Nested clusters were found to be challenging for the existing algorithms. In utmost cases, the targeted algorithms either did not detect the largest clusters or simply divided large clusters into non-overlapping regions. But, it may be possible to detect all clusters by doing multiple runs of the algorithm with different inputs and then combining the results. This work considered three challenges of clustering methods. Findings: As a result, a center with a low weight will attract objects from further away than a centroid with higher weight. This allows dense clusters inside larger clusters to be recognized. The methods are tested experimentally using the K-means, DBSCAN, TURN*, and IDCUP algorithms. The experimental results with different data sets showed that IDCUP is more robust and produces better clusters than DBSCAN, TURN*, and K-means. Finally, we compare K-means, DBSCAN, TURN*, and to deal with arbitrary shapes problems at different datasets. IDCUP shows better scalability compared to TURN*. Future Research: As future recommendations of this research, we are concerned with the exploration of further available challenges of the knowledge discovery process in clustering along with complex data sets with more time. A hybrid approach based on density-based and model-based clustering algorithms needs to compare to achieve maximum performance accuracy and avoid the arbitrary shapes related problems including optimization. It is anticipated that the comparable kind of the future suggested process will attain improved performance with analogous precision in identification of clustering shapes. Full Article
se Social Media Use and Its Effect on Knowledge Sharing: Evidence from Public Organisations in Delta State, Nigeria By Published On :: 2020-02-07 Aim/Purpose: This study investigates social media use and its effect on knowledge sharing. Based on the review of related literature, we hypothesised that social media use has a significant effect on outward and inward knowledge sharing. Background: While the notion of social media use in work organisations has been progressively developed, empirical studies linking social media to the context of knowledge sharing have only begun to emerge. Even so, literature on social media use and its impact on public organisation is still tentative and remains a developing area. Methodology: The partial least square method was utilised in testing of hypotheses with data collected from 103 employees, who by virtue of their position and job function(s) interface with the public for the purpose of sharing knowledge via the social media space. Contribution: The study made contributions to the social knowledge management literature in two ways. First, the study developed a research model that links social media use to the two distinct dimensions of knowledge sharing. Second, the study provides a quantitative approach, where statistical techniques were applied to validate the social media use and knowledge sharing link. Findings: Statistically, the public organisations utilise social media partly for knowledge sharing, with its effect being significant on outward knowledge sharing and insignificant on inward knowledge sharing. This indicates that social media were deployed mainly for information dissemination “outward knowledge sharing” and not for stakeholders’ feedback and interaction “inward knowledge sharing”. Recommendations for Practitioners: Public organisations should develop a policy framework and guidelines for social media use to encourage the full use of this technology to inform and interact with stakeholders. It is important for this policy document to adopt best practices regarding interactive spaces so that both knowledge sharing dimensions manifest themselves in social media communications. Second, it is necessary to carry out staff training for the professional use of this technology for knowledge sharing. Recommendation for Researchers: Future studies should extend to more populations in different contexts to validate findings Impact on Society: This paper intends to influence practices adopted by organisations in the public sector to improve the knowledge sharing dimensions via the social media space. Future Research: Future studies may extend to public organisations in other geographical locations around Nigeria. It will be useful for studies to provide an international perspective by sampling public organisations from different countries or by comparing and contrasting the findings of other studies, specifically those from other countries. A longitudinal study should be encouraged to detect advancement or development with regards to the subject matter over a period of time. Full Article
se A Knowledge Transfer Perspective on Front/Back-Office Structure and New Service Development Performance: An Empirical Study of Retail Banking in China By Published On :: 2022-01-07 Aim/Purpose: The purpose of this study is to investigate the mechanism of the front/back-office structure affecting new service development (NSD) performance and examine the role of knowledge transfer in the relationship between front/back-office structure and NSD. Background: The separation of front and back-office has become the prevailing trend of the organizational transformation of modern service enterprises in the digital era. Yet, the influence of front and back-office separation dealing with new service development has not been widely researched. Methodology: Building on the internal social capital perspective, a multivariate regression analysis was conducted to investigate the impact of front/back-office structure on the NSD performance through knowledge transfer as an intermediate variable. The data was collected through a survey questionnaire from 198 project-level officers in the commercial banking industry of China. Contribution: This study advances the understanding of front/back-office structure’s influence mechanism on new service development activity. It reveals that knowledge transfer plays a critical role in bridging the impact of front and back-office separation to NSD performance under the trend of digitalization of service organizations. Findings: This study verified the positive effects of front/back-office social capital on NSD performance. Moreover, knowledge transfer predicted the variation in NSD performance and fully mediated the effect of front/back-office social capital on NSD performance. Recommendations for Practitioners: Service organizations should optimize knowledge transfer by promoting the social capital between front and back-office to overcome the negative effect organizational separation brings to NSD. Service and other organizations could explore developing an internal social network management platform, by which the internal social network could be visualized and dynamically managed. Recommendation for Researchers: The introduction of information and communications technology not only divides the organization into front and back-office, but also reduces the face-to-face customer contact. The impacts of new forms of customer contact to new service development and knowledge transfer between customer and service organizations call for further research. Along with the digital servitization, some manufacturing organizations also separate front and back-offices. The current model can be applied and assessed further in manufacturing and other service sectors. Impact on Society: The conclusion of this study guides us to pay attention to the construction of social capital inside organizations with front/back-office structure and implicates introducing and developing sociotechnical theory in front/back-office issue undergoing technological revolution. Future Research: As this study is based on the retail banking industry, similar studies are called upon in other service sectors to identify differences and draw more general conclusions. In addition, as the front and back-offices are being replaced increasingly by information technology such as artificial intelligence (AI), it is necessary to advance the research on front/back-office research with a new theoretical perspective, such as sociotechnical theory. Full Article
se Transition to a Competitive Consultant Selection Method: A Case Study of a Public Agency in Israel By Published On :: 2021-12-22 Aim/Purpose: This paper reports a case study of organizational transition from a non-competitive selection method to a novel bidding method for the selection of consultants in the Architectural and Engineering (A/E) industry. Background: Public procurement agencies are increasingly relying on external consultants for the design of construction projects. Consultant selection can be based on either competitive bidding, or quality-based criteria, or some combination between these two approaches. Methodology: Different sources of information were reviewed: internal documents, and quantitative data from the enterprise software platform (ERP). In addition, informal and unstructured interviews were conducted with relevant officials. Contribution: As there are mixed opinions in the scientific literature regarding the use of competitive bidding for the selection of consultants in the A/E industry, this paper contributes a detailed review of a transition to a competitive selection method and provides a financial and qualitative comparison between the two methods. In addition, the method implemented is novel, as it delegates most of the responsibility of hiring and managing consultants to one main contractor. Findings: While the new selection method was intended to reduce bureaucratic overload, it has unexpectedly also succeeded to reduce costs as well. Recommendations for Practitioners: It may be more efficient and profitable to adopt the selection method described in this study. Recommendation for Researchers: Similar methods can be applied to other industries successfully. Impact on Society: Our method was applied in a public organization and resulted in a better outcome, both financial and managerial. Adopting this approach can benefit public budgets. Future Research: The selection, data storage, and analysis methods are interrelated components. Future analysis of these components can help better shape the consultant selection process. Full Article
se NOTICE OF RETRACTION: THE IMPACT OF KNOWLEDGE MANAGEMENT ON FIRM INNOVATIVENESS VIA MEDIATING ROLE OF INNOVATIVE CULTURE – THE CASE OF MNES IN MALAYSIA By Published On :: 2021-10-15 Aim/Purpose: ******************************************************************************************** After its investigation, the Research Ethics, Integrity, and Governance team at RMIT University found that the primary author of this paper breached the Australian Code and/or RMIT Policy and requested that the article be retracted. ********************************************************************************************* This paper aimed to examine the impact of knowledge management on firm innovativeness of multinational enterprises (MNEs) via the mediating role of innovative culture in Malaysia. Background: Inadequate management practices and growing competition among MNEs operating in developing nations, notably in Malaysia, have hindered their organizational success. Although several studies have shown that knowledge management has a substantial impact on MNEs’ success, it is not apparent if innovation at the company level has a direct impact on their performance. Thus, there is no definitive evidence between knowledge management with business innovativeness and organizational success. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather the data in a specific period. A convenient sampling approach was used to select 296 respondents from Malaysia-dependent MNEs of different industries. One of the advantages of this study methodology is that the sample targeted many fields. Afterward, SPSS AMOS 24.0 software package analysis was performed to test the hypotheses. Contribution: The study contributes to knowledge management and firm innovativeness literature through advancing innovative culture as a mediating factor that accounts for the link between these two constructs, especially from an emerging economy perspective. The research findings also offer managerial implications for organizations in their quest to improve firm innovativeness. Findings: The results support that innovative culture significantly affects MNEs’ performance. Innovative culture enhances the capability of MNEs to be innovative that finally leads to the superior performance of firm innovativeness. Recommendations for Practitioners: According to this research, companies that exhibit an innovative culture, the acquisition of new information, the conversion of tacit knowledge into explicit knowledge, the application of knowledge, and the safeguarding of knowledge, all have a positive effect on their innovativeness. This means that for organizations to run an innovative MNE in Malaysia, a creative culture must be fostered since the current study has shown how it is seen as a catalyst that facilitates learning, transformation, and implementation of relevant knowledge. Recommendation for Researchers: Future studies should be carried out in other sectors aside from the manufacturing sector using the same scales used to measure knowledge management. Furthermore, a comparative analysis of knowledge management and firm innovativeness using innovative culture as a mediator should be researched in other developing economies. Impact on Society: While the main aim of this study was to better understand how and why MNEs operate the way they do, it had an indirect impact on the business and political tactics taken by CEOs and managers working in MNEs in developing countries, as this research has shown. Future Research: Future research should employ the methodology presented in this study and pursue this in other sectors, such as emerging and developed nations’ major businesses, to validate the results and further generalize the conclusions. Other methods should also be incorporated to investigate the other dimensions of MNEs’ performance, including market orientation, technology orientation, and entrepreneurial orientation. Full Article
se Students’ Continuance Intention to Use Moodle: An Expectation-Confirmation Model Approach By Published On :: 2021-08-08 Aim/Purpose: This study aims at investigating the factors that influence students’ continuous intention to use Moodle, as an exemplar of learning management systems (LMSs), in the post-adoption phase. Background: Higher education institutions (HEIs) have invested heavily in learning management systems (LMSs), such as Moodle and BlackBoard, as these systems enhance students’ learning and improve their interactions with the educational systems. While most studies on LMSs have focused on the pre-adoption or acceptance phases of this technology, the determinant factors that influence students’ continuance intention to use LMSs have received less attention in the information systems (IS) literature. Methodology: The theoretical model for this study was primarily drawn from the expectation-confirmation model (ECM). A total of 387 Kuwaiti students, from a private American University in the State of Kuwait, participated in this study. Partial least squares (PLS) was employed to analyze the data. Contribution: This study contributes to the existing scientific knowledge in different ways. First, this study extends the expectation confirmation model (ECM) by integrating factors that are important to students’ continuous intention to use LMSs, including system interactivity, effort expectancy, attitude, computer anxiety, self-efficacy, subjective norms, and facilitating conditions. Second, this study adds on a Kuwaiti literature context by focusing on the continuous intention to use LMSs, which is, to the best of our knowledge, the first study that extends and empirically assesses the applicability of the ECM in the LMSs context in a developing country – Kuwait. Third, this study conceptually and empirically differentiates between satisfaction and attitude, as two separate affect constructs, which were taken as interchangeable factors in ECM, and were disregarded by a large number of prior ECM studies concerned with continuous use intention. Finally, this study aims to assist HEIs, faculty members, and systems’ developers in understanding the main factors that influence students’ continuance use intention of LMSs. Findings: While subjective norms were not significant, the results mainly showed that students’ continuous intention to use Moodle is significantly influenced by performance expectancy, effort expectancy, attitude, satisfaction, self-efficacy and facilitating conditions. The study’s results also confirmed that satisfaction and attitude are two conceptually and empirically different constructs, conflicting with the views that these constructs can be taken as interchangeable factors in the ECM. Recommendations for Practitioners: This study offers several useful practical implications. First, given the significant influence of system interactivity on performance expectancy and satisfaction, faculty members should modify their teaching approach by enabling communication and interaction among instructors, students, and peers using the LMS. Second, given the significant influence of performance expectancy, satisfaction, and attitude on continuous intention to use the LMS, HEIs should conduct training programs for students on the effective use of the LMS. This would increase students’ awareness regarding the usefulness of the LMS, enhance their attitude towards the LMS, and improve their satisfaction with the system. Third, given the significant role of effort expectancy in influencing performance expectancy, attitude, and students’ continuous intention to use Moodle, developers and system programmers should design the LMS with easy to use, high quality, and customizable user interface. This, in turn, will not only motivate students’ performance expectancy, but will also influence their attitude and continuous intention to use the system. Recommendation for Researchers: This study conceptually and empirically differentiates between satisfaction and attitude, as two separate affect constructs, which were taken as interchangeable factors in ECM and were disregarded by a large number of prior ECM studies concerned with continuous use intention. Hence, it is recommended that researchers include these two constructs in their research models when investigating continuous intention to use a technology. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other LMSs, such as Blackboard. Future Research: This study focused on how different factors affected students’ continuous intention to use Moodle but did not consider all determinants of successful system, such as system quality, information quality, and instructional as well as course content quality. Thus, future research should devote attention to the effects of these quality characteristics of LMS. Full Article
se Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective By Published On :: 2021-08-07 Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS. Full Article
se Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem By Published On :: 2021-07-27 Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. Full Article
se Establishing a Security Control Framework for Blockchain Technology By Published On :: 2021-07-27 Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures. Full Article
se The Influence of Soft Skills on Employability: A Case Study on Technology Industry Sector in Malaysia By Published On :: 2021-07-11 Aim/Purpose: This research investigates the influence of soft skills on graduates’ employability in the technology industry, using the technology industry sector in Malaysia as a case. Background: Organizations are looking for appropriate mechanisms to hire qualified employees with strong soft skills and hard skills. This requires that job candidates possess a set of qualifications and skills which impact their employability. Methodology: Fuzzy Delphi analysis was conducted as preliminary study to identify the critical soft skills required by technology industry sector. The preliminary study produced ten critical soft skills to form a conceptual model of their influence on employability. Then, an online questionnaire survey was distributed in two industry companies in Malaysia to collect research data, and regression analysis was conducted to validate the conceptual model. Contribution: This research focuses on the influence of soft skills on graduate employability in the technology industry sector, since the selection of the best candidate in the industry will improve employee performance and lead to business success. Findings: The results of regression analysis confirmed that Communication skills, Attitude, Integrity, Learnability, Motivation, and Teamwork are significantly correlated with employability, which means that these soft skills are the critical factors for employability in Malaysian technology companies. Recommendations for Practitioners: The model proposed in this article can be used by employers to give better assessment of candidates’ compatibility with the jobs available. Impact on Society: This research highlights the critical soft skills required by technology industry sector, which will reduce the unemployment percentages among graduates. Future Research: More studies are required to examine the soft skills found in the literature and to define the most important skills from a general perspective of the industry. Future research should assess the moderating role of other variables, such as skills gap, employee performance, and employee knowledge. Furthermore, it is recommended to conduct similar studies of soft skills for employability in other countries. Full Article
se Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception By Published On :: 2021-05-07 Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged. Full Article
se A Decision Support System and Warehouse Operations Design for Pricing Products and Minimizing Product Returns in a Food Plant By Published On :: 2021-01-28 Aim/Purpose: The first goal is to develop a decision support system for pricing and production amounts for a firm facing high levels of product returns. The second goal is to improve the management of the product returns process. Background: This study was conducted at a food importer and manufacturer in Israel facing a very high rate of product returns, much of which is eventually discarded. The firm’s products are commonly considered to be a low-cost generic alternative and are therefore popular among low-income families. Methodology: A decision support module was added to the plant’s business information system. The module is based on a supply chain pricing model and uses the sales data to infer future demand’s distribution. Ergonomic models were used to improve the design of the returns warehouse and the handling of the returns. Contribution: The decision support system allows to improve the plant’s pricing and quantity planning. Consequently, it reduced the size of product returns. The new design of the returns process is expected to improve worker’s productivity, reduces losses and results in safer outcomes. This study also demonstrates a successful integration and of a theoretical economical model into an information system. Findings: The results show the promise of incorporating pricing supply chain models into informing systems to achieve a practical business task. We were able to construct actual demand distributions from the data and offer actual pricing recommendations that reduce the number of returns while increasing potential profits. We were able to identify key deficiencies in the returns operations and added a module to the decisions support system that improves the returns management and links it with the sales and pricing modules. Finally, we produced a better warehouse design that supports efficient and ergonomic product returns handling. Recommendations for Practitioners: This work can be replicated for different suppliers, manufacturers and retailers that suffer from product returns. They will benefit from the reduction in returns, as well as the decrease in the losses associated with these returns. Recommendation for Researchers: It is worthwhile to research whether decision support systems can be applied to other aspects of the organizations’ operations. Impact on Society: Product returns is a lose-lose situation for producers, retailers and customers. Moreover, mismanagement of these returns is harmful for the environment and may result in the case of foods, in health hazards. Reducing returns and improving the handling improves sustainability and is beneficial for society. Future Research: The decision support system’s underlying pricing model assumes a specific business setting. This can be extended using other pricing models and applying them in a similar fashion to the current application. Full Article
se Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study By Published On :: 2021-01-18 Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further. Full Article
se The View of IT-Consuming Firms on the Key Digital Service Capabilities of IT-Producing Firms By Published On :: 2022-12-08 Aim/Purpose: This study focuses on the connection between IT-producing firms’ digital service capabilities and the digital service performance of IT-consuming firms, especially online shop operators. Background: The acquisition and integration of knowledge regarding digital service capabilities and performance can increase the level at which employees assimilate information, organize with IT-consuming firms, and cooperate with them to develop the delivery of services and customize services to fill their needs. Exploring capabilities that may enable this process is a prerequisite for all businesses offering digital services and, thus, an engrossing and ongoing interest of practitioners and scholars. However, there is a lack of research on the relationship between IT-producing firms’ digital service capabilities and the digital service performance of IT-consuming firms in the business-to-business (B2B) context. Methodology: The study builds on a survey conducted among small firms that have an online shop in use and are located in Finland. Contribution: The study offers empirical evidence for the capabilities valued by IT-consuming firms, providing a model for IT-producing firms to use when deciding on a future focus. The study was executed in a B2B setting from the viewpoint of online shop operators, presenting a novel understanding of influential digital service capabilities. Findings: Adaptability, determined by capabilities related to utilizing information gained via the integration of a digital product into other digital tools (e.g., marketing, personalization, and analytics), statistically significantly affects all three aspects of an IT-consuming firm’s digital service performance (financial, operational, and sales). Another product capability, availability, which includes aspects such as security, different aspects of functioning, and mobile adaptation, affects one aspect of digital performance, namely operational. The results also suggest that the role of service process-related capabilities in determining service comprehensiveness significantly influences two aspects of IT-consuming firms’ digital service performance: financial (negative effect) and operational (positive effect). The results show that the capabilities associated with the relationship between the producing firm and the consuming firm do not affect IT-consuming firms’ performance to the same extent. Recommendations for Practitioners: The study results suggest that IT-producing firms should concentrate on leveraging service comprehensiveness, as there has been a shift in the B2B context from merely selling a digital product and associated services. It seems that usability-related issues are now taken for granted, and the emphasis is on features that support the use of information to create value. Recommendation for Researchers: The results contribute to the capabilities literature by showing that the shift in focus from technical product-related capabilities to relationship-related capabilities is not yet evident among small online store operators. Impact on Society: In addition to offering tools with different integration possibilities, supporting IT-consuming firms in making the most of the possibilities would be very helpful. Future Research: The comprehension of the relationship between digital service capabilities and digital service performance would benefit from future research that takes into account additional control variables. The theoretical model of this study can be further studied by using other performance measures, such as market performance, as dependent variables. Full Article
se A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model By Published On :: 2022-12-03 Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods. Full Article
se Predicting Key Predictors of Project Desertion in Blockchain: Experts’ Verification Using One-Sample T-Test By Published On :: 2022-10-04 Aim/Purpose: The aim of this study was to identify the critical predictors affecting project desertion in Blockchain projects. Background: Blockchain is one of the innovations that disrupt a broad range of industries and has attracted the interest of software developers. However, despite being an open-source software (OSS) project, the maintenance of the project ultimately relies on small core developers, and it is still uncertain whether the technology will continue to attract a sufficient number of developers. Methodology: The study utilized a systematic literature review (SLR) and an expert review method. The SLR identified 21 primary studies related to project desertion published in Scopus databases from the year 2010 to 2020. Then, Blockchain experts were asked to rank the importance of the identified predictors of project desertion in Blockchain. Contribution: A theoretical framework was constructed based on Social Cognitive Theory (SCT) constructs; personal, behavior, and environmental predictors and related theories. Findings: The findings indicate that the 12 predictors affecting Blockchain project desertion identified through SLR were important and significant. Recommendations for Practitioners: The framework proposed in this paper can be used by the Blockchain development community as a basis to identify developers who might have the tendency to abandon a Blockchain project. Recommendation for Researchers: The results show that some predictors, such as code testing tasks, contributed code decoupling, system integration and expert heterogeneity that are not covered in the existing developer turnover models can be integrated into future research efforts. Impact on Society: This study highlights how an individual’s design choices could determine the success or failure of IS projects. It could direct Blockchain crypto-currency investors and cyber-security managers to pay attention to the developer’s behavior while ensuring secure investments, especially for crypto-currencies projects. Future Research: Future research may employ additional methods, such as a meta-analysis, to provide a comprehensive picture of the main predictors that can predict project desertion in Blockchain. Full Article
se The Relationship Between Critical Success Factors, Perceived Benefits, and Usage Intention of Mobile Knowledge Management Systems in the Malaysian Semiconductor Industry By Published On :: 2022-10-03 Aim/Purpose: This study examined the relationship between critical success factors (CSFs), perceived benefits, and usage intention of Mobile Knowledge Management Systems (MKMS) via an integrated Technology Acceptance Model (TAM) and Information Systems Success Model (ISSM). Background: This study investigates the CSFs (i.e., Strategic Leadership, Employee Training, System Quality, and Information Quality) that impact the usage intention of KMS in mobile contexts which have been neglected. Since users normally consider the usefulness belief in a system before usage, this study examines the role of perceived benefits as a mediator between the CSFs and usage intention. Methodology: A survey-based research approach in the Malaysian semiconductor industry was employed via an integrated model of TAM and ISSM. At a response rate of 59.52%, the findings of this study were based on 375 usable responses. The data collected was analyzed using the Partial Least Squares with SmartPLS 3.0. Contribution: This study contributes to the body of knowledge in the areas of mobile technology acceptance and knowledge management. Specifically, it helps to validate the integrated model of TAM and ISSM with the CSFs from knowledge management and information system. In addition, it provides the would-be adopters of MKMS with valuable guidelines and insights to consider before embarking on the adoption stage. Findings: The findings suggest that Employee Training and Information Quality have a positive significant relationship with Perceived MKMS Benefits. On the contrary, Strategic Leadership, System Quality, and Perceived User-friendliness showed an insignificant relationship with Perceived MKMS Benefits. Additionally, Employee Training and Information Quality have an indirect relationship with MKMS Usage Intention which is mediated by Perceived MKMS Benefits. Recommendations for Practitioners: The findings are valuable for managers, engineers, KM practitioners, KM consultants, MKMS developers, and mobile device producers to enhance MKMS usage intention. Recommendation for Researchers: Researchers would be able to conduct more inter-disciplinary studies to better understand the relevant issues concerning both fields – knowledge management and mobile computing disciplines. Additionally, the mediation effect of TAM via Perceived Usefulness (i.e., perceived MKMS benefits) on usage intention of MKMS should be further investigated with other CSFs. Future Research: Future studies could perhaps include other critical factors from both KM and IS as part of the external variables. Furthermore, Perceived Ease of Use (i.e., Perceived User-friendly) should be tested as a mediator in the future, together with Perceived Usefulness (i.e., perceived MKMS Benefits) to compare which would be a more powerful predictor of usage intention. Moreover, it may prove interesting to find out how the research framework would fit into other industries to verify the findings of this study for better accuracy and generalizability. Full Article
se Towards a Framework on the Use of Infomediaries in Maternal mHealth in Rural Malawi By Published On :: 2022-09-18 Aim/Purpose: The aim of the study is to explore factors that affect how healthcare clients in rural areas use infomediaries in maternal mHealth interventions. The study focuses on maternal healthcare clients who do not own mobile phones but use the mHealth intervention. Background: Maternal mHealth interventions in poor-resource settings are bedevilled by inequalities in mobile phone ownership. Clients who do not own mobile phones risk being excluded from benefiting from the interventions. Some maternal mHealth providers facilitate the access of mobile phones for those who do not own them using “infomediaries”. Infomediaries, in this case, refer to individuals who have custody of mobile phones that other potential beneficiaries may use. However, the use of infomediaries to offer access to the “have nots” may be influenced by a number of factors. Methodology: The study uses a case of a maternal mHealth intervention project in Malawi, as well as a qualitative research method and interpretive paradigm. Data was collected using secondary data from the implementing agency, semi-structured interviews, and focus group discussions. Empirical data was collected from maternal healthcare clients who do not own mobile phones and infomediaries. Data were analysed inductively using thematic analysis. Contribution: The study proposed a theoretical framework for studying infomediaries in ICT4D. The study may inform mHealth designers, implementers, and policymakers on how infomediaries could be implemented in a rural setting. Consequently, understanding the factors that affect the use of infomediaries may inform mHealth intervention implementers on how they could overcome the challenges by implementing mHealth interventions that reduce the challenges on the mHealth infomediaries side, and the maternal healthcare clients’ side. Findings: Characteristics of the maternal healthcare client, characteristics of the mHealth infomediary, perceived value of mHealth intervention, and socio-environmental factors affect maternal healthcare clients’ use of mHealth infomediaries. Recommendations for Practitioners: Implementers of interventions ought to manage the use of infomediaries to avoid volunteer fatigue and infomediaries who may not be compatible with the potential users of the intervention. Implementers could leverage traditional systems of identifying and using infomediaries instead of reinventing the wheel. Recommendation for Researchers: This research adopted a single case study to develop the theoretical framework for mHealth infomediary use. We recommend future studies are conducted in order to test and develop this framework further, not only in ICT4D, but also in other areas of application. Impact on Society: People still lack access. The lack of ownership of technology may still exclude them from participating in an information society. The use of infomediaries may help to provide access to technologies to those who do not have them thereby bridging the digital divide gap. Future Research: We propose herein that traditional systems may offer a good starting point for designing a system that would work for communities. We, therefore, recommend that future research may explore these possibilities. Full Article
se Traits Contributing to the Promotion of the Individual’s Continuance Usage Intention and Perceived Value of M-University Services By Published On :: 2022-06-25 Aim/Purpose: This study aims to examine the roles of key traits of m-university services and their users in promoting two crucial post-adoption outcomes of these services; namely, continuance usage intention and perceived value. Background: M-university (i.e., a university providing services via mobile technologies) has gained a great interest in the higher education sector as a driver of new business models and innovative service offerings. However, its assessment has been greatly overlooked, especially in evaluating the factors that drive the stakeholders’ continuance intention to use it and the determinants of its post-adoption perceived value. Consequently, research efforts undertaking such assessment facets empirically are highly required. Methodology: An integrated research model that enables such assessment was developed and evaluated using a quantitative research methodology. Accordingly, data were collected using a formulated closed-ended survey questionnaire. The target population consisted of the academic staff of a Saudi public university that has witnessed an extensive adoption of m-university services. The obtained data (i.e., 207 fully completed responses) were evaluated using the structural equation modeling approach. Contribution: To the best of our knowledge, this is the first study that gains the chance to provide the research community and m-service providers with new knowledge and understanding about the predictors that drive the continuance usage intention and value of m-university services. Findings: The findings showed that all of the examined traits of m-university services and their users (i.e., reliability, usability, customization, self-efficacy, and involvement) are having positive roles in promoting the continuance intention to use these services, while only two traits (i.e., reliability and involvement) contribute significantly to augmenting the perceived value. Recommendations for Practitioners: The study recommends developing effective design and implementation specifications that strengthen the contributions of the examined traits in the post-adoption stage of m-university services. Recommendation for Researchers: Further studies should be devoted to addressing the notable need to assess the factors influencing the adoption of m-university services, as well as to explore which ones are having significant roles in the attainment of post-adoption outcomes. Impact on Society: The empirical insights provided by the present study are essential for both university stakeholders and mobile service providers in their endeavors to improve the key aspects of the anticipated post-adoption outcomes of the provided services. Future Research: Further empirical investigations are needed to examine the roles of more m-university services and user traits in achieving a broad range of post-adoption outcomes of such services. Full Article
se Adoption of Mobile Commerce and Mobile Payments in Ghana: An Examination of Factors Influencing Public Servants By Published On :: 2022-06-25 Aim/Purpose: Mobile commerce adoption is low in developing countries; hence, public servants may not consider mobile commerce and mobile payments. Understanding the factors that influence mobile commerce and mobile payments in their context will aid in promoting those services. Background: The study investigates the factors that influence public servants’ mobile commerce and mobile payments in Ghana. Hence, it provides some understanding of the various aspects of mobile commerce and mobile payments adoption, such as acceptance, use, and eventual adoption into the user’s daily life, and how that affects their behaviour. Methodology: The research was conducted by surveying the factors influencing public servants’ adoption of mobile commerce and payments in Ghana. A cross-sectional survey was undertaken to put the research model to the test to measure the constructs and their relationships. Contribution: The study confirmed previous findings and created a new conceptual model for mobile commerce and mobile payment adoption and usage in the Ghanaian context. Findings: The variables of performance expectancy, trust, and facilitating conditions have a significant positive influence on behavioural intention. The factors of effort expectation and social influence have a significant negative impact. Price value and perceived reliability are latent variables that do not affect behavioural intention. Behavioural intention and facilitating conditions significantly influence the actual use behaviour of mobile commerce and mobile payment users. Recommendations for Practitioners: Mobile commerce is emerging as a new mode of transactions, with firms providing enabling platforms for users. Mobile commerce could become the most acceptable application for the next generation of mobile platform applications. This study offers insights into the fluidity of the mobile environment, with implications that spell out what will be effective mobile commerce services that will continue to be relevant. Mobile applications are attractive to people because they provide a better user experience. These mobile applications have been optimised to provide a fast, easy and delightful experience. Mobile commerce and mobile payment service providers can attract and retain more users if attention is paid to performance expectancy, trust, and facilitating conditions since they influence individuals’ decisions to adopt. Mobile technology is almost ubiquitous, influencing both online sales and in-store sales. With the right mobile commerce platform and features, businesses can expect to increase in-store and online sales, catering to a more extensive clientele. Mobile devices are the primary means that most customers use to look up information about products they see in stores, such as product reviews and pricing options. This study indicates that mobile commerce service providers can achieve a more extensive customer base by promoting performance expectancy, trust, and behavioural intentions. Recommendation for Researchers: Despite the numerous studies in the mobile commerce literature, few have used integrated models of perceived reliability, trust, and price value or methods to evaluate these factors in the emerging mobile commerce industry. Also, it combines mobile commerce and mobile payments, which very few that we know of have done. Impact on Society: Ghana is already in a cash-lite economy. Thus, the study is appropriate with the result of trust being a significant factor. It implies that people will begin using mobile commerce and mobile payments with a bit of drive to bring about this drive quickly. Future Research: Future research could further test the adapted model with moderating factors of age, gender, and education to delve deeper into the complexities of mobile commerce and mobile payments. Full Article
se Drivers of the Consumers Adoption of Fintech Services By Published On :: 2022-06-06 Aim/Purpose: This study aimed to explore the impact of environmental drivers and trust on consumers’ adoption of Fintech services in the Jordanian context. It had also evaluated the mediating role of trust on the relation between environmental drivers and consumers adoption of Fintech services. Background: The reviewed studies on Fintech adoption demonstrated a lack of focus on the role of external or environmental drivers on consumers’ intentions to use and continue to use of Fintech services. Amongst the analyzed studies, the majority had examined the role of consumers perception of services usefulness and ease of use while few had included some environmental variables within the investigated variables such as social influence and government support. Furthermore, shortage of Fintech adoption related research in the developing countries, especially the Jordanian context was noted. Methodology: The study conceptual model was derived from Social Cognitive Theory (SCT) and Technological Personal Environmental (TPE) framework. This study was a quantitative one that employed survey method to empirically address its research questions and test the proposed hypotheses. Jordanian residents over the age of 18 who are familiar with Fintech were targeted, and convenience sampling was applied to get representative sample. Data was assembled from 323 respondents using an online questionnaire. Partial Least Squares Structure Equation Modeling (PLS-SEM) was applied to analyze the gathered data through SMART-PLS software. Contribution: This article adds to the existing literature on multiple stands, as it adds to literature related to Fintech adoption, as well as the interaction between consumer environment and their level of adoption. It also enriches the limited literature on the influence of COVID-19 to drive consumer usage of innovative services. Moreover, it supplements the scarce literature on Fintech adoption in the Jordanian settings. Findings: The main findings revealed the positive influence of both environmental drivers and trust as predictors of consumer intention to use Fintech services. It had also asserted the positive mediating effect of trust on the relationship amongst environmental drivers and consumer usage intent. Recommendations for Practitioners: By understanding the importance of consumer environment and trust on encouraging consumer to adopt Fintech services, governments, policy makers and practitioners can utilize this knowledge to adopt their offered services. They need to work on enhancing the technological infrastructure, as well as establishing general technological knowledge. They also need to highlight the role of Fintech service in fighting Covid-19, by adhering to the social distancing rules. Moreover, they need to guarantee the security and reliability of the developed services to increase their level of trust in the offered services. Recommendation for Researchers: This research has confirmed the positive influence of consumer environment represented by social influence, government support, technological readiness, and COVID-19 on their adoption of Fintech services. It has also established the mediating influence of consumer trust on the relation between environmental drivers and consumer intent to use Fintech services. This area is unexplored and needs more validation. Impact on Society: By understanding the factors affecting the Jordanian society in adopting Fintech services, this research provides set of recommendation to the Jordanian government and policy makers that can lead for more adoption of the developed Fintech services, which in turn would lead to better services provided to the society as well as increasing the financial inclusion level in the Jordanian society. Future Research: Future research can explore other environmental variables that were not included in the current research. Future research can also investigate the moderating effect of personal attributes such as consumer’s demographics, or more personal attributes such as self-efficacy, inherit innovativeness or risk aversion. It can also examine the moderating effect of financial literacy and/ or technological background. Full Article
se Human Resource Management and Humanitarian Operations Performance: A Case Study of Humanitarian Organizations in Malaysia By Published On :: 2022-06-03 Aim/Purpose: This research aims to analyze the effect of human resource management on humanitarian operations performance, using humanitarian organizations in Malaysia as a case. Background: Humanitarian organizations need to develop and continue effective on-the-job human resource management, such as training and development and managing employee performance to enhance the performance of their humanitarian operations. Methodology: The sampling technique that was conducted is probability sampling. In particular, the technique is called stratified sampling. This technique is chosen because it is involving the division of a population into a smaller group, called “strata”. The questionnaire survey was distributed to humanitarian organizations in Malaysia to collect research data, and PLS-SEM analysis was conducted to validate the conceptual model. Contribution: This research focuses on the effect of human resource management on humanitarian operations performance in humanitarian organizations with consistent training to ensure successful humanitarian operations. Findings: The results of PLS-SEM analysis confirmed that Training and Employee Development, Recruitment and Employee Selection, and Communicative Management Style are significantly correlated with humanitarian operations performance, giving 75.7% variations which means that these human resource management are critical factors for increasing humanitarian operations performance in Malaysian humanitarian organizations. Recommendations for Practitioners: This research will enhance humanitarian operations performance for humanitarian organizations, in-line policies outlined under the Malaysia National Security Council Directive No. 20, and benefit the field of disaster management. Recommendation for Researchers: This research can be used by the authorized individual involved in humanitarian operations to satisfy the needs of the victims, which ultimately contributes to the performance of these humanitarian organizations. Impact on Society: This research highlighted the human resource management that is vital for humanitarian organizations, which will increase humanitarian operations performance in an organization. Future Research: This study is conducted in the context of humanitarian organizations in Malaysia. It is unclear whether the key findings of this study can be generalized. Therefore, it is suggested that, in future research, the current research model should be extended to include different countries for validation. Full Article
se The International Case for Micro-Credentials for Life-Wide And Life-Long Learning: A Systematic Literature Review By Published On :: 2022-05-01 Aim/Purpose: Systematic literature reviews seek to locate all studies that contain material of relevance to a research question and to synthesize the relevant outcomes of those studies. The primary aim of this paper was to synthesize both research and practice reports on micro-credentials (MCRs). Background: There has been an increase in reports and research on the plausibility of MCRs to support dynamic human skills development for an increasingly impatient and rapidly changing digital world. The integration of fast-paced emerging technologies and digitalization necessitate alternative learning paradigms. MCRs offer time, financial, and space flexibility and can be stacked into a larger qualification, thereby allowing for a broader range of transdisciplinary competencies within a qualification. However, MCRs often lack the academic rigor required for accreditation within existing disciplines. Methodology: The study followed the PRISMA framework (Preferred Reporting Items for Systematic Reviews and Meta Analyses), which offers a rigorous method to enhance reporting quality. The study used both academic research and practice reports. Contribution: The paper makes a theoretical contribution to the discourse about the need for innovation within existing educational paradigms for continued relevance in a changing world. It also contributes to the debate on the role of MCRs in bridging the gap between practice and academia despite the growing difference between their interests, and the role that MCRs play in the social-economic plans of countries. Findings: The key findings are that investments in MCRs are mainly in the Science, Technology, Engineering and Mathematics (STEM) and Education sectors, and have taken place mainly in high-income countries and regions – contexts that particularly value practice-accredited MCRs. Low-income countries, by contrast, remain traditional and insist on MCRs that are formally accredited by a recognized academic institution. This contributes to a widening skills gap between low- and high-income countries or regions, which results in greater global disparities. There is also a growing divide between academia and practice concerning their interest in MCRs (a reflection of the rigor versus relevance debate), which partially explains why many global and larger organizations have gone on to create their own learning institutions. Recommendations for Practitioners: We recommend that educational mechanisms consider the critical importance of MCRs as part of innovative efforts for life-wide (different sectors) and life-long (same sector) learning, especially in low-income countries. MCRs provide dynamic mechanisms to fill skills gaps in an increasing ruthless international battle for talent. Recommendation for Researchers: We recommend focused research into skills and career pathways using MCRs while at the same time remaining responsive to transdisciplinary efforts and sensitive to global and local changes within any sector. Impact on Society: Work and society have transformed over time, and more so in the new digital age, yet academia has been slow in adapting to the changes, forcing organizations to create their own learning institutions or to use MCRs to fill the skills gap. The purpose of education goes beyond preparing individuals for work, extending further to creating an environment where individuals and governments seek their own social and economic outcomes. MCRs provide a flexible means for co-creation between individuals, education, organizations, and government that could stem global rising unemployment, social exclusion, and redundancy. Future Research: Future research should focus on the co-creation of MCRs between practitioners and academia. Full Article
se The Extended TRA Model for the Assessment of Factors Driving Individuals’ Behavioral Intention to Use Cryptocurrency By Published On :: 2022-04-28 Aim/Purpose: The aim of this study was to explore the factors driving individuals’ behavioral intention to use cryptocurrency in Saudi Arabia using the extended TRA model. Background: Despite the great potential of cryptocurrencies and the exponential growth of cryptocurrency use throughout the world, scholarly research on this topic remained scarce. Whereas prior studies are mostly done in developed countries or specific cultural contexts, limiting the generalizability of their results, they mainly used technology adoption models that cannot fully explain the acceptance of new technology involved with financial transactions such as cryptocurrency and provided contradictory evidence. Entire regions have been excluded from the research on this topic, including Saudi Arabia which has a high potential to increase the volume of cryptocurrency use. Methodology: This study extends the theory of reasoned action (TRA) with the factors from technology adoption models that proved relevant for this topic, namely perceived usefulness, perceived enjoyment, perceived innovativeness, and perceived risk with three sub-factors: security, financial, and privacy risk. Data are collected using a quantitative research methodology from 181 respondents residing in Saudi Arabia and then analyzed by several methods, including exploratory factor analysis (EFA), confirmatory factor analysis (CFA), and structural equation modeling (SEM). Contribution: This study contributes to the scientific knowledge by extending the TRA model with a range of factors from the technology adoption field, thus enabling the analysis of this topic from human, financial, and technology perspectives and providing additional empirical evidence on the factors that previously either provided contradictory evidence or were not explored in this field. This research also provides the first empirical data on this topic in Saudi Arabia and enables further research on the topic and a comparison of the results. The study also contributes to practice by enhancing the actual understanding of the phenomena and providing valuable information and recommendations for governments, investors, merchants, developers, and the general population. Findings: The study found attitude, subjective norm, perceived usefulness, perceived enjoyment, personal innovativeness, privacy risk, and financial risk as significant predictors of the intention to use cryptocurrencies, whereas the influence of security risk was not found to be significant in Saudi Arabia. Recommendations for Practitioners: Using this study’s results, governments can create appropriate legal frameworks, developers can design fewer complex platforms, and merchants may create appropriate campaigns that emphasize the benefits of cryptocurrency use and transpire trust in cryptocurrency transactions by enhancing the factors with a positive impact, such as usefulness, enjoyment, and personal innovativeness while reducing concerns of potential users regarding the risky factors. By promoting a positive user experience, they can also improve attitudes and social norms towards cryptocurrencies, thus further stimulating the interest in their use. Recommendation for Researchers: As this study validated the influence of factors from technology, financial, and human-related fields, researchers may follow this approach to ensure a comprehensive analysis of this complex topic, especially as privacy risk was never examined in this context, while personal innovativeness, perceived enjoyment, financial, and security risk were explored in just a few studies. It is also recommended that researchers explore the impact of each part of subjective norms: social media, friends, and family, as well as how information on the benefits of cryptocurrencies affects the perception of the factors included. Impact on Society: Understanding the factors affecting cryptocurrency use can help utilize the full potential of cryptocurrencies, especially their benefits for developing countries reflected in safe, speedy, and low-cost financial transactions with no need for an intermediary. The research model of this study could also be used to investigate this topic in other contexts to discover similarities and differences, as well as to investigate other information systems. Future Research: Future studies should test this research model in similar and different contexts to determine whether its validity and study results depend on cultural and contextual factors. They can also include different or additional variables, or use mixed methods, as interviews would augment the comprehension of this topic. Future studies may also explore whether the impact of variables would remain the same if circumstances changed or use cases expanded, and how the preferences of the target population would change within a longitudinal time frame. Full Article
se Adoption of Mobile Commerce Services Among Artisans in Developing Countries By Published On :: 2022-02-24 Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce into their everyday business and how perceived usefulness, perceived ease of use, subjective norms, age, gender, expertise, and educational level affected the adoption and usage of m-commerce. Background: This study integrates well-established theoretical models to create a new conceptual model that ensures a comprehensive mobile commerce adoption survey. Methodology: A cross-sectional survey was conducted to measure the constructs and their relations to test the research model. Contribution: The study’s findings confirmed previous results and produced a new conceptual model for mobile commerce adoption and usage. Findings: Except for gender, perceived ease of use, and subjective norms that did not have specific effects on mobile commerce adoption, age, educational level, perceived usefulness, expertise, attitude, and behavioral intention showed significant effects. Recommendations for Practitioners: First of all, mobile commerce service providers should strategically pay critical attention to customer-centered factors that positively affect the adoption of mobile commerce innovations than focusing exclusively on technology-related issues. Mobile service providers can attract more users if they carefully consider promoting elements like perceived usefulness and perceived ease of use which directly or indirectly affect the individuals’ decision to adopt information technology from consumer perspectives. Second, mobile commerce service providers should strategically focus more on younger individuals since, per the research findings, they are more likely to adopt mobile commerce innovations than the older folks in Ghana. Third, service providers should also devise strategies to retain actual users of m-commerce by promoting elements like behavioral intentions and attitude, which according to the research findings, have a higher predictive power on actual usage of m-commerce. Recommendation for Researchers: The conceptual model developed can be employed by researchers worldwide to analyze technology acceptance research. Impact on Society: The study’s findings suggested that mobile commerce adoption could promote a cashless society that is convenient for making buying things quicker and easier. Future Research: The research sample size could be increased, and also the study could all sixteen regions in Ghana or any other country for a broader representation. Full Article
se Dark Side of Mobile Phone Technology: Assessing the Impact of Self-Phubbing and Partner-Phubbing on Life Satisfaction By Published On :: 2024-02-08 Aim/Purpose: The study aims to explore the attributes of self-phubbing and partner-phubbing, as well as their impact on marital relationship satisfaction and the quality of communication. Furthermore, it aims to comprehend how these characteristics could impact an individual’s total level of life satisfaction. Background: The study aims to establish a clear association between specific mobile phone usage behaviors and their subsequent impact on relationship satisfaction and the quality of communication. This study investigates the effects of two types of behaviors on interpersonal relationships: self-phubbing, which refers to an individual being deeply absorbed in their own mobile phone use, and partner-phubbing, which refers to witnessing one’s partner being deeply absorbed in a mobile device. Methodology: This study utilizes a quantitative approach. The poll involved 150 smartphone users in Malaysia who are in relationships, and they participated by completing a questionnaire. The data analysis was performed using the Partial Least Squares-based Structural Equation Modeling method. Contribution: This research addresses the gap and gives insight into the consequences of self and partner phubbing and its impact on the relationship and life satisfaction among partners by providing a research model that was validated with primary data. Findings: The results of this survey show that smartphone conflicts harm relationship satisfaction but not communication quality. It was revealed that communication quality does not directly bring a negative impact on life satisfaction, but it directly affects relationship satisfaction, which, in turn, harms life satisfaction. Recommendations for Practitioners: The findings of this study can be used by practitioners to improve relationship counseling and therapy. Through the integration of the notion of phubbing and its impact on relationship happiness, couples can receive guidance on how to reduce the tension that arises from using smartphones. Recommendation for Researchers: Previous research was conducted exclusively on only an individual’s phubbing behavior, but limited work was done on the partner’s phubbing behavior. Future researchers can enhance this model by identifying more factors. Impact on Society: This study addresses broader societal ramifications in addition to the dynamics of particular relationships. This study promotes a more mindful use of smartphones by exposing the complex relationships between technology use, relationship happiness, and general life contentment. This will ultimately lead to healthier relationships and improved societal well-being. Future Research: In the future, we are going to implement an artificial neural network approach to test this data to predict the most important factors that influence phubbing. Full Article
se Epidemic Intelligence Models in Air Traffic Networks for Understanding the Dynamics in Disease Spread - A Case Study By Published On :: 2023-11-12 Aim/Purpose: The understanding of disease spread dynamics in the context of air travel is crucial for effective disease detection and epidemic intelligence. The Susceptible-Exposed-Infectious-Recovered-Hospitalized-Critical-Deaths (SEIR-HCD) model proposed in this research work is identified as a valuable tool for capturing the complex dynamics of disease transmission, healthcare demands, and mortality rates during epidemics. Background: The spread of viral diseases is a major problem for public health services all over the world. Understanding how diseases spread is important in order to take the right steps to stop them. In epidemiology, the SIS, SIR, and SEIR models have been used to mimic and study how diseases spread in groups of people. Methodology: This research focuses on the integration of air traffic network data into the SEIR-HCD model to enhance the understanding of disease spread in air travel settings. By incorporating air traffic data, the model considers the role of travel patterns and connectivity in disease dissemination, enabling the identification of high-risk routes, airports, and regions. Contribution: This research contributes to the field of epidemiology by enhancing our understanding of disease spread dynamics through the application of the SIS, SIR, and SEIR-HCD models. The findings provide insights into the factors influencing disease transmission, allowing for the development of effective strategies for disease control and prevention. Findings: The interplay between local outbreaks and global disease dissemination through air travel is empirically explored. The model can be further used for the evaluation of the effectiveness of surveillance and early detection measures at airports and transportation hubs. The proposed research contributes to proactive and evidence-based strategies for disease prevention and control, offering insights into the impact of air travel on disease transmission and supporting public health interventions in air traffic networks. Recommendations for Practitioners: Government intervention can be studied during difficult times which plays as a moderating variable that can enhance or hinder the efficacy of epidemic intelligence efforts within air traffic networks. Expert collaboration from various fields, including epidemiology, aviation, data science, and public health with an interdisciplinary approach can provide a more comprehensive understanding of the disease spread dynamics in air traffic networks. Recommendation for Researchers: Researchers can collaborate with international health organizations and authorities to share their research findings and contribute to a global understanding of disease spread in air traffic networks. Impact on Society: This research has significant implications for society. By providing a deeper understanding of disease spread dynamics, it enables policymakers, public health officials, and practitioners to make informed decisions to mitigate disease outbreaks. The recommendations derived from this research can aid in the development of effective strategies to control and prevent the spread of infectious diseases, ultimately leading to improved public health outcomes and reduced societal disruptions. Future Research: Practitioners of the research can contribute more effectively to disease outbreaks within the context of air traffic networks, ultimately helping to protect public health and global travel. By considering air traffic patterns, the SEIR-HCD model contributes to more accurate modeling and prediction of disease outbreaks, aiding in the development of proactive and evidence-based strategies to manage and mitigate the impact of infectious diseases in the context of air travel. Full Article
se Multiple Models in Predicting Acquisitions in the Indian Manufacturing Sector: A Performance Comparison By Published On :: 2023-11-01 Aim/Purpose: Acquisitions play a pivotal role in the growth strategy of a firm. Extensive resources and time are dedicated by a firm toward the identification of prospective acquisition candidates. The Indian manufacturing sector is currently experiencing significant growth, organically and inorganically, through acquisitions. The principal aim of this study is to explore models that can predict acquisitions and compare their performance in the Indian manufacturing sector. Background: Mergers and Acquisitions (M&A) have been integral to a firm’s growth strategy. Over the years, academic research has investigated multiple models for predicting acquisitions. In the context of the Indian manufacturing industry, the research is limited to prediction models. This research paper explores three models, namely Logistic Regression, Decision Tree, and Multilayer Perceptron, to predict acquisitions. Methodology: The methodology includes defining the accounting variables to be used in the model which have been selected based on strong theoretical foundations. The Indian manufacturing industry was selected as the focus, specifically, data for firms listed in the Bombay Stock Exchange (BSE) between 2010 and 2022 from the Prowess database. There were multiple techniques, such as data transformation and data scrubbing, that were used to mitigate bias and enhance the data reliability. The dataset was split into 70% training and 30% test data. The performance of the three models was compared using standard metrics. Contribution: The research contributes to the existing body of knowledge in multiple dimensions. First, a prediction model customized to the Indian manufacturing sector has been developed. Second, there are accounting variables identified specific to the Indian manufacturing sector. Third, the paper contributes to prediction modeling in the Indian manufacturing sector where there is limited research. Findings: The study found significant supporting evidence for four of the proposed hypotheses indicating that accounting variables can be used to predict acquisitions. It has been ascertained that statistically significant variables influence acquisition likelihood: Quick Ratio, Equity Turnover, Pretax Margin, and Total Sales. These variables are intrinsically linked with the theories of liquidity, growth-resource mismatch, profitability, and firm size. Furthermore, comparing performance metrics reveals that the Decision Tree model exhibits the highest accuracy rate of 62.3%, specificity rate of 66.4%, and the lowest false positive ratio of 33.6%. In contrast, the Multilayer Perceptron model exhibits the highest precision rate of 61.4% and recall rate of 64.3%. Recommendations for Practitioners: The study findings can help practitioners build custom prediction models for their firms. The model can be developed as a live reference model, which is continually updated based on a firm’s results. In addition, there is an opportunity for industry practitioners to establish a benchmark score that provides a reference for acquisitions. Recommendation for Researchers: Researchers can expand the scope of research by including additional classification modeling techniques. The data quality can be enhanced by cross-validation with other databases. Textual commentary about the target firms, including management and analyst quotes, provides additional insight that can enhance the predictive power of the models. Impact on Society: The research provides insights into leveraging emerging technologies to predict acquisitions. The theoretical basis and modeling attributes provide a foundation that can be further expanded to suit specific industries and firms. Future Research: There are opportunities to expand the scope of research in various dimensions by comparing acquisition prediction models across industries and cross-border and domestic acquisitions. Additionally, it is plausible to explore further research by incorporating non-financial data, such as management commentary, to augment the acquisition prediction model. Full Article
se Investigating Factors Affecting the Intention to Use Mobile Health from a Holistic Perspective: The Case of Small Cities in China By Published On :: 2023-10-07 Aim/Purpose: This study aims to develop a comprehensive conceptual framework that incorporates personal characteristics, social context, and technological features as significant factors that influence the intention of small-city users in China to use mobile health. Background: Mobile health has become an integral part of China’s health management system innovation, the transformation of the health service model, and a necessary government measure for promoting health service parity. However, mobile health has not yet been widely adopted in small cities in China. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 319 potential users in China using China’s health management system. The data was analyzed using the PLS-SEM (the partial least squares-structural equation modeling) approach. Contribution: This study integrates the protection motivation theory (PMT), which compensates for the limitations of the unified theory of acceptance and use of technology theory (UTAUT) and is a re-examination of PMT and UTAUT in a small city context in China. Findings: The findings indicate that attitude and perceived vulnerability in the personal characteristic factors, social influence and facilitating conditions in the social context factors, and performance expectancy in the technological feature factors influence users’ intention to use mobile health in small cities in China. Recommendations for Practitioners: This study provides feasible recommendations for mobile health service providers, medical institutions, and government agencies based on the empirical results. Recommendation for Researchers: As for health behavior, researchers should fully explain the intention of mobile health use in terms of holism and health behavior theory. Impact on Society: This study aims to increase users’ intention to use mobile health in small cities in China and to maximize the social value of mobile health. Future Research: Future research should concentrate on the actual usage behavior of users and simultaneously conduct a series of longitudinal studies, including studies on continued usage behavior, abandonment behavior, and abandoned-and-used behavior. Full Article
se A Novel Telecom Customer Churn Analysis System Based on RFM Model and Feature Importance Ranking By Published On :: 2023-10-03 Aim/Purpose: In this paper, we present an RFM model-based telecom customer churn system for better predicting and analyzing customer churn. Background: In the highly competitive telecom industry, customer churn is an important research topic in customer relationship management (CRM) for telecom companies that want to improve customer retention. Many researchers focus on a telecom customer churn analysis system to find out the customer churn factors for improving prediction accuracy. Methodology: The telecom customer churn analysis system consists of three main parts: customer segmentation, churn prediction, and churn factor identification. To segment the original dataset, we use the RFM model and K-means algorithm with an elbow method. We then use RFM-based feature construction for customer churn prediction, and the XGBoost algorithm with SHAP method to obtain a feature importance ranking. We chose an open-source customer churn dataset that contains 7,043 instances and 21 features. Contribution: We present a novel system for churn analysis in telecom companies, which encompasses customer churn prediction, customer segmentation, and churn factor analysis to enhance business strategies and services. In this system, we leverage customer segmentation techniques for feature construction, which enables the new features to improve the model performance significantly. Our experiments demonstrate that the proposed system outperforms current advanced customer churn prediction methods in the same dataset, with a higher prediction accuracy. The results further demonstrate that this churn analysis system can help telecom companies mine customer value from the features in a dataset, identify the primary factors contributing to customer churn, and propose suitable solution strategies. Findings: Simulation results show that the K-means algorithm gets better results when the original dataset is divided into four groups, so the K value is selected as 4. The XGBoost algorithm achieves 79.3% and 81.05% accuracy on the original dataset and new data with RFM, respectively. Additionally, each cluster has a unique feature importance ranking, allowing for specialized strategies to be provided to each cluster. Overall, our system can help telecom companies implement effective CRM and marketing strategies to reduce customer churn. Recommendations for Practitioners: More accurate churn prediction reduces misjudgment of customer churn. The acquisition of customer churn factors makes the company more convenient to analyze the reasons for churn and formulate relevant conservation strategies. Recommendation for Researchers: The research achieves 81.05% accuracy for customer churn prediction with the Xgboost and RFM algorithms. We believe that more enhancements algorithms can be attempted for data preprocessing for better prediction. Impact on Society: This study proposes a more accurate and competitive customer churn system to help telecom companies conserve the local markets and reduce capital outflows. Future Research: The research is also applicable to other fields, such as education, banking, and so forth. We will make more new attempts based on this system. Full Article
se Determinants of the Intention to Use Big Data Analytics in Banks and Insurance Companies: The Moderating Role of Managerial Support By Published On :: 2023-10-03 Aim/Purpose: The aim of this research paper is to suggest a comprehensive model that incorporates the technology acceptance model with the task-technology fit model, information quality, security, trust, and managerial support to investigate the intended usage of big data analytics (BDA) in banks and insurance companies. Background: The emergence of the concept of “big data,” prompted by the widespread use of connected devices and social media, has been pointed out by many professionals and financial institutions in particular, which makes it necessary to assess the determinants that have an impact on behavioral intention to use big data analytics in banks and insurance companies. Methodology: The integrated model was empirically assessed using self-administered questionnaires from 181 prospective big data analytics users in Moroccan banks and insurance firms and examined using partial least square (PLS) structural equation modeling. The results cover sample characteristics, an analysis of the validity and reliability of measurement models’ variables, an evaluation of the proposed hypotheses, and a discussion of the findings. Contribution: The paper makes a noteworthy contribution to the BDA adoption literature within the finance sector. It stands out by ingeniously amalgamating the Technology Acceptance Model (TAM) with Task-Technology Fit (TTF) while underscoring the critical significance of information quality, trust, and managerial support, due to their profound relevance and importance in the finance domain. Thus showing BDA has potential applications beyond the finance sector. Findings: The findings showed that TTF and trust’s impact on the intention to use is considerable. Information quality positively impacted perceived usefulness and ease of use, which in turn affected the intention to use. Moreover, managerial support moderates the correlation between perceived usefulness and the intention to use, whereas security did not affect the intention to use and managerial support did not moderate the influence of perceived ease of use. Recommendations for Practitioners: The results suggest that financial institutions can improve their adoption decisions for big data analytics (BDA) by understanding how users perceive it. Users are predisposed to use BDA if they presume it fits well with their tasks and is easy to use. The research also emphasizes the importance of relevant information quality, managerial support, and collaboration across departments to fully leverage the potential of BDA. Recommendation for Researchers: Further study may be done on other business sectors to confirm its generalizability and the same research design can be employed to assess BDA adoption in organizations that are in the advanced stage of big data utilization. Impact on Society: The study’s findings can enable stakeholders of financial institutions that are at the primary stage of big data exploitation to understand how users perceive BDA technologies and the way their perception can influence their intention toward their use. Future Research: Future research is expected to conduct a comparison of the moderating effect of managerial support on users with technical expertise versus those without; in addition, international studies across developed countries are required to build a solid understanding of users’ perceptions towards BDA. Full Article
se The Segmentation of Mobile Application Users in The Hotel Booking Journey By Published On :: 2023-09-26 Aim/Purpose: This study aims to create customer segmentation who use Online Travel Agent (OTA) mobile applications in Indonesia throughout their hotel booking journey. Background: In the context of mobile hotel booking applications, research analyzing the customer experience at each customer journey stage is scarce. However, literature increasingly acknowledges the significance of this stage in comprehending customer behavior and revenue streams. Methodology: This study employs a mixed-method and exploratory approach by doing in-depth interviews with 20 participants and questionnaires from 207 participants. Interview data are analyzed using thematic analysis, while the questionnaires are analyzed using descriptive statistics. Contribution: This study enriches knowledge in understanding customer behavior that considers the usage of mobile apps as a segmentation criterion in the hotel booking journey. Findings: We developed four user personas (no sweat player, spotless seeker, social squad, and bargain hunter) that show customer segmentation based on the purpose, motivation, and actions in each journey stage (inspiration, consideration, reservation, and experience). Recommendations for Practitioners: The resulting customer segmentation enables hospitality firms to improve their current services by adapting to the needs of various segments and avoiding unanticipated customer pain points, such as incomplete information, price changes, no social proof, and limited payment options. Recommendation for Researchers: The quality and robustness of the customer segment produced in this study can be further tested based on the criteria of homogeneity, size, potential benefits, segment stability, segment accessibility, segment compatibility, and segment actionability. Impact on Society: This study has enriched the existing literature by establishing a correlation between user characteristics and how they use smartphones for tourism planning, focusing on hotel booking in mobile applications. Future Research: For future research, each customer segment’s demographic and behavioral factors can be explored further. Full Article
se Content-Rating Consistency of Online Product Review and Its Impact on Helpfulness: A Fine-Grained Level Sentiment Analysis By Published On :: 2023-09-22 Aim/Purpose: The objective of this research is to investigate the effect of review consistency between textual content and rating on review helpfulness. A measure of review consistency is introduced to determine the degree to which the review sentiment of textual content conforms with the review rating score. A theoretical model grounded in signaling theory is adopted to explore how different variables (review sentiment, review rating, review length, and review rating variance) affect review consistency and the relationship between review consistency and review helpfulness. Background: Online reviews vary in their characteristics and hence their different quality features and degrees of helpfulness. High-quality online reviews offer consumers the ability to make informed purchase decisions and improve trust in e-commerce websites. The helpfulness of online reviews continues to be a focal research issue regardless of the independent or joint effects of different factors. This research posits that the consistency between review content and review rating is an important quality indicator affecting the helpfulness of online reviews. The review consistency of online reviews is another important requirement for maintaining the significance and perceived value of online reviews. Incidentally, this parameter is inadequately discussed in the literature. A possible reason is that review consistency is not a review feature that can be readily monitored on e-commerce websites. Methodology: More than 100,000 product reviews were collected from Amazon.com and preprocessed using natural language processing tools. Then, the quality reviews were identified, and relevant features were extracted for model training. Machine learning and sentiment analysis techniques were implemented, and each review was assigned a consistency score between 0 (not consistent) and 1 (fully consistent). Finally, signaling theory was employed, and the derived data were analyzed to determine the effect of review consistency on review helpfulness, the effect of several factors on review consistency, and their relationship with review helpfulness. Contribution: This research contributes to the literature by introducing a mathematical measure to determine the consistency between the textual content of online reviews and their associated ratings. Furthermore, a theoretical model grounded in signaling theory was developed to investigate the effect on review helpfulness. This work can considerably extend the body of knowledge on the helpfulness of online reviews, with notable implications for research and practice. Findings: Empirical results have shown that review consistency significantly affects the perceived helpfulness of online reviews. The study similarly finds that review rating is an important factor affecting review consistency; it also confirms a moderating effect of review sentiment, review rating, review length, and review rating variance on the relationship between review consistency and review helpfulness. Overall, the findings reveal the following: (1) online reviews with textual content that correctly explains the associated rating tend to be more helpful; (2) reviews with extreme ratings are more likely to be consistent with their textual content; and (3) comparatively, review consistency more strongly affects the helpfulness of reviews with short textual content, positive polarity textual content, and lower rating scores and variance. Recommendations for Practitioners: E-commerce systems should incorporate a review consistency measure to rank consumer reviews and provide customers with quick and accurate access to the most helpful reviews. Impact on Society: Incorporating a score of review consistency for online reviews can help consumers access the best reviews and make better purchase decisions, and e-commerce systems improve their business, ultimately leading to more effective e-commerce. Future Research: Additional research should be conducted to test the impact of review consistency on helpfulness in different datasets, product types, and different moderating variables. Full Article
se Antecedents of Business Analytics Adoption and Impacts on Banks’ Performance: The Perspective of the TOE Framework and Resource-Based View By Published On :: 2023-09-18 Aim/Purpose: This study utilized a comprehensive framework to investigate the adoption of Business Analytics (BA) and its effects on performance in commercial banks in Jordan. The framework integrated the Technological-Organizational-Environmental (TOE) model, the Diffusion of Innovation (DOI) theory, and the Resource-Based View (RBV). Background: The recent trend of utilizing data for business operations and decision-making has positively impacted organizations. Business analytics (BA) is a leading technique that generates valuable insights from data. It has gained considerable attention from scholars and practitioners across various industries. However, guidance is lacking for organizations to implement BA effectively specific to their business contexts. This research aims to evaluate factors influencing BA adoption by Jordanian commercial banks and examine how its implementation impacts bank performance. The goal is to provide needed empirical evidence surrounding BA adoption and outcomes in the Jordanian banking sector. Methodology: The study gathered empirical data by conducting an online questionnaire survey with senior and middle managers from 13 commercial banks in Jordan. The participants were purposefully selected, and the questionnaire was designed based on relevant and well-established literature. A total of 307 valid questionnaires were collected and considered for data analysis. Contribution: This study makes a dual contribution to the BA domain. Firstly, it introduces a research model that comprehensively examines the factors that influence the adoption of BA. The proposed model integrates the TOE framework, DOI theory, and RBV theory. Combining these frameworks allows for a comprehensive examination of BA adoption in the banking industry. By analyzing the technological, organizational, and environmental factors through the TOE framework, understanding the diffusion process through the DOI theory, and assessing the role of resources and capabilities through the RBV theory, researchers and practitioners can better understand the complex dynamics involved. This integrated approach enables a more nuanced assessment of the factors that shape BA adoption and its subsequent impact on business performance within the banking industry. Secondly, it uncovers the effects of BA adoption on business performance. These noteworthy findings stem from a rigorous analysis of primary data collected from commercial banks in Jordan. By presenting a holistic model and delving into the implications for business performance, this research offers valuable insights to researchers and practitioners alike in the field of BA. Findings: The findings revealed that various technological (data quality, complexity, compatibility, relative advantage), organizational (top management support, organizational readiness), and environmental (external support) factors are crucial in shaping the decision to adopt BA. Furthermore, the study findings demonstrated a positive relationship between BA adoption and performance outcomes in Jordanian commercial banks. Recommendations for Practitioners: The findings suggest that Jordanian commercial banks should enforce data quality practices, provide clear standards, invest in data quality tools and technologies, and conduct regular data audits. Top management support is crucial for fostering a data-driven decision-making culture. Organizational readiness involves having the necessary resources and skilled personnel, as well as promoting continuous learning and improvement. Highlighting the benefits of BA helps overcome resistance to technological innovation and encourages adoption by demonstrating improved decision-making processes and operational efficiency. Furthermore, external support is crucial for banks to adopt Business Analytics (BA). Banks should partner with experienced vendors to gain expertise and incorporate best practices. Vendors also provide training and technical support to overcome technological barriers. Compatibility is essential for optimal performance, requiring managers to modify workflows and IT infrastructure. Complexity, including data, organizational, and technical complexities, is a major obstacle to BA adoption. Banks should take a holistic approach, focusing on people, processes, and technology, and prioritize data quality and governance. Building a skilled team, fostering a data-driven culture, and investing in technology and infrastructure are essential. Recommendation for Researchers: The integration of the TOE framework, the DOI theory, and the RBV theory can prove to be a powerful approach for comprehensively analyzing the various factors that influence BA adoption within the dynamic banking industry. Furthermore, this combined framework enables us to gain deeper insights into the subsequent impact of BA adoption on overall business performance. Impact on Society: Examining the factors influencing BA adoption in the banking industry and its subsequent impact on business performance can have wide-ranging societal implications. It can promote data-driven decision-making, enhance customer experiences, strengthen fraud detection, foster financial inclusion, contribute to economic growth, and trigger discussions on ethical considerations. Future Research: To further advance future research, there are several avenues to consider. One option is to broaden the scope by including a larger sample size, allowing for a more comprehensive analysis. Another possibility is to investigate the impact of BA adoption on various performance indicators beyond the ones already examined. Additionally, incorporating qualitative research methods would provide a more holistic understanding of the organizational dynamics and challenges associated with the adoption of BA in Jordanian commercial banks. Full Article
se How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia By Published On :: 2023-09-07 Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. Full Article
se The Implications of Knowledge-Based HRM Practices on Open Innovations for SMEs in the Manufacturing Sector By Published On :: 2023-08-04 Aim/Purpose: The main aim of this study was to investigate the impact of knowledge-based Human Resources Management (HRM) practices on inbound and outbound open innovation in Jordanian small and medium enterprises (SMEs). Background: SMEs in Jordan lack tangible resources. This insufficiency can be remedied by using knowledge as a resource. According to the Knowledge-Based View (KBV) theory, which posits knowledge as the most valuable resource, SMEs can achieve open innovation by implementing knowledge-based HRM practices that enhance the utilization of knowledge and yield competitiveness. Methodology: This study adopted the quantitative method employing descriptive and exploratory approaches. A total of 500 Jordanian manufacturing SMEs were selected from 2,310 manufacturing SMEs registered lists, according to the Jordan Social Security, by using random sampling. The study’s instrument was a questionnaire that was applied to these SMEs. There were 335 responses that were deemed useful for analysis after filtering out the replies with missing values; this corresponded to a response rate of 67%. The paper utilized structural equation modeling and cross-sectional design to test hypotheses in the proposed research model. Contribution: This study advocates the assumption of the role of KBV in improving innovation practices. This study contributes to the existing strategic HRM research by extending the understanding of knowledge-based HRM practices in the context of SMEs. Thus, this study contributes to the understanding of innovation management by demonstrating the role of knowledge-based HRM practices in boosting inbound and outbound OI practices, thereby enhancing innovation as an essential component of firm competitiveness. Findings: The findings revealed the positive impact of four knowledge-based HRM practices on inbound and outbound open innovation in Jordanian manufacturing SMEs. These practices were knowledge-based recruitment and selection, knowledge-based training and development, knowledge-based compensation and reward, as well as knowledge-based performance assessment. Recommendations for Practitioners: This study is expected to help the stakeholders of SMEs to re-shape the traditional HRM practices into knowledge-based practices which improve managerial skills, innovation practices, and the level of the firm’s competitiveness. Recommendation for Researchers: This study serves as a significant contribution to the research field of innovation practices by building a new association between knowledge-based HRM practices and inbound and outbound open innovation. Impact on Society: The study emphasizes the vital role of knowledge-based HRM practices in enhancing the knowledge and social skills of the human capital in SMEs in Jordan, thus improving the country’s social and economic development. Future Research: Future research could build on this study to include service SMEs. It could also employ a longitudinal study over the long run which would allow for a deeper analysis of the relationships of causality, offering a more comprehensive view of the effect of knowledge-based HRM on open innovation. Furthermore, future research could examine the sample of investigation before and after implementing the knowledge-based HRM practices to provide stronger evidence of their influence on inbound and outbound innovation. Full Article