ntr The Need to Balance the Blend: Online versus Face-to-Face Teaching in an Introductory Accounting Subject By Published On :: Full Article
ntr Informing Implementers of Lean Strategy in Process Industries – The Central Role of Schedulers By Published On :: Full Article
ntr The Potential of E-Learning in Assisting Post-Crisis Countries in Re-Building Their Higher Education Systems: The Case of Libya By Published On :: Full Article
ntr Learning and Assessment Practices of Doctoral Studies of Developing and Developed Countries: A Case Study of Doctoral Studies in Bangladesh By Published On :: Full Article
ntr Usability and Pedagogical Assessment of an Algorithm Learning Tool: A Case Study for an Introductory Programming Course for High School By Published On :: 2015-06-03 An algorithm learning tool was developed for an introductory computer science class in a specialized science and technology high school in Japan. The tool presents lessons and simple visualizations that aim to facilitate teaching and learning of fundamental algorithms. Written tests and an evaluation questionnaire were designed and implemented along with the learning tool among the participants. The tool’s effect on the learning performance of the students was examined. The differences of the two types of visualizations offered by the tool, one with more input and control options and the other with fewer options, were analyzed. Based on the evaluation questionnaire, the scales with which the tool can be assessed according to its usability and pedagogical effectiveness were identified. After using the algorithm learning tool there was an increase in the posttest scores of the students, and those who used the visualization with more input and control options had higher scores compared to those who used the one with limited options. The learning objectives used to evaluate the tool correlated with the test performance of the students. Properties comprised of learning objectives, algorithm visualization characteristics, and interface assessment are proposed to be incorporated in evaluating an algorithm learning tool for novice learners. Full Article
ntr Technological Entrepreneurship Framework for University Commercialization of Information Technology By Published On :: 2016-05-31 One effective way of accelerating the commercialization of university innovations (inventions) is to execute a “Technological Entrepreneurship” framework that helps the execution of agreements between universities and industry for commercialization. Academics have been encouraged to commercialize their research and findings yet the level of success of commercialization of inventions (innovations) in industry is questionable. As there is no agreed commercialization framework to guide the execution of processes to support inventions moving from laboratories to the right market. The lack of capabilities of appropriate processes have undermined the turning of innovation and products into wealth. The research questions are designed to identify the constraints and hindrances of commercialization and the characteristics of successful processes built from framework based on selected case studies of incubation capabilities within universities commercialization program. Full Article
ntr Fuzzy Control Teaching Models By Published On :: 2016-05-21 Many degree courses at technical universities include the subject of control systems engineering. As an addition to conventional approaches Fuzzy Control can be used to easily find control solutions for systems, even if they include nonlinearities. To support further educational training, models which represent a technical system to be controlled are required. These models have to represent the system in a transparent and easy cognizable manner. Furthermore, a programming tool is required that supports an easy Fuzzy Control development process, including the option to verify the results and tune the system behavior. In order to support the development process a graphical user interface is needed to display the fuzzy terms under real time conditions, especially with a debug system and trace functionality. The experiences with such a programming tool, the Fuzzy Control Design Tool (FHFCE Tool), and four fuzzy teaching models will be presented in this paper. The methodical and didactical objective in the utilization of these teaching models is to develop solution strategies using Computational Intelligence (CI) applications for Fuzzy Controllers in order to analyze different algorithms of inference or defuzzyfication and to verify and tune those systems efficiently. Full Article
ntr Innovating and Entrepreneurial Initiatives: Some Cases of Success By Published On :: 2017-05-03 Aim/Purpose: To understand the change of entrepreneurial initiatives by analysing some new initiatives that came up the last years based on IT enabled business models Background: The theme is described from an educational perspective by offering examples of successful entrepreneurship initiatives Methodology: Description of some cases: Waynabox, Lock up, Uber, Pinterest Contribution: This project tries to become a guide for youth in order to understand various aspects: first, the entrepreneurial aspects that have to be considered before starting a business; secondly, the characteristics that successful businesses have in common; and finally how an entrepreneur can be innovative and how they can achieve the success Findings: Only the 10% of the start-ups exist more than three years. Among the causes of failure are the high saturation of the market and the market competition, which are connected to the ignorance of the real necessity of customers. The company has to identify the needs of customers. They have to define and target their customers by observing and analyzing the market and, above all, getting in touch with the customers. The business plan is something that has to be carried out before the beginning of the project, and has to exist on paper. Everything has to be planned and organised, and the objectives have to be clearly stated in order to stay focused Recommendations for Practitioners : To use existent business models as an inspiration for the creation of a new business model. It is really important to avoid copying the business model itself. One thing that a company needs to do is to make the difference offering new characteristics adapted to the current customer’s experiences Recommendation for Researchers: It is really important to have a good relation with the customer, to attend their needs and to help them with all the doubts that they can have about the company. An entrepreneur cannot be guided by his own interests. He has to invest in order to know the needs of the potential customers Impact on Society : Customer experience is key to have success in new business models Full Article
ntr Increasing Intrinsic Motivation of Programming Students: Towards Fix and Play Educational Games By Published On :: 2018-05-18 Aim/Purpose: The objective of this research is to investigate the effectiveness of educational games on learning computer programming. In particular, we are examining whether allowing students to manipulate the underlying code of the educational games will increase their intrinsic motivation. Background: Young students are fond of playing digital games. Moreover, they are also interested in creating game applications. We try to make use of both of these facts. Methodology: A prototype was created to teach the fundamentals of conditional structures. A number of errors were intentionally included in the game at different stages. Whenever an error is encountered, students have to stop the game and fix the bug before proceeding. A pilot study was conducted to evaluate this approach. Contribution: This research investigates a novel approach to teach programming using educational games. This study is at the initial stage. Findings: Allowing the programming students to manipulate the underlying code of the educational game they play will increase their intrinsic motivation. Recommendations for Practitioners: Creating educational games to teach programming, and systematically allowing the players to manipulate the gaming logic, will be beneficial to the students. Recommendation for Researchers: This research can be extended to investigate how various artificial intelligence techniques can be used to model the gamers, for example, skill level. Impact on Society: The future generations of students should be able to use digital technologies proficiently. In addition, they should also be able to understand and modify the underlying code in the digital things (like Internet of Things).This research attempts to alleviate the disenchantment associated with learning coding. Future Research: A full scale evaluation – including objective evaluation using game scores – will be conducted. One-way MANOVA will be used to analyze the efficacy of the proposed intervention on the students’ performance, and their intrinsic motivation and flow experience. Full Article
ntr Learning Entrepreneurship through Virtual Multicultural Teamwork By Published On :: 2019-05-10 Aim/Purpose: This paper explores the benefits and challenges of experiencing virtual multi-cultural teamwork in order to learn entrepreneurship. Background: Entrepreneurial eco-system usually requires working in international, virtual multi-cultural diverse teams. Higher education institutes are trying to educate future generation of entrepreneurs, coping with challenges derived from the virtual work and cultural diversity. Prior research shows that traditional learning is not effective for entrepreneurial education. Methodology: An explorative study was conducted based on the BIPA project, a Bavarian (German)-Israeli Partnership Accelerator, which was held four times between 2015 and 2017. The project aims to experience entrepreneurial virtual multicul-tural teamwork via co-creation of tailored-solutions for challenges of German or Israeli corporates. Retrospective interviews with participants were held after finishing their mission, and analyzed. Contribution: This research contributes to the body of knowledge about multicultural diverse participants in virtual entrepreneurial environments, in order to work together. This situation raises new challenges, due to the combination of multicultural teamwork and the use of virtual communication. Findings: The multicultural teamwork was a trigger to participate, specifically in the con-text of entrepreneurship studies with those two cultures, German and Israeli, which were found by participants as complementary, stimulating and fruitful, although challenging. Through experience, participants improved their entrepreneurial skills and mindset. The major teamwork challenges that were found included conflicts concerning free-riding, as well as communication challenges, due to virtual, language and cultural communication competencies. Recommendations for Practitioners: At a practical level, results can be useful for global companies, showing the benefits of virtual teamwork of employees in different locations, both in terms of reducing expenses and improving innovation. Moreover, managers can motivate employees by highlighting personal benefits, such as cultural awareness and improving their entrepreneurial skills and mindset. In addition, faculty may use this kind of experience to enhance entrepreneurial learning skills and mindset. Recommendations for Researchers : At the theoretical level, this research advances the body of knowledge of entrepreneurial multicultural teamwork in a virtual environment. In this research, the teams worked for a short time together (14 weeks) and had a week of face-to-face interaction with their team members. It is recommended to examine long-term teamwork, and how it affects teamwork challenges, as well as entrepreneurial learning. This research found the combination of German-Israeli cultures as stimulating entrepreneurial teamwork. It is recommended to examine other cultural combinations in teams, in order to be able to generalize findings. Impact on Society: Understanding the needs, benefits, and challenges of entrepreneurial multicul-tural teams working in a virtual environment can be useful to current global entrepreneurial eco-system, which is commonly using this kind of teamwork. Future Research: This study included teams from two cultures: German and Israeli. Research must be expanded to different cultures and to groups compounded from more than two cultures. Moreover, the combination of virtual communication and face-to-face meetings in different milestones during the timeline of the teamwork must be further examined, especially in longer projects. Full Article
ntr How to Program a Chatbot – An Introductory Project and Student Perceptions By Published On :: 2019-04-06 Aim/Purpose: One of the most fascinating developments in computer user interfaces in recent years is the rise of “chatbots”. Yet extent information system (IS) curriculum lacks teaching resources on chatbots programming.. Background: To better prepare students for this new technological development and to enhance the IS curriculum, we introduce a project that teaches students how to program simple chatbots, including a transactional chatbot and a conversational chatbot. Methodology: We demonstrated a project that teaches students how to program two types of simple chatbots: a transactional chatbot and a conversational chatbot. We also conducted a survey to examine students’ perceptions on their learning experience. Findings: Our survey on students’ perception of the project finds that learning chatbots is deemed very useful because chatbot programming projects have enabled the students to understand the subject better. We also found that social influence has positively motivated the students to learn chatbot programming. Though most of the students have no prior experiences programming chatbots, their self-efficacy towards chatbot programming remained high after working through the programming project. Despite the difficult tasks, over 71% of respondents agree to various degrees that chatbot programming is fun. Though most students agree that chatbot programming is not easy to learn, more than 70% of respondents indicated that they will use or learn chatbots in the near future. The overwhelmingly positive responses are impressive given that this is the first time for the students to program and learn chatbots. Recommendations for Practitioners: In this article, we introduced a step by step project on teaching chatbot programming in an information systems class. Following the project instructions, students can get their first intelligent chatbots up and running in a few hours using Slack. This article describes the project in detail as well as students’ perceptions. Recommendations for Researchers: We used UTAUT model to measure students’ perception of the projects. This study could be of value to researchers studying students’ technology learning and adoption behaviors. Impact on Society: To our best knowledge, pedagogical resources that teach IS students how to program chatbots, especially the introductory level materials, are limited. We hope this teaching case could be of value for IS educators when introducing IS students to the wonderful field of chatbot programming. Future Research: For future work, we plan to expand the teaching resources to cover more advanced chatbot programming projects, such as on how to make chatbot more human-like. Full Article
ntr Machine Learning-based Flu Forecasting Study Using the Official Data from the Centers for Disease Control and Prevention and Twitter Data By Published On :: 2021-06-03 Aim/Purpose: In the United States, the Centers for Disease Control and Prevention (CDC) tracks the disease activity using data collected from medical practice's on a weekly basis. Collection of data by CDC from medical practices on a weekly basis leads to a lag time of approximately 2 weeks before any viable action can be planned. The 2-week delay problem was addressed in the study by creating machine learning models to predict flu outbreak. Background: The 2-week delay problem was addressed in the study by correlation of the flu trends identified from Twitter data and official flu data from the Centers for Disease Control and Prevention (CDC) in combination with creating a machine learning model using both data sources to predict flu outbreak. Methodology: A quantitative correlational study was performed using a quasi-experimental design. Flu trends from the CDC portal and tweets with mention of flu and influenza from the state of Georgia were used over a period of 22 weeks from December 29, 2019 to May 30, 2020 for this study. Contribution: This research contributed to the body of knowledge by using a simple bag-of-word method for sentiment analysis followed by the combination of CDC and Twitter data to generate a flu prediction model with higher accuracy than using CDC data only. Findings: The study found that (a) there is no correlation between official flu data from CDC and tweets with mention of flu and (b) there is an improvement in the performance of a flu forecasting model based on a machine learning algorithm using both official flu data from CDC and tweets with mention of flu. Recommendations for Practitioners: In this study, it was found that there was no correlation between the official flu data from the CDC and the count of tweets with mention of flu, which is why tweets alone should be used with caution to predict a flu out-break. Based on the findings of this study, social media data can be used as an additional variable to improve the accuracy of flu prediction models. It is also found that fourth order polynomial and support vector regression models offered the best accuracy of flu prediction models. Recommendations for Researchers: Open-source data, such as Twitter feed, can be mined for useful intelligence benefiting society. Machine learning-based prediction models can be improved by adding open-source data to the primary data set. Impact on Society: Key implication of this study for practitioners in the field were to use social media postings to identify neighborhoods and geographic locations affected by seasonal outbreak, such as influenza, which would help reduce the spread of the disease and ultimately lead to containment. Based on the findings of this study, social media data will help health authorities in detecting seasonal outbreaks earlier than just using official CDC channels of disease and illness reporting from physicians and labs thus, empowering health officials to plan their responses swiftly and allocate their resources optimally for the most affected areas. Future Research: A future researcher could use more complex deep learning algorithms, such as Artificial Neural Networks and Recurrent Neural Networks, to evaluate the accuracy of flu outbreak prediction models as compared to the regression models used in this study. A future researcher could apply other sentiment analysis techniques, such as natural language processing and deep learning techniques, to identify context-sensitive emotion, concept extraction, and sarcasm detection for the identification of self-reporting flu tweets. A future researcher could expand the scope by continuously collecting tweets on a public cloud and applying big data applications, such as Hadoop and MapReduce, to perform predictions using several months of historical data or even years for a larger geographical area. Full Article
ntr Towards Network Perspective of Intra-Organizational Learning: Bridging the Gap between Acquisition and Participation Perspective By Published On :: Full Article
ntr Egocentric Database Operations for Social and Economic Network Analysis By Published On :: Full Article
ntr Introduction to the Special Section on Game-based Learning: Design and Applications (GbL) By Published On :: Full Article
ntr Social Networking, Teaching, and Learning: Introduction to Special Section on Social Networking, Teaching, and Learning (SNTL) By Published On :: Full Article
ntr How the Use of ICT can Contribute to a Misleading Picture of Conditions – A Five-Step Process By Published On :: 2015-11-07 This paper contributes to the limited research on roles ICT can play in impression-management strategies and is based on case studies done in the Swedish Police. It also gives a theoretical contribution by adopting a holistic approach to explain how ICT can contribute to giving a misleading picture of conditions. Output generated by ICT has nowadays a central role in follow-up activities and decision-making. Even if this type of output, often in colourful, presentable, graphical arrangements, gives the impression of being accurate and reliable there is a risk of defective data quality. The phenomena can be described as a process divided into five steps. The first step is about how the data is generated and/or collected. The second step is linked to how the data is registered. The third step is about the output generated from the ICT-systems. The fourth step is how the output of ICT is selected for presentation. The fifth step concerns how output generated by ICT is interpreted. This paper shows that ICT can easily be used in impression-management strategies. For example, that personnel take shortcuts to affect the statistics rather than applying methods that may give the desired effects. Full Article
ntr KenVACS: Improving Vaccination of Children through Cellular Network Technology in Developing Countries By Published On :: 2015-04-28 Health Data collection is one of the major components of public health systems. Decision makers, policy makers, and medical service providers need accurate and timely data in order to improve the quality of health services. The rapid growth and use of mobile technologies has exerted pressure on the demand for mobile-based data collection solutions to bridge the information gaps in the health sector. We propose a prototype using open source data collection frameworks to test its feasibility in improving the vaccination data collection in Kenya. KenVACS, the proposed prototype, offers ways of collecting vaccination data through mobile phones and visualizes the collected data in a web application; the system also sends reminder short messages service (SMS) to remind parents on the date of the next vaccination. Early evaluation demonstrates the benefits of such a system in supporting and improving vaccination of children. Finally, we conducted a qualitative study to assess challenges in remote health data collection and evaluated usability and functionality of KenVACS. Full Article
ntr Challenges of Knowledge and Information Management during New Product Introduction: Experiences from a Finnish Multinational Company By Published On :: 2016-10-31 Efficient knowledge and information management is essential for companies to prosper in the rapidly changing global environment. This article presents challenges of a large Finnish multinational company relating to their current knowledge and information management practices and systems. The focus is on New Product Introduction (NPI) process. The study is based on interviews and facilitated workshops in the Research and Development (R&D) and Production departments. Furthermore, the identified challenges are reflected to the findings presented in knowledge and information management literature. The results gained from the company case study were well in line with the findings in the literature. Three main topics, which can be generalized to cause challenges for knowledge and information management in most companies, were recognized: 1) Issues related to human behavior, individual characteristics and capabilities, different backgrounds, and professional vocabulary; 2) Codifying tacit knowledge into explicit information, which can be saved to company information system; 3) Lack of interoperability between different information systems. The study provides the management of the case company, and other similar organizations, focus points while seeking for better knowledge and information management. From a scientific perspective, the main contribution of this article is to give practical examples of how the theoretical findings presented in literature manifest themselves in real industrial practices. Full Article
ntr A Multi-task Principal Agent Model for Knowledge Contribution of Enterprise Staff By Published On :: 2016-10-06 According to the different behavior characteristics of knowledge contribution of enterprise employees, a multi-task principal-agent relationship of knowledge contribution between enterprise and employees is established based on principal-agent theory, analyzing staff’s knowledge contribution behavior of knowledge creation and knowledge participation. Based on this, a multi-task principal agent model for knowledge contribution of enterprise staff is developed to formulate the asymmetry of information in knowledge contribution Then, a set of incentive measures are derived from the theoretic model, aiming to prompt the knowledge contribution in enterprise. The result shows that staff’s knowledge creation behavior and positive participation behavior can influence and further promote each other Enterprise should set up respective target levels of both knowledge creation contribution and knowledge participation contribution and make them irreplaceable to each other. This work contributes primarily to the development of the literature on knowledge management and principal-agent theory. In addition, the applicability of the findings will be improved by further empirical analysis. Full Article
ntr Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries By Published On :: 2017-09-06 Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries. Full Article
ntr Contextualist Inquiry into E-Commerce Institutionalization in Developing Countries: The Case of Mozambican Women-led SMMES By Published On :: 2019-10-18 Aim/Purpose: This study explores how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce by focusing on the ongoing interaction between the SMME, its context, and process of e-commerce institutionalization. Background: It is believed that institutionalization of e-commerce provides significant benefits of unlimited access to new markets, and access to new, improved, inexpensive and convenient operational methods of transacting. Although prior studies have examined the adoption of e-commerce and the enabling and constraining factors, few have examined e-commerce (i) institutionalization (that is, post-adoption), and (ii) from a gender perspective. This study aims to respond to this paucity in the literature by exploring how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce. Methodology: The study follows a qualitative inquiry approach for both data collection and analysis. Semi-structured interviews were adopted for data collection and thematic analysis implemented on the data. SMMEs were purposively sampled to allow for the selection of information-rich SMMEs for study and specifically those that have gone through the experience of adoption and in some cases have institutionalized e-commerce. Contribution: The empirical findings explain how the institutionalization process from interactive e-commerce to transactive e-commerce unfolds in the Mozambican context. Findings: Transition from interactive to transactive e-commerce is firstly influenced by (i) the type of business the SMME is engaged in; and (ii) customer and trading partner’s readiness for e-commerce. Secondly, the transition process is influenced by the internal factors of (i) manager’s demographic factors; (ii) mimetic behaviour arising from exposure to (foreign) organizations in the same industry that have mature forms of e-commerce; (iii) the business networks developed with some of these organizations that have mature forms of e-commerce; (iv) access to financial resources; and (v) social media technologies. Thirdly, the process is influenced by external contextual factors of (i) limited government intervention towards e-commerce endeavors; (ii) limited to lack of financial institutions readiness for e-commerce; (iii) lack of local available IT expertise; (iv) consumer’s low purchasing power due to economic recessions; (vi) international competitive pressure; and (vii) sociocultural practices. Recommendations for Practitioners: The study provides SMME managers, practitioners, and other stakeholders concerned with women’s development with a better understanding of the process in order to develop appropriate policies and interventions that are suitable for the reality of women-led SMMEs in Mozambique and other developing countries with similar contextual characteristics. Recommendation for Researchers: The study contributes to the existing debate of e-commerce and the use of ICT for development in developing countries by providing a distinct contribution of the institutionalization process and how the contextual structures influence this process. Impact on Society: Women-led SMME managers can learn from the different experiences, and compare their e-commerce efforts with SMMEs that were able to institutionalize and make strategies for improvements within their organizations. Future Research: The manner in which women-led SMMEs employ e-commerce requires further investigation to understand how issues related to gender, the cultural context, and different regions or countries impact this process. Full Article
ntr The Role of Knowledge Management Infrastructure in Enhancing Job Satisfaction: A Developing Country Perspective By Published On :: 2019-01-09 Aim/Purpose: This research aims to examine the role of Knowledge Management (KM) infrastructure (technological, structural, and cultural) in enhancing job satisfaction in the context of developing countries, as exemplified by Jordan. Background: Despite the presence of job satisfaction studies conducted in educational institutions across the world, knowledge management issues have not been taken into consideration as influencing factors. Methodology: A total of 168 responses to a questionnaire survey were collected from the academic staff at Zarqa University in Jordan. Multiple regression analysis was conducted to test the research hypotheses. Contribution: This study offers deeper understanding about the role that knowledge management infrastructure plays in enhancing job satisfaction from a developing country perspective. The proposed model is tested the first time in Jordan. Findings: Results of the current study revealed that there are significant positive impacts of technological and cultural KM infrastructures on job satisfaction, whereas structural KM infrastructure does not have a significant impact on job satisfaction. Also, the results revealed significant gender difference in perception of the impact of knowledge management infrastructure on job satisfaction. On the other hand, an ANOVA test found no significant difference in the impact of knowledge management infrastructure on job satisfaction among groups by age, experience, and academic rank. Recommendation for Researchers: Our findings can be used as a base of knowledge for further studies about knowledge management infrastructure and job satisfaction following different criteria and research procedures. Future Research: The current model can be applied and assessed further in other sectors, including public universities and other services sectors in developed and developing countries. Full Article
ntr Entrepreneurial Leadership and Organisational Performance of SMEs in Kuwait: The Intermediate Mechanisms of Innovation Management and Learning Orientation By Published On :: 2021-12-13 Aim/Purpose: This study aimed to investigate the impact of innovation management and learning orientation as the mechanisms playing the role of an intermediate relationship between entrepreneurial leadership and organisational performance of small and medium enterprises (SMEs) in Kuwait. Background: SMEs are currently among the principal economic instruments in most industrialised and developing countries. The contribution of SMEs can be viewed from various perspectives primarily related to the crucial role they play in developing entrepreneurial activities, employment generation, and improving innovativeness. Developing countries, including Kuwait and other countries, in the Gulf Cooperation Council (GCC), have recognised the key role played by SMEs as a strong pillar of growth. Consequently, many governments have formulated policies and programmes to facilitate the growth and success of SMEs. Unfortunately, the organisational performance of SMEs in developing countries, particularly in Kuwait, remains below expectations. The lagged growth could be due to a lack of good managerial practices and increasing competition that negatively impact their performance. Numerous researchers discovered the positive effect of entrepreneurial leadership on SMEs’ performance. However, a lack of clarity remains regarding the direct impact of entrepreneurial leadership on SMEs’ performance, especially in developing countries. Therefore, the nexus between entrepreneurial leadership and organisational performance is still indecisive and requires further studies. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather data within a specific period. The data were collected by distributing a survey questionnaire to Kuwaiti SMEs’ owners and Chief Executive Officers (CEOs) via online and on-hand instruments. A total of 384 useable questionnaires were obtained. Moreover, the partial least square-structural equation modelling (PLS-SEM) analysis was performed to test the hypotheses. Contribution: The current study contributed to the existing literature by developing a moderated mediation model integrating entrepreneurial leadership, innovation management, and learning orientation. The study also investigated their effect on the organisational performance of SMEs. The study findings also bridged the existing significant literature gap regarding the role of these variables on SMEs’ performance in developing countries, particularly in Kuwait, due to the dearth of studies linking these variables in this context. Furthermore, this study empirically confirmed the significant effect of innovation management and learning orientation as intermediate variables in strengthening the relationship between entrepreneurial leadership and organisational performance in the settings of Kuwait SMEs, which has not been verified previously. Findings: The study findings showed the beneficial and significant impact of entrepreneurial leadership and innovation management on SME’s organisational performance. The relationship between entrepreneurial leadership and SMEs’ organisational performance is fundamentally mediated by innovation management and moderated by learning orientation. Recommendations for Practitioners: The present study provides valuable insights and information regarding the factors considered by the government, policymakers, SMEs’ stakeholders, and other authorities in the effort to increase the organisational performance level and facilitate the growth of SMEs in Kuwait. SMEs’ owners or CEOs should improve their awareness and knowledge of the importance of entrepreneurial leadership, innovation management, and learning orientation. These variables will have beneficial effects on the performance and assets to achieve success and sustainability if adopted and managed systematically. This study also recommends that SMEs’ entrepreneurs and top management should facilitate supportive culture by creating and maintaining an organisational climate and structure that encourages learning behaviour and innovation mindset among individuals. The initiative will motivate them towards acquiring, sharing, and utilising knowledge and increasing their ability to manage innovation systemically in all production processes to adapt to new technologies, practices, methods, and different circumstances. Recommendation for Researchers: The study findings highlighted the mediating effect of innovation management on the relationship between entrepreneurial leadership (the independent variable) and SMEs’ organisational performance (the dependent variable) and the moderating effect of learning orientation in the same nexus. These relationships were not extensively addressed in SMEs of developing countries and require further validation. Impact on Society: This study aims to influence the management strategies and practices adopted by entrepreneurs and policymakers who work in SMEs in developing countries. The effect will be reflected in the development of their firms and the national economy in general. Future Research: Future research should investigate the conceptual research framework against the backdrop of other developing economies and in other business settings to generalise the results. Future investigation should seek to establish the effect of entrepreneurial leadership style on other mechanisms, such as knowledge management processes, which could function with entrepreneurial leadership to improve SMEs’ performance efficiently. In addition, future studies may include middle and lower-level managers and employees, leading to more positive outcomes. Full Article
ntr Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem By Published On :: 2021-07-27 Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. Full Article
ntr Establishing a Security Control Framework for Blockchain Technology By Published On :: 2021-07-27 Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures. Full Article
ntr Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study By Published On :: 2021-01-18 Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further. Full Article
ntr Traits Contributing to the Promotion of the Individual’s Continuance Usage Intention and Perceived Value of M-University Services By Published On :: 2022-06-25 Aim/Purpose: This study aims to examine the roles of key traits of m-university services and their users in promoting two crucial post-adoption outcomes of these services; namely, continuance usage intention and perceived value. Background: M-university (i.e., a university providing services via mobile technologies) has gained a great interest in the higher education sector as a driver of new business models and innovative service offerings. However, its assessment has been greatly overlooked, especially in evaluating the factors that drive the stakeholders’ continuance intention to use it and the determinants of its post-adoption perceived value. Consequently, research efforts undertaking such assessment facets empirically are highly required. Methodology: An integrated research model that enables such assessment was developed and evaluated using a quantitative research methodology. Accordingly, data were collected using a formulated closed-ended survey questionnaire. The target population consisted of the academic staff of a Saudi public university that has witnessed an extensive adoption of m-university services. The obtained data (i.e., 207 fully completed responses) were evaluated using the structural equation modeling approach. Contribution: To the best of our knowledge, this is the first study that gains the chance to provide the research community and m-service providers with new knowledge and understanding about the predictors that drive the continuance usage intention and value of m-university services. Findings: The findings showed that all of the examined traits of m-university services and their users (i.e., reliability, usability, customization, self-efficacy, and involvement) are having positive roles in promoting the continuance intention to use these services, while only two traits (i.e., reliability and involvement) contribute significantly to augmenting the perceived value. Recommendations for Practitioners: The study recommends developing effective design and implementation specifications that strengthen the contributions of the examined traits in the post-adoption stage of m-university services. Recommendation for Researchers: Further studies should be devoted to addressing the notable need to assess the factors influencing the adoption of m-university services, as well as to explore which ones are having significant roles in the attainment of post-adoption outcomes. Impact on Society: The empirical insights provided by the present study are essential for both university stakeholders and mobile service providers in their endeavors to improve the key aspects of the anticipated post-adoption outcomes of the provided services. Future Research: Further empirical investigations are needed to examine the roles of more m-university services and user traits in achieving a broad range of post-adoption outcomes of such services. Full Article
ntr Adoption of Mobile Commerce Services Among Artisans in Developing Countries By Published On :: 2022-02-24 Aim/Purpose: This paper aims to analyze how artisans in Ghana are incorporating mobile commerce into their everyday business and how perceived usefulness, perceived ease of use, subjective norms, age, gender, expertise, and educational level affected the adoption and usage of m-commerce. Background: This study integrates well-established theoretical models to create a new conceptual model that ensures a comprehensive mobile commerce adoption survey. Methodology: A cross-sectional survey was conducted to measure the constructs and their relations to test the research model. Contribution: The study’s findings confirmed previous results and produced a new conceptual model for mobile commerce adoption and usage. Findings: Except for gender, perceived ease of use, and subjective norms that did not have specific effects on mobile commerce adoption, age, educational level, perceived usefulness, expertise, attitude, and behavioral intention showed significant effects. Recommendations for Practitioners: First of all, mobile commerce service providers should strategically pay critical attention to customer-centered factors that positively affect the adoption of mobile commerce innovations than focusing exclusively on technology-related issues. Mobile service providers can attract more users if they carefully consider promoting elements like perceived usefulness and perceived ease of use which directly or indirectly affect the individuals’ decision to adopt information technology from consumer perspectives. Second, mobile commerce service providers should strategically focus more on younger individuals since, per the research findings, they are more likely to adopt mobile commerce innovations than the older folks in Ghana. Third, service providers should also devise strategies to retain actual users of m-commerce by promoting elements like behavioral intentions and attitude, which according to the research findings, have a higher predictive power on actual usage of m-commerce. Recommendation for Researchers: The conceptual model developed can be employed by researchers worldwide to analyze technology acceptance research. Impact on Society: The study’s findings suggested that mobile commerce adoption could promote a cashless society that is convenient for making buying things quicker and easier. Future Research: The research sample size could be increased, and also the study could all sixteen regions in Ghana or any other country for a broader representation. Full Article
ntr The Impacts of KM-Centred Strategies and Practices on Innovation: A Survey Study of R&D Firms in Malaysia By Published On :: 2022-01-17 Aim/Purpose: The aim of this paper is to examine the influences of KM-centred strategies on innovation capability among Malaysian R&D firms. It also deepens understanding of the pathways and conditions to improve the innovation capability by assessing the mediating role of both KM practices, i.e., knowledge exploration practices, and knowledge exploitation practices. Background: Knowledge is the main organisational resource that is able to generate a competitive advantage through innovation. It is a critical success driver for both knowledge exploration and exploitation for firms to achieve sustainable competitive advantages. Methodology: A total of 320 questionnaires were disseminated to Malaysian R&D firms and the response rate was 47 percent. The paper utilised structural equation modelling and cross-sectional design to test hypotheses in the proposed research model. Contribution: This paper provides useful information and valuable initiatives in exploring the mediating role of knowledge exploration and knowledge exploitation in influencing innovation in Malaysian R&D firms. It helps R&D firms to frame their KM activities to drive the capability of creating and retaining a greater value onto their core business competencies. Findings: The findings indicate that all three KM-centred strategies (leadership, HR practices, and culture) have a direct effect on innovation. In addition, KM exploration practices mediate HR practices on innovation while KM exploitation mediates both leadership and HR practices on innovation. Recommendations for Practitioners: This paper serves as a guide for R&D managers to determine the gaps and appropriate actions to collectively achieve the desired R&D results and national innovation. It helps R&D firms frame their KM activities to enhance the capability of creating and retaining a greater value to their core business competencies. Recommendation for Researchers: This paper contributes significantly to knowledge management and innovation research by establishing new associations among KM-centred strategies, i.e., leadership, HR practices, and culture, both KM practices (knowledge exploration and knowledge exploitation), and innovation. Impact on Society: This paper highlights the important role of knowledge leaders and the practice of effective HR practices to help R&D firms to create a positive environment that facilitates both knowledge exploration and knowledge exploitation in enhancing innovation capabilities. Future Research: Further research could use a longitudinal sample to examine relationships of causality, offering a more comprehensive view of the effect of KM factors on innovation over the long term. Future research should also try to incorporate information from new external sources, such as customers or suppliers. Full Article
ntr Investigating the Impact of Dual Network Embedding and Dual Entrepreneurial Bricolage on Knowledge-Creation Performance: An Empirical Study in Fujian, China By Published On :: 2023-05-11 Aim/Purpose: This study investigates the relationship between dual network embedding, dual entrepreneurial bricolage, and knowledge-creation performance. Background: The importance of new ventures for innovation and economic growth has been fully endorsed. Establishing incubation organizations to help new startups overcome constraints and dilemmas has become the consensus of various countries. In particular, the number of Chinese makerspaces has rapidly increased. Startups in the makerspaces form a loosely coupled dual network to cooperate and share resources, especially knowledge. Methodology: By convenience sampling, 400 startups in the makerspaces in Fujian Province, China were selected for the questionnaire survey study. In total, 307 valid responses were collected, yielding a response rate of 76.8%. The survey data were analyzed for hypothesis testing, using the PL-SEM technique with the AMOS20.0 software. Contribution: At the theoretical level, this research supplements the exploration of the influencing factors of the entrepreneurial bricolage of startups at the network level. It deepens the research on the internal mechanism of the dual network embeddedness affecting the knowledge-creation performance. In practice, it provides a theoretical basis and management inspiration for startups in makerspaces to overcome the inherent disadvantage of being too small and weak to explore innovative paths. Findings: First, relational embedding of startups in makerspaces directly affects knowledge-creation performance. Second, dual entrepreneurial bricolage plays a mediating role in diversity. Selective entrepreneurial bricolage plays a partial mediating role between relationship embedding and knowledge-creation performance. Parallel entrepreneurial bricolage plays a complete intermediary role between structural embedding and knowledge-creation performance. Dual entrepreneurial bricolage plays a complete intermediary role between knowledge embedding and knowledge-creation performance. Recommendations for Practitioners: Enterprises in the makerspaces should make dynamic adjustments to the network embedded state and dual entrepreneurial bricolage to improve knowledge-creation performance. When startups conduct selective entrepreneurship bricolage, they should strengthen relational and knowledge embeddedness to improve their relationship strength and tacit knowledge acquisition. When startups conduct parallel entrepreneurship bricolage, structural and knowledge embedding should be strengthened to improve the position of enterprises in the network to acquire diversified knowledge to explore and discover new business opportunities and project resources. Recommendation for Researchers: The heterogeneity of industries and regions may impact the dual network embedding mechanism of startups. Researchers can choose a wider range of regions and industries for sampling. Impact on Society: This study provides a theoretical basis and management inspiration for startups to overcome the inherent disadvantage of being too small and weak to explore innovative paths. It provides a basis to support startups in unleashing innovation vitality and achieving healthy growth. Future Research: Previous studies have shown that network relationships and bricolage behavior have a certain relationship with the enterprise life cycle. Future research can adopt a longitudinal research design across time points, which will increase the explanatory power of research conclusions. Full Article
ntr The Influence of Ads’ Perceived Intrusiveness in Geo-Fencing and Geo-Conquesting on Purchase Intention: The Mediating Role of Customers’ Attitudes By Published On :: 2024-05-29 Aim/Purpose: This study focuses on two targeting strategies of out-store Location-Based Mobile Advertising (LBMA): the geo-fencing strategy (i.e., targeting customers who are near the focal store) and the geo-conquesting strategy (i.e., targeting those who are near competitors’ stores to visit the focal store). To the authors’ knowledge, no previous studies have compared the perceived intrusiveness of advertisements (ads) in geo-fencing and geo-conquesting settings, despite the accumulating literature on out-store LBMA. Hence, the aim of this study is to determine which targeting strategy is more effective in terms of reducing the perception of ads’ intrusiveness and increasing positive customers’ attitudes and purchase intention. Background: The intrusive nature of LBMA is perceived negatively by some customers, impacting their attitudes toward the ad, purchase intention, and even their perception of the brand. Therefore, identifying the targeting strategy under which ads are perceived as less intrusive is essential. Additionally, brick-and-mortar clothing stores in Jordan are facing challenges due to the rise of online shopping and increased competition from nearby stores. Thus, examining geo-fencing and geo-conquesting might tackle these challenges and encourage local clothing retailers to adopt these strategies. Methodology: A quantitative method was used in this study. A between-subjects experimental design was used to collect the data using a scenario-based survey distributed to Jordanians aged 18 to 45. A total of 531 responses were collected. After excluding those who do not belong to the targeted age group and those who did not pass the manipulation check, 406 responses were analyzed using the Statistical Package for the Social Sciences (SPSS) software version 28 and the Analysis of Moment Structures (AMOS) software version 26 to conduct Structural Equation Modeling (SEM). Contribution: This work offers valuable contributions by investigating the impact of the perceived intrusiveness of ads on purchase intention in the contexts of geo-fencing and geo-conquesting, which has not been studied before. Additionally, it fills a gap by examining this phenomenon in Jordan, a developing country in which attitudes toward LBMA have not been previously explored. Findings: The results revealed that location-based mobile ads sent under a geo-fencing strategy are perceived as less intrusive than those sent under a geo-conquesting strategy. In addition, customers’ attitudes fully mediate the relationship between intrusiveness and purchase intention only under the geo-fencing strategy. Ultimately, neither of the strategies is more effective in terms of increasing positive customer attitudes and purchase intentions in the context of clothing retail stores in Jordan. Recommendations for Practitioners: Clothing retailers in Jordan should consider adopting geo-fencing and geo-conquesting strategies to boost purchase intentions and tackle industry challenges. Additionally, to increase purchase intentions with geo-fencing, practitioners should focus on fostering positive customer attitudes toward ads, as simply perceiving them as less intrusive is not sufficient to drive purchase intention without the mediating effect of positive attitudes. Recommendation for Researchers: This research is crucial for academics and researchers as geolocation technology and LBMA are expected to advance significantly in the future. Researchers can investigate this topic through a randomized field experiment, followed by a research questionnaire to collect data from a real-world setting. Impact on Society: Utilizing LBMA is essential for local clothing retail stores that are trying to effectively reach and connect with their customers because searching the Internet for local goods and services is done primarily on mobile devices. Indeed, this study revealed that customers in both settings (i.e., geo-fencing and geo-conquesting) reported a high intention to visit the promoting store and to purchase from the advertised product category. Future Research: Future research can apply this topic to different industries and cultural contexts, as the results may vary across industries and regions. Moreover, future research could build on this study by investigating additional constructs, such as product category involvement, customization, and content type of the message (e.g., informative, entertaining). Full Article
ntr Coevolution of trust dynamics and formal contracting in governing inter-organisation exchange By www.inderscience.com Published On :: 2024-02-19T23:20:50-05:00 Recently, interest in the correlation between 'contract' in transaction governance and 'trust' in relational governance mechanisms has been growing. This study focuses on issues related to the evolution of contract and inter-organisational trust dynamics in transaction governance and uses mixed research method to investigate sectors related to transaction governance in Taiwan's electronics industry. The study finds higher flexibility in contract implementation to be a promoter of trust between two parties in a relationship, thereby promoting project execution efficiency in the case of Taiwanese firms. Organisational management differs between the East and West; therefore, Western firms should understand how various contractual provisions can be used to accommodate different transactions when cooperating with Taiwanese electronics companies. Full Article
ntr Commercial air transport in Africa: changing structure and development of country pairs By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 This study investigates cross-border commercial air passenger traffic in Africa, focusing on the development of the 15 busiest country pairs during the period 1989 to 2015. It explores dimensions not previously studied by using ICAO's 'Traffic by Flight Stage' (TFS) and data from the CEPII Gravity Dataset. The spatial results show on an uneven geographical distribution of country pairs with the centre of gravity to South, East and North-East Africa, with one long-distance corridor between Egypt and South Africa. Countries in North and West Africa have rather few linkages, except for Egypt. Central African countries are not represented among the 15 country pairs. Although the number of passengers and the rank among the countries have shifted, South Africa and Egypt stand out, as having most country pair connections. Factors such as changing economic, diplomatic and political relations have had an influence on changing country pair connections throughout the period. A number of variables were selected to investigate how they correlated with Africa's commercial passenger traffic. Of the seven variables selected, five did show on a correlation and two did partly so. In that view, Africa's air traffic follows rather typical patterns. Full Article
ntr Addressing the eLearning Contradiction: A Collaborative Approach for Developing a Conceptual Framework Learning Object By Published On :: Full Article
ntr Challenges of Integrating Technologies for Learning: Introduction to the IJELLO Special Series of Chais Conference 2010 Best Papers By Published On :: Full Article
ntr Learning and Teaching in the Technological Era: Introduction to the IJELLO Special Series of Chais Conference 2011 Best Papers By Published On :: Full Article
ntr Introduction to the IJELLO Special Series of Chais Conference 2012 Best Papers By Published On :: Full Article
ntr Introduction to the IJELLO Special Series of Chais Conference 2013 Best Papers By Published On :: Full Article
ntr Introduction to the IJELLO Special Series of Chais Conference 2014 Best Papers By Published On :: Full Article
ntr A Decade of Chais Conferences: Introduction to the IJELL Special Series of Chais Conference 2015 Best Papers By Published On :: 2015-12-14 The seventh issue of the Interdisciplinary Journal of e-Skills and Lifelong Learning (IJELL- formerly Interdisciplinary Journal of E-Learning and Learning Objects - IJELLO) special series includes a selection of best papers presented at the 10th Chais Conference for the Study of Innovation and Learning Technologies: Learning in the Technological Era. The Chais conference 2015 was held at The Open University of Israel, Raanana, Israel, on February 10-11, 2015, and was organized by its Research Center for Innovation in Learning Technologies. This preface presents the mission and activities of the Research Center for Innovation in Learning Technologies at the Open University of Israel. It describes the objectives and themes of the Chais conference 2015, explains the special series synergies with IJELL and the Informing Science Institute, chronicles the topics that have been published in the series, and introduces the papers included in this special selection. Full Article
ntr Introduction to the IJELL Special Series of Chais Conference 2016 Best Papers By Published On :: 2016-12-26 This preface presents the papers included in the eighth issue of the Interdisciplinary Journal of e-Skills and Lifelong Learning (IJELL) special series of selected Chais Conference best papers. The Chais Conference for the Study of Innovation and Learning Technologies: Learning in the Technological Era, is organized annually by the Research Center for Innovation in Learning Technologies, The Open University of Israel. The 11th Chais Conference was held at The Open University of Israel, Raanana, Israel, on February 16-17, 2016. Full Article
ntr Beyond the Walls of the Classroom: Introduction to the IJELL Special Series of Chais Conference 2017 Best Papers By Published On :: 2017-12-25 Aim/Purpose: This preface presents the papers included in the ninth issue of the Interdisciplinary Journal of e-Skills and Lifelong Learning (IJELL) special series of selected Chais Conference best papers. Background: The Chais Conference for the Study of Innovation and Learning Technologies: Learning in the Technological Era, is organized by the Research Center for Innovation in Learning Technologies, The Open University of Israel. The 12th Chais Conference was held at The Open University of Israel, Raanana, Israel, on February 14-15, 2017. Each year, selected papers of the Chais conference are expanded and published in IJELL. Methodology: A qualitative conceptual analysis of the themes and insights of the papers included in the ninth selection of IJELL special series of selected Chais Conference best papers. Contribution: The presentation of the papers of this selection emphasizes their novelty, as well as their main implications, describes current research issues, and chronicles the main themes within the discourse of learning technologies research, as reflected at the Chais 2017 conference. Findings: Contemporary research goes ‘beyond the walls of the classroom’ and investigates systemic and pedagogical aspects of integrating learning technologies in education on a large scale. Recommendation for Researchers: Researchers are encouraged to investigate broad aspects of seizing the opportunities and overcoming the challenges of integrating innovative technologies in education. Impact on Society: Effective application of learning technologies has a major potential to improve the well-being of individuals and societies. Future Research: The conceptual analysis of contemporary main themes of innovative learning technologies may provide researchers with novel directions for future research on various aspects of the effective utilization of learning technologies. Full Article
ntr Introducing a Mindset Intervention to Improve Student Success By Published On :: 2019-12-11 Aim/Purpose: The purpose of this paper is to introduce, describe, and document the methods involved in the preparation of a mindset intervention built into a freshmen development course, and established after years of longitudinal research, that is designed to have a positive impact on the outlook, achievement, and persistence of first generation and under-prepared students. Background: A number of studies conducted in the past fifteen years have concluded that grit, the persistence and perseverance to achieve goals, and growth mindset, the belief that skills and intelligence can be developed, are positive predictors of achievement; however, little focus has been placed on the implications at institutions purposed to educate minorities, first generation college students, and learners from diminished socio-economic backgrounds. Methodology: A series of models were created, custom self-assessment scales designed, and a lesson plan prepared purposed to deliver a mindset intervention to edify students about and change perceptions of grit, locus of control/self-efficacy, growth mindset, and goal setting. The mindset intervention, as presented in this paper, was delivered as part of a pilot implementation to students enrolled in a freshmen professional development course at a Mid-Atlantic HBCU in the Fall of 2019. Contribution: This qualitative paper documents an ongoing initiative while providing a workable template for the design and delivery of a mindset intervention that is believed will be highly effective with first generation and socio-economically disadvantaged learners. It represents the third paper in a five paper series. Findings: Prior research conducted by the authors shed light on the need to explore non-cognitive factors that may affect student performance such as grit, mindset, engagement, self-efficacy, and goal setting. The authors postulate that a carefully crafted mindset intervention delivered to freshmen students from traditionally underserved populations attending a minority serving institution in the mid-atlantic region of the United States will yield positive outcomes in terms of student success. Recommendations for Practitioners: As part of a commitment to positive student outcomes, faculty and administrators in higher education must be constantly exploring factors that may, or may not, impact student success. Recommendation for Researchers: Research is needed that explores elements that may help to contribute to the success of under prepared college students, in particular those who are from low income, first generation, and minority groups Impact on Society: Since, mindset interventions have been shown to be particularly effective with underserved students, it stands to reason that they should be adopted widely, and be effective at delivering positive outcomes, at HBCUs Future Research: The authors have introduced the mindset intervention with freshmen business students enrolled in a required professional development course. Results of the self-assessments and reflection questions are being collected and coded. Additionally, students are being administered a survey designed to measure the perceived efficacy of the initiative. Full Article
ntr Computer Self-Efficacy: A Practical Indicator of Student Computer Competency in Introductory IS Courses By Published On :: Full Article
ntr Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues By Published On :: Full Article