ty

China’s Halal Food Industry: The Link Between Knowledge Management Capacity, Supply Chain Practices, and Company Performance

Aim/Purpose: The study attempts to analyse the influences of knowledge management capacity on company performance and supply chain practices. It also examines whether supply chain practices significantly and positively impact company performance. Background: Knowledge management capacity is an essential tactical resource that enables the integration and coordination among supply chain stakeholders, but research examining the link between knowledge management capacity and supply chain practices and their impacts on company performance remains scarce. Methodology: The study uses correlation analysis and factor analysis to confirm the theoretical framework’s validity and structural equation modelling to test hypotheses. The data are obtained from 115 halal food firms in China (with a response rate of 82.7%). Contribution: This study’s findings contribute to the Social Capital Theory by presenting the impacts of different supply chain practices on company performance. The findings also suggest the impact of intangible resources on enhancing company performance, contributing to the Resource-based View Theory. These results are a crucial contribution to both academicians and corporate managers working in the Halal food industry. Managers can apply these findings to discover and adopt knowledge management capacity with practical anticipation that these concepts will align with their company strategies. Also, the research motivates managers to concentrate their knowledge management on enhancing companies’ supply chain practices to achieve improved company performance. Findings: This study is an initial effort that provides empirical evidence regarding the relationships among supply chain, knowledge management, and company performance from the perspective of China’s halal food industry. The results prove that knowledge management capacity is the supply chains’ primary success determinant and influencer. Besides, knowledge management capacity positively influences company performance, and supply chain practices directly influence company performance. Recommendations for Practitioners: Managers can apply these study findings to determine and increase knowledge management capacity with practical anticipation that these concepts will align with their company strategies. Also, the research motivates managers to concentrate their knowledge management on enhancing companies’ supply chain practices to achieve improved company performance. Recommendation for Researchers: The study presents a new theoretical framework and empirical evidence for surveying halal food businesses in China. Impact on Society: These results are a significant contribution to the research field and industry focusing on halal foods. Future Research: First, this research focuses only on halal food businesses in China; thus, it is essential to re-examine the hypothesized relations between the constructs in other Chinese business segments and regions. Next, the effect of variables and practices on the theorized framework should be taken into account and examined in other industries and nations.




ty

The Influence of Soft Skills on Employability: A Case Study on Technology Industry Sector in Malaysia

Aim/Purpose: This research investigates the influence of soft skills on graduates’ employability in the technology industry, using the technology industry sector in Malaysia as a case. Background: Organizations are looking for appropriate mechanisms to hire qualified employees with strong soft skills and hard skills. This requires that job candidates possess a set of qualifications and skills which impact their employability. Methodology: Fuzzy Delphi analysis was conducted as preliminary study to identify the critical soft skills required by technology industry sector. The preliminary study produced ten critical soft skills to form a conceptual model of their influence on employability. Then, an online questionnaire survey was distributed in two industry companies in Malaysia to collect research data, and regression analysis was conducted to validate the conceptual model. Contribution: This research focuses on the influence of soft skills on graduate employability in the technology industry sector, since the selection of the best candidate in the industry will improve employee performance and lead to business success. Findings: The results of regression analysis confirmed that Communication skills, Attitude, Integrity, Learnability, Motivation, and Teamwork are significantly correlated with employability, which means that these soft skills are the critical factors for employability in Malaysian technology companies. Recommendations for Practitioners: The model proposed in this article can be used by employers to give better assessment of candidates’ compatibility with the jobs available. Impact on Society: This research highlights the critical soft skills required by technology industry sector, which will reduce the unemployment percentages among graduates. Future Research: More studies are required to examine the soft skills found in the literature and to define the most important skills from a general perspective of the industry. Future research should assess the moderating role of other variables, such as skills gap, employee performance, and employee knowledge. Furthermore, it is recommended to conduct similar studies of soft skills for employability in other countries.




ty

Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception

Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged.




ty

The Roles of Knowledge Management and Cooperation in Determining Company Innovation Capability: A Literature Review

Aim/Purpose: The aim of this study is to develop a research model derived from relevant literature to guide empirical efforts. Background: Companies struggle to innovate, which is essential for improving their performance, surviving in competition, and growing. A number of studies have discussed company innovation capability, stating that innovation capability is influenced by several variables such as cooperation and knowledge management. Therefore, further research is necessary to identify factors playing a role in enhancing innovation capability. Methodology: This study is based on systematic literature review. The stages are: (1) research scope review, (2) comprehensive online research, (3) journal quality assessment, (4) data extraction from journals, (5) journal synthesis, and (6) comprehensive report. The online research used Google Scholar database, by browsing titles, abstracts, and keywords to locate empirical research studies in peer-reviewed journals published in 2010-2020. Furthermore, 62 related articles were found, of which 38 articles were excluded from further analysis and 24 articles were selected because they were more related to the topic. Contribution: The results of this study enrich the research in the field of knowledge management, cooperation, and innovation capability by developing a conceptual framework of innovation capability. The proposed theoretical model may be fundamental in addressing the need of a research model to guide further empirical efforts. Findings: This study provides a research model derived from systematically reviewing relevant literature. The proposed theoretical model was done by incorporating the aspects of knowledge management, cooperation, and innovation capability. The model shows that knowledge management and cooperation are essential aspects of innovation capability. Furthermore, this study also provides the dimensions and sub dimensions of each variable that was established after synthesizing the literature review. Recommendations for Practitioners: Business practitioners can use the identified predictors of innovation capability and the dimensions of each variable to explore their company’s innovation capability. They can also take the relevant variables into consideration when making policies regarding innovation. Recommendation for Researchers: The theoretical model proposed in this study needs validation with further empirical investigation. Impact on Society: Readers of this paper can obtain an understanding that knowledge management and cooperation are essential aspects to consider in enhancing innovation capability. Future Research: Future studies should explore other dimensions of knowledge management and cooperation through alternative approaches and perspectives.




ty

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




ty

A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model

Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods.




ty

The Influence of Crisis Management, Risk-Taking, and Innovation in Sustainability Practices: Empirical Evidence From Iraq

Aim/Purpose: This study examines the impact of decision-making, crisis management, and decision-making on sustainability through the mediation of open innovation in the energy sector. Background: Public companies study high-performance practices, requiring overcoming basic obstacles such as financial crises that prevent the adoption and development of sustainability programs. Methodology: Due to the COVID-19 pandemic, which has led to the closure of businesses in Iraq, a survey was distributed. To facilitate responses, free consultations were offered to help complete the questionnaire quickly. Of the 435 questionnaires answered, 397 were used for further analysis. Contribution: The impact of crises that impede the energy sector from adopting sustainable environmental regulations is investigated in this study. Its identification of specific constraints to open innovation leads to the effectiveness of adopting environmentally friendly policies and reaching high levels of sustainable performance. Findings: The impacts of risk-taking, crisis management, and decision-making on sustainability have been explored. Results show that open innovation fully mediates the relationship between the factors of risk-taking, crisis management, decision-making, and sustainability. Recommendations for Practitioners: The proposed model can be used by practitioners to develop and improve sustainable innovation practices and achieve superior performance. Recommendation for Researchers: Researchers are recommended to conduct in-depth studies of the phenomenon based on theoretical and empirical foundations, especially in light of the relationship between crisis management, decision-making, and risk-taking and their impact on sustainability based on linear and non-compensatory relationships. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in adopting sustainable practices to minimize pollution in the Iraqi context. Future Research: A more in-depth study can be performed using a larger sample, which not only includes the energy industry but also other industries.




ty

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




ty

Traits Contributing to the Promotion of the Individual’s Continuance Usage Intention and Perceived Value of M-University Services

Aim/Purpose: This study aims to examine the roles of key traits of m-university services and their users in promoting two crucial post-adoption outcomes of these services; namely, continuance usage intention and perceived value. Background: M-university (i.e., a university providing services via mobile technologies) has gained a great interest in the higher education sector as a driver of new business models and innovative service offerings. However, its assessment has been greatly overlooked, especially in evaluating the factors that drive the stakeholders’ continuance intention to use it and the determinants of its post-adoption perceived value. Consequently, research efforts undertaking such assessment facets empirically are highly required. Methodology: An integrated research model that enables such assessment was developed and evaluated using a quantitative research methodology. Accordingly, data were collected using a formulated closed-ended survey questionnaire. The target population consisted of the academic staff of a Saudi public university that has witnessed an extensive adoption of m-university services. The obtained data (i.e., 207 fully completed responses) were evaluated using the structural equation modeling approach. Contribution: To the best of our knowledge, this is the first study that gains the chance to provide the research community and m-service providers with new knowledge and understanding about the predictors that drive the continuance usage intention and value of m-university services. Findings: The findings showed that all of the examined traits of m-university services and their users (i.e., reliability, usability, customization, self-efficacy, and involvement) are having positive roles in promoting the continuance intention to use these services, while only two traits (i.e., reliability and involvement) contribute significantly to augmenting the perceived value. Recommendations for Practitioners: The study recommends developing effective design and implementation specifications that strengthen the contributions of the examined traits in the post-adoption stage of m-university services. Recommendation for Researchers: Further studies should be devoted to addressing the notable need to assess the factors influencing the adoption of m-university services, as well as to explore which ones are having significant roles in the attainment of post-adoption outcomes. Impact on Society: The empirical insights provided by the present study are essential for both university stakeholders and mobile service providers in their endeavors to improve the key aspects of the anticipated post-adoption outcomes of the provided services. Future Research: Further empirical investigations are needed to examine the roles of more m-university services and user traits in achieving a broad range of post-adoption outcomes of such services.




ty

Impact of Text Diversity on Review Helpfulness: A Topic Modeling Approach

Aim/Purpose: In this study, we aim to investigate the impact of an important characteristic of textual reviews – the diversity of the review content on review helpfulness. Background: Consumer-generated reviews are an essential format of online Word-of-Month that help customers reduce uncertainty and information asymmetry. However, not all reviews are equally helpful as reflected by the varying number of helpfulness votes received by reviews. From consumers’ perspective, what kind of content is more effective and useful for making purchase decisions is unclear. Methodology: We use a data set consisting of consumer reviews for laptop products on Amazon from 2014 to 2018. A topic modeling technique is implemented to unveil the hidden topics embedded in the reviews. Based on the extracted topics, we compute the text diversity score of each review. The diversity score measures how diverse the content in a review is compared to other reviews. Contribution: In the literature, studies have examined various factors that can influence review helpfulness. However, studies that emphasized the information value of textual reviews are limited. Our study contributes to the extant literature of online word-of-mouth by establishing the connection between the diversity of the review content and consumer perceived helpfulness. Findings: Empirical results show that text diversity plays an important role in consumers’ evaluation of whether the review is helpful. Reviews that contain more diverse content tend to be more helpful to consumers. Moreover, we find a negative interaction effect between text diversity and the text depth. This result suggests that text depth and text diversity have a substitution effect. When a review contains more in-depth content, the impact of text diversity is weakened. Recommendations for Practitioners: For consumers to quickly find the informative reviews, platforms should incorporate measures such as text diversity in the ranking algorithms to rank consumer reviews. Future Research: Future study can extend the current research by examine the impact of text diversity for experienced goods and compare the results with search goods.




ty

Modeling the Impact of Covid-19 on the Farm Produce Availability and Pricing in India

Aim/Purpose: This paper aims to analyze the availability and pricing of perishable farm produce before and during the lockdown restrictions imposed due to Covid-19. This paper also proposes machine learning and deep learning models to help the farmers decide on an appropriate market to sell their farm produce and get a fair price for their product. Background: Developing countries like India have regulated agricultural markets governed by country-specific protective laws like the Essential Commodities Act and the Agricultural Produce Market Committee (APMC) Act. These regulations restrict the sale of agricultural produce to a predefined set of local markets. Covid-19 pandemic led to a lockdown during the first half of 2020 which resulted in supply disruption and demand-supply mismatch of agricultural commodities at these local markets. These demand-supply dynamics led to disruptions in the pricing of the farm produce leading to a lower price realization for farmers. Hence it is essential to analyze the impact of this disruption on the pricing of farm produce at a granular level. Moreover, the farmers need a tool that guides them with the most suitable market/city/town to sell their farm produce to get a fair price. Methodology: One hundred and fifty thousand samples from the agricultural dataset, released by the Government of India, were used to perform statistical analysis and identify the supply disruptions as well as price disruptions of perishable agricultural produce. In addition, more than seventeen thousand samples were used to implement and train machine learning and deep learning models that can predict and guide the farmers about the appropriate market to sell their farm produce. In essence, the paper uses descriptive analytics to analyze the impact of COVID-19 on agricultural produce pricing. The paper explores the usage of prescriptive analytics to recommend an appropriate market to sell agricultural produce. Contribution: Five machine learning models based on Logistic Regression, K-Nearest Neighbors, Support Vector Machine, Random Forest, and Gradient Boosting, and three deep learning models based on Artificial Neural Networks were implemented. The performance of these models was compared using metrics like Precision, Recall, Accuracy, and F1-Score. Findings: Among the five classification models, the Gradient Boosting classifier was the optimal classifier that achieved precision, recall, accuracy, and F1 score of 99%. Out of the three deep learning models, the Adam optimizer-based deep neural network achieved precision, recall, accuracy, and F1 score of 99%. Recommendations for Practitioners: Gradient boosting technique and Adam-based deep learning model should be the preferred choice for analyzing agricultural pricing-related problems. Recommendation for Researchers: Ensemble learning techniques like Random Forest and Gradient boosting perform better than non-Ensemble classification techniques. Hyperparameter tuning is an essential step in developing these models and it improves the performance of the model. Impact on Society: Statistical analysis of the data revealed the true nature of demand and supply and price disruption. This analysis helps to assess the revenue impact borne by the farmers due to Covid-19. The machine learning and deep learning models help the farmers to get a better price for their crops. Though the da-taset used in this paper is related to India, the outcome of this research work applies to many developing countries that have similar regulated markets. Hence farmers from developing countries across the world can benefit from the outcome of this research work. Future Research: The machine learning and deep learning models were implemented and tested for markets in and around Bangalore. The model can be expanded to cover other markets within India.




ty

NOTICE OF RETRACTION: The Influence of Ethical and Transformational Leadership on Employee Creativity in Malaysia's Private Higher Education Institutions: The Mediating Role of Organizational Citizenship Behaviour

Aim/Purpose: ************************************************************************ After its investigation, the Research Ethics, Integrity, and Governance team at RMIT University found that the primary author of this paper breached the Australian Code and/or RMIT Policy and requested that the article be retracted. ************************************************************************** This paper aimed to examine the influence of ethical and transformational leadership on employee creativity in Malaysia’s private higher education institutions (PHEIs) and the mediating role of organizational citizenship behavior. Background: To ensure their survival and success in today’s market, organizations need people who are creative and driven. Previous studies have demonstrated the importance of ethical leadership in fostering employee innovation and good corporate responsibility. Research on ethical leadership and transformational leadership, in particular, has played a significant role in elucidating the role of leadership in relation to organizational citizenship behavior (OCB). In this study, we have focused on ethical and transformational leadership as an antecedent for enhancing employee creativity. Despite an increase in leadership research, little is known about the underlying mechanisms that link ethical leadership and transformational leadership to OCB. Because it sheds light on factors other than ethical leadership and transformational leadership that influence employees’ extra-role activity, this research is relevant theoretically. OCB may have a mediating function between ethical leadership and transformational leadership style and employee creativity because it is associated with the greatest outcomes, but empirical research has yet to prove this. So, one of the study’s goals is to add to the hypotheses about how ethical leadership style and transformational leadership affect employee creativity by using an important mediating variable – OCB. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather the data in a specific period. A convenient sampling approach was used to gauge 275 employees from Malaysia’s PHEIs. To test the hypotheses and obtain a conclusion, the acquired data was analyzed using the partial least square technique (PLS-SEM). Contribution: The study contributes to leadership literature by advancing OCB as a mediating factor that accounts for the link between ethical and transformational leadership and employee creativity in the higher education sector. Findings: According to the research, OCB has a substantial influence on the creativity of employees. Furthermore, ethical leadership boosted OCB and boosted employee creativity, according to the research. OCB and employee creativity have both been demonstrated to benefit greatly from transformational leadership. Further research revealed that OCB is a mediating factor in the link between leadership styles and creative thinking among employees. Recommendations for Practitioners: Higher education institutions should focus on developing leaders who value transparency and self-awareness in their interactions with followers and who demonstrate an inner moral perspective in addition to balanced information processing to ensure positive outcomes at the individual and organizational levels. Higher education institutions should place a priority on hiring leaders that exhibit ethical and transformational traits to raise awareness of these leadership styles among employees. Recommendation for Researchers: The new study also adds significantly to the body of knowledge by examining the relationship between ethical and transformational leadership and the creativity of the workforce. It aimed to identify the relationship between transformational leadership style and individual creativity in higher education by examining the mediating influence of OCB. Impact on Society: Higher education institutions should devise strategies for developing ethical and transformative leaders who will assist boost OCB and creativity within their workforce. Students and faculty in higher education can benefit from these leadership methods by learning to think in more diverse ways and by developing thought processes that lead to a larger pool of innovative ideas and solutions. As a consequence, employees who show creative behavior may be effectively managed by leaders who utilize ethical and transformational leadership styles and motivate them to show OCB that allow them to solve creative problems creatively. Future Research: A mixed-methods approach should be used in future research, and this should be done in public institutions in developing and developed nations to put the findings to use and generalize them even further. Future research will be able to examine other mediators to learn more about how and why ethical and transformational leadership styles affect PHEI employees’ creativity.




ty

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




ty

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




ty

The Role of Corporate Social Responsibility in Business Performance: The Moderation Influence of Blockchain Technology

Aim/Purpose: The major challenges for firms to initiate corporate social responsibility (CSR) arise from resource constraints, complexity, and uncertainty. Consuming considerable financial and human resources is the main difficulty for smaller firms or those operating in less profitable industries, and the lack of immediate outputs from CSR initiatives poses a challenge for firms in prioritizing and assessing their effectiveness. Background: To better integrate CSR management into overall business strategy and decision-making processes, Blockchain technology (BCT) could potentially offer a feasible and optimal alternative to CSR reports. Methodology: This study uses the fixed effects regression by way of the Least Squares Dummy Variable (LSDV) approach in STATA to analyze the direct effect of CSR management on business performance and the moderating effect of BCT adoption on this relationship with a panel data set of 5810 observations collected from the 874 listed companies in 2015 in Taiwan Stock Exchange through 2021. Contribution: This study contributes to the literature by shedding light on the organizational factors that influence BCT adoption. Findings: The findings show that firms with high levels of CSR management have better business performance. Additionally, the adoption of BCT strengthens the positive relationship between CSR management and business performance, but it cannot replace the fundamental principles of CSR. Finally, firm size does not significantly affect BCT adoption, indicating that companies of all sizes have an equal opportunity to adopt BCT, which can help to level the playing field in terms of resources available to different firms. Recommendations for Practitioners: This study suggests that firms managing CSR practices have better business performance, and the adoption of BCTs further enhances this positive relationship. However, BCT adoption does not have the same positive effect on business performance as CSR practices. Additionally, this research can help to inform public policy related to BCT adoption and diffusion. Recommendation for Researchers: By exploring the factors that influence BCT adoption, future researchers can provide insights into the key challenges and opportunities faced by organizations of different sizes and help to develop strategies for promoting the effective adoption of BCT. Impact on Society: Given the limitations of current CSR reporting, the understanding gained from BCT applications can provide companies with an alternative mechanism to foster progress in CSR implementation. Future Research: Firstly, while the fixed-effects model might have dampened the power of explanation because it only captures within-unit variation and ignores between-unit variation, the explanatory power is further limited due to only integrating two independent variables in this model. Because of limited data availability, this study only utilizes CSR_Report and firm_size as independent variables. Future studies can consider more key factors and may lead to different results. Additionally, panel data is collected from Taiwan and, therefore, may not be representative of the broader population. Future researchers integrating the Stock Exchange of different countries are recommended.




ty

The Perspectives of University Academics on Their Intention to Purchase Green Smartphones in Sri Lanka

Aim/Purpose: Most people use their phones for work and communication. Businesses today require sustainable mobile phones to limit the environmental impact of mobile phones. According to the Environmental Protection Agency (EPA), a green product uses less energy. Green smartphones need low radiation emission, are made from recyclable materials, and are designed to last longer than typical smartphones. Further, the manufacturing process needs to have a low environmental impact. The present study aims to identify the influence of variables (such as Green Awareness, Environmental Concern, Altruism, and Willingness to Pay) on green smartphone purchase intention among academics in the Sri Lankan higher education sector. Background: With the swift technological advances, almost everyone has begun to use smartphones. Simultaneously, smartphone manufacturers have begun to release cutting-edge smartphone models to the general public. As a result, it has generated a significant amount of e-waste for the environment. As a result, therefore, the sustainability of green smartphones has become a major societal concern in the developed world, but this is not yet true in the developing world Methodology: The study used a qualitative research method in which the authors attempted to acquire primary data by conducting in-depth interviews with academics from the Sri Lankan higher education sector using a semi-structured interview guide. Eight interviews were conducted, audio recorded, and word-to-word transcribed for content analysis. Researchers used content analysis to determine the presence, meanings, and linkages of specific words, themes, or concepts. Contribution: The findings provide important environmental insights for smartphone makers and society, such as introducing waste reduction programs and energy-saving practices and creating awareness among people to change their consumption patterns. The study will provide valuable insights into the green smartphone phone purchasing intentions of academics in a developing country, especially helping green smartphone producers and marketers construct effective tactics with the insight of the current study based on university faculty members’ viewpoints. Findings: The current study’s findings revealed that academics acknowledge the need for environmental protection with an awareness of the green concept and environmental concerns. According to the interviews, most participants intended to move from their present smartphone to an ecologically friendly phone, as they explained on altruism. This implies that even academics in underdeveloped countries are worried about environmental issues and have shown a more robust understanding of these issues and how environmentally aware individuals’ activities may assist the earth’s sustainability. Further, academics have a willingness to pay for a green smartphone. Recommendations for Practitioners: Academics prioritize environmental conservation when making purchases. This implies that manufacturers and enterprises should focus on developing and in- novating more environmentally friendly products. Recommendation for Researchers: Using only academics as a sample approach is severely limited if the study’s population comprises people with various qualities. Nevertheless, this study presented only four independent variables, and more factors impacting green smartphone purchasing intention may exist. As a result, it is proposed that future research consider other factors. Impact on Society: It was discovered that most participants displayed altruism in their product purchases, implying that policymakers must strengthen the moral practice of concern for the welfare and happiness of other humans, even in developing countries. Future Research: A further in-depth study focusing on many perspectives such as limits and motivations for purchasing green products in various socioeconomic groups with varying moderating factors such as gender, education, rural-urban, and so on would be advantageous. Individual (emotions, habits, perceived behavioral control, trust, values, personal norm, knowledge) and situational (availability, product attributes, subjective norm, brand, eco-labeling) variables should be included in future research.




ty

Analysis of the Scale Types and Measurement Units in Enterprise Architecture (EA) Measurement

Aim/Purpose: This study identifies the scale types and measurement units used in the measurement of enterprise architecture (EA) and analyzes the admissibility of the mathematical operations used. Background: The majority of measurement solutions proposed in the EA literature are based on researchers’ opinions and many with limited empirical validation and weak metrological properties. This means that the results generated by these solutions may not be reliable, trustworthy, or comparable, and may even lead to wrong investment decisions. While the literature proposes a number of EA measurement solutions, the designs of the mathematical operations used to measure EA have not yet been independently analyzed. It is imperative that the EA community works towards developing robust, reliable, and widely accepted measurement solutions. Only then can senior management make informed decisions about the allocation of resources for EA initiatives and ensure that their investment yields optimal results. Methodology: In previous research, we identified, through a systematic literature review, the EA measurement solutions proposed in the literature and classified them by EA entity types. In a subsequent study, we evaluated their metrology coverage from both a theoretical and empirical perspective. The metrology coverage was designed using a combination of the evaluation theory, best practices from the software measurement literature including the measurement context model, and representational theory of measurement to evaluate whether EA measurement solutions satisfy the metrology criteria. The research study reported here presents a more in-depth analysis of the mathematical operations within the proposed EA measurement solutions, and for each EA entity type, each mathematical operation used to measure EA was examined in terms of the scale types and measurement units of the inputs, their transformations through mathematical operations, the impact in terms of scale types, and measurement units of the proposed outputs. Contribution: This study adds to the body of knowledge on EA measurement by offering a metrology-based approach to analyze and design better EA measurement solutions that satisfy the validity of scale type transformations in mathematical operations and the use of explicit measurement units to allow measurement consistency for their usage in decision-making models. Findings: The findings from this study reveal that some important metrology and quantification issues have been overlooked in the design of EA measurement solutions proposed in the literature: a number of proposed EA mathematical operations produce numbers with unknown units and scale types, often the result of an aggregation of undetermined assumptions rather than explicit quantitative knowledge. The significance of such aggregation is uncertain, leading to numbers that have suffered information loss and lack clear meaning. It is also unclear if it is appropriate to add or multiply these numbers together. Such EA numbers are deemed to have low metrological quality and could potentially lead to incorrect decisions with serious and costly consequences. Recommendations for Practitioners: The results of the study provide valuable insights for professionals in the field of EA. Identifying the metrology limitations and weaknesses of existing EA measurement solutions may indicate, for instance, that practitioners should wait before using them until their design has been strengthened. In addition, practitioners can make informed choices and select solutions with a more robust metrology design. This, in turn, will benefit enterprise architects, software engineers, and other EA professionals in decision making, by enabling them to take into consideration factors more adequately such as cost, quality, risk, and value when assessing EA features. The study’s findings thus contribute to the development of more reliable and effective EA measurement solutions. Recommendation for Researchers: Researchers can use with greater confidence the EA measurement solutions with admissible mathematical operations and measurement units to develop new decision-making models. Other researchers can carry on research to address the weaknesses identified in this study and propose improved ones. Impact on Society: Developers, architects, and managers may be making inappropriate decisions based on seriously flawed EA measurement solutions proposed in the literature and providing undue confidence and a waste of resources when based on bad measurement design. Better quantitative tools will ultimately lead to better decision making in the EA domain, as in domains with a long history of rigor in the design of the measurement tools. Such advancements will benefit enterprise architects, software engineers, and other practitioners, by providing them with more meaningful measurements for informed decision making. Future Research: While the analysis described in this study has been explicitly applied to evaluating EA measurement solutions, researchers and practitioners in other domains can also examine measurement solutions proposed in their respective domains and design new ones.




ty

How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data

Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.




ty

Agile Practices and Their Impact on Agile Maturity Level of Software Companies in Nepal

Aim/Purpose: Using the Agile Adoption Framework (AAF), this study aims to examine the agile potential of software development companies in Nepal based on their agile maturity level. In addition, this study also examines the impact of various basic agile practices in determining the maturity level of the agile processes being implemented in the software industry of Nepal. Background: Even if most organizations in the software sector utilize agile development strategies, it is essential to evaluate their performance. Nepal’s software industry did not adopt agile techniques till 2014. The Nepalese industry must always adapt to new developments and discover ways to make software development more efficient and beneficial. The population of the study consists of 1,500 and 2,000 employees of software companies in Nepal implementing agile techniques. Methodology: The sample size considered was 150 employees working in software companies in Nepal. However, only 106 respondents responded after three follow-ups. The sample was collected with purposive sampling. A questionnaire was developed to gain information on Customer Adaptive, Customer Collaboration, Continuous Delivery, Human Centric, and Technical Excellence related to agile practices along with the Agile Maturity Level. Contribution: This research contributes to the understanding of agile practices adopted in software companies in developing countries like Nepal. It also reveals the determinants of the agility of software companies in developing countries. Findings: The results suggest that some of the basic principles of agile have a very significant role in Agile Maturity Level in the Nepali context. In the context of Nepal, human-centered practices have a very high level of correlation, which plays a vital role as a major predictor of the agile maturity level. In addition, Technical Excellence is the variable that has the highest level of association with the Agile Maturity Level, making it the most significant predictor of this quality. Recommendations for Practitioners: As Nepali software companies are mostly offshore or serve outsourcing companies, there is a very thin probability of Nepali developers being able to interact with actual clients and this might be one of the reasons for the Nepali industry not relying on Customer Adaptation and Collaboration as major factors of the Agile methodologies. Continuous Delivery, on the other hand, has a significant degree of correlation with Agile Maturity Level. Human-centric practices have a very high level of correlation as well as being a major predictor in determining the Agile Maturity Level in the context of Nepal. Technical Excellence is the most significant predictor and the variable which has the highest level of correlation with Agile Maturity Level. Practitioners should mainly focus on technical excellence as well as human-centric practices to achieve a higher level of Agile Maturity. Recommendation for Researchers: There has not been any such research in the Nepali context that anyone could rely on, to deep dive into their organizational concerns regarding agile strategies and plans. Researchers will need to focus on a more statistical approach with data-driven solutions to the issues related to people and processes. Researchers will need to cover freelancers as well as academics to get a different perspective on what can be the better practices to achieve a higher level of agile maturity. Impact on Society: This study on Agile work is accessible not only to the software industry but also to the general public. The Agile technique has had a huge impact on society’s project management. It has revolutionized how teams approach project planning, development, and execution. The paper’s findings will further information regarding the Agile methodology, which emphasizes collaboration and communication, fosters teamwork and higher quality work, and promotes the exchange of knowledge, ideas, and the pursuit of common goals. Future Research: Owing to the limitations of this study, it is necessary to analyze agile practices in the Nepalese software sector using additional factors that influence agile maturity. The conclusion that years of agile experience do not serve as a balancing factor for both agile practices and the Agile Maturity Level requires additional research. Whether a software outsourcing firm or not, the organization type had no bearing on the degree of maturity of agile methods; this leaves space for further research.




ty

The Influence of Big Data Management on Organizational Performance in Organizations: The Role of Electronic Records Management System Potentiality

Aim/Purpose: The use of digital technology, such as an electronic records management system (ERMS), has prompted widespread changes across organizations. The organization needs to support its operations with an automation system to improve production performance. This study investigates ERMS’s potentiality to enhance organizational performance in the oil and gas industry. Background: Oil and gas organizations generate enormous electronic records that lead to difficulties in managing them without any system or digitalization procedure. The need to use a system to manage big data and records affects information security and creates several problems. This study supports decision-makers in oil and gas organizations to use ERMS to enhance organizational performance. Methodology: We used a quantitative method by integrating the typical partial least squares (SEM-PLS) approach, including measurement items, respondents’ demographics, sampling and collection of data, and data analysis. The SEM-PLS approach uses a measurement and structural model assessment to analyze data. Contribution: This study contributes significantly to theory and practice by providing advancements in identity theory in the context of big data management and electronic records management. This study is a foundation for further research on the role of ERMS in operations performance and Big Data Management (BDM). This research makes a theoretical contribution by studying a theory-driven framework that may serve as an essential lens to evaluate the role of ERMS in performance and increase its potentiality in the future. This research also evaluated the combined impacts of general technology acceptance theory elements and identity theory in the context of ERMS to support data management. Findings: This study provides an empirically tested model that helps organizations to adopt ERMS based on the influence of big data management. The current study’s findings looked at the concerns of oil and gas organizations about integrating new technologies to support organizational performance. The results demonstrated that individual characteristics of users in oil and gas organizations, in conjunction with administrative features, are robust predictors of ERMS. The results show that ERMS potentiality significantly influences the organizational performance of oil and gas organizations. The research results fit the big ideas about how big data management and ERMS affect respondents to adopt new technologies. Recommendations for Practitioners: This study contributes significantly to the theory and practice of ERMS potentiality and BDM by developing and validating a new framework for adopting ERMS to support the performance and production of oil and gas organizations. The current study adds a new framework to identity theory in the context of ERMS and BDM. It increases the perceived benefits of using ERMS in protecting the credibility and authenticity of electronic records in oil and gas organizations. Recommendation for Researchers: This study serves as a foundation for future research into the function and influence of big data management on ERMS that support the organizational performance. Researchers can examine the framework of this study in other nations in the future, and they will be able to analyze this research framework to compare various results in other countries and expand ERMS generalizability and efficacy. Impact on Society: ERMS and its impact on BDM is still a developing field, and readers of this article can assist in gaining a better understanding of the literature’s dissemination of ERMS adoption in the oil and gas industry. This study presents an experimentally validated model of ERMS adoption with the effect of BDM in the oil and gas industry. Future Research: In the future, researchers may be able to examine the impact of BDM and user technology fit as critical factors in adopting ERMS by using different theories or locations. Furthermore, researchers may include the moderating impact of demographical parameters such as age, gender, wealth, and experience into this study model to make it even more robust and comprehensive. In addition, future research may examine the significant direct correlations between human traits, organizational features, and individual perceptions of BDM that are directly related to ERMS potentiality and operational performance in the future.




ty

Unveiling the Secrets of Big Data Projects: Harnessing Machine Learning Algorithms and Maturity Domains to Predict Success

Aim/Purpose: While existing literature has extensively explored factors influencing the success of big data projects and proposed big data maturity models, no study has harnessed machine learning to predict project success and identify the critical features contributing significantly to that success. The purpose of this paper is to offer fresh insights into the realm of big data projects by leveraging machine-learning algorithms. Background: Previously, we introduced the Global Big Data Maturity Model (GBDMM), which encompassed various domains inspired by the success factors of big data projects. In this paper, we transformed these maturity domains into a survey and collected feedback from 90 big data experts across the Middle East, Gulf, Africa, and Turkey regions regarding their own projects. This approach aims to gather firsthand insights from practitioners and experts in the field. Methodology: To analyze the feedback obtained from the survey, we applied several algorithms suitable for small datasets and categorical features. Our approach included cross-validation and feature selection techniques to mitigate overfitting and enhance model performance. Notably, the best-performing algorithms in our study were the Decision Tree (achieving an F1 score of 67%) and the Cat Boost classifier (also achieving an F1 score of 67%). Contribution: This research makes a significant contribution to the field of big data projects. By utilizing machine-learning techniques, we predict the success or failure of such projects and identify the key features that significantly contribute to their success. This provides companies with a valuable model for predicting their own big data project outcomes. Findings: Our analysis revealed that the domains of strategy and data have the most influential impact on the success of big data projects. Therefore, companies should prioritize these domains when undertaking such projects. Furthermore, we now have an initial model capable of predicting project success or failure, which can be invaluable for companies. Recommendations for Practitioners: Based on our findings, we recommend that practitioners concentrate on developing robust strategies and prioritize data management to enhance the outcomes of their big data projects. Additionally, practitioners can leverage machine-learning techniques to predict the success rate of these projects. Recommendation for Researchers: For further research in this field, we suggest exploring additional algorithms and techniques and refining existing models to enhance the accuracy and reliability of predicting the success of big data projects. Researchers may also investigate further into the interplay between strategy, data, and the success of such projects. Impact on Society: By improving the success rate of big data projects, our findings enable organizations to create more efficient and impactful data-driven solutions across various sectors. This, in turn, facilitates informed decision-making, effective resource allocation, improved operational efficiency, and overall performance enhancement. Future Research: In the future, gathering additional feedback from a broader range of big data experts will be valuable and help refine the prediction algorithm. Conducting longitudinal studies to analyze the long-term success and outcomes of Big Data projects would be beneficial. Furthermore, exploring the applicability of our model across different regions and industries will provide further insights into the field.




ty

Learning to (Co)Evolve: A Conceptual Review and Typology of Network Design in Global Health Virtual Communities of Practice

Aim/Purpose: This conceptual review analyzes the designs of global health virtual communities of practice (VCoPs) programming reported in the empirical literature and proposes a new typology of their functioning. The purpose of this review is to provide clarity on VCoP learning stages of (co)evolution and insight into VCoP (re)development efforts to best meet member, organization, and network needs against an ever-evolving landscape of complexity in global health. Background: Since the COVID-19 pandemic, the field of global health has seen an uptick in the use of VCoPs to support continuous learning and improve health outcomes. However, evidence of how different combinations of programmatic designs impact opportunities for learning and development is lacking, and how VCoPs evolve as learning networks has yet to be explored. Methodology: Following an extensive search for literature in six databases, thematic analysis was conducted on 13 articles meeting the inclusion criteria. This led to the development and discussion of a new typology of VCoP phases of learning (co)evolution. Contribution: Knowledge gained from this review and the new categorization of VCoPs can support the functioning and evaluation of global health training programs. It can also provide a foundation for future research on how VCoPs influence the culture of learning organizations and networks. Findings: Synthesis of findings resulted in the categorization of global health VCoPs into five stages (slightly evolving, somewhat revolving, moderately revolving, highly revolving, and coevolving) across four design domains (network development, general member engagement before/after sessions, general member engagement during sessions, and session leadership). All global health VCoPs reviewed showed signs of adaptation and recommended future evolution. Recommendations for Practitioners: VCoP practitioners should pay close attention to how the structured flexibility of partnerships, design, and relationship development/accountability may promote or hinder VcoP’s continued evolution. Practitioners should shift perspective from short to mid- and long-term VCoP planning. Recommendation for Researchers: The new typology can stimulate further research to strengthen the clarity of language and findings related to VCoP functioning. Impact on Society: VCoPs are utilized by academic institutions, the private sector, non-profit organizations, the government, and other entities to fill gaps in adult learning at scale. The contextual implementation of findings from this study may impact VCoP design and drive improvements in opportunities for learning, global health, and well-being. Future Research: Moving forward, future research could explore how VCoP evaluations relate to different stages of learning, consider evaluation stages across the totality of VCoP programming design, and explore how best to capture VCoP (long-term) impact attributed to health outcomes and the culture of learning organizations and networks.




ty

Workers’ Knowledge Sharing and Its Relationship with Their Colleague’s Political Publicity in Social Media

Aim/Purpose: This paper intends to answer the question regarding the extent to which political postings with value differences/similarities will influence the level of implicit knowledge sharing (KS) among work colleagues in organizations. More specifically, the study assesses contributors’ responses to a workmate’s publicity about politics on social media platforms (SMP) and their eagerness to implement implicit KS to the co-worker. Background: Previously published articles have confirmed an association between publicity about politics and the reactions from workfellows in the organization. Moreover, prior work confirmed that workers’ social media postings about politics may create unfavorable responses, such as being disliked and distrusted by workfellows. This may obstruct the KS because interpersonal relations are among the KS’s essential components. Therefore, it is imperative to assess whether the workfellows’ relationship affected by political publicity would impede the KS in the office. Methodology: Data was gathered using the vignette technique and online survey. A total of 510 online and offline questionnaires were distributed to respondents in Indonesian Halal firms who have implemented knowledge-sharing practices and have been at work for no less than twelve months in the present role. Next, the 317 completed questionnaires were examined with partial least squares structural equation modeling (PLS-SEM). Contribution: Postings about politics on SMP can either facilitate or impede the level of KS in organizations, and this research topic is relatively scarce in the knowledge management discipline. While previously published articles have concentrated on public organizations, this research centers on private firms. Moreover, this work empirically examines private companies in Indonesia, which is also understudied in the existing literature. Findings: The outcomes confirm that perceived political value similarity (PPV) in a co-worker’s social-media publicity has a significant and indirect influence on contributors’ eagerness to perform implicit/tacit KS. Further, colleague likability and trustworthiness significantly influence the level of KS among respondents. As PPV significantly forms colleague likability, likability strongly and positively shapes trustworthiness. Recommendations for Practitioners: The study shows that political publicity significantly affects implicit knowledge sharing (KS). As a result, managers and leaders, particularly those in private firms, are strengthened to instruct their staff about the ramifications of publicity embedded in employees’ SMP postings, particularly about political topics, as it may result in either negative or positive perceptions amongst the staff towards the workmate who posts. Recommendation for Researchers: As this study focuses on examining KS behavior in a large context, i.e., Indonesia Halal firms that dominate the Indonesian economy, and the fact that much polarization research focuses on society at large and less on specific sectors of life, it is important and interesting for researchers to conduct similar studies in a specific workplace as political agreements and disagreements become so important and consequential in everyday lives. Impact on Society: This article makes the implication that a person’s personality can influence how they react to political posts on SMP. It is difficult for the exposers to know the personality of each viewer of publicity in daily life. Workers’ newfound knowledge can motivate them to use SMP responsibly and lessen the probability that they will disclose information that might make their co-workers feel or perceive anything unfavorably. Future Research: There is a need for further studies to examine if the results can be applied to different locations and organizations, as individuals’ behaviors may vary according to the cultures of society and firms. Furthermore, future research can take into account the individual characteristics of workers, such as hospitability, self-confidence, and psychological strength, which may be well-matched with future work models. Future research may potentially employ a qualitative technique to offer deeper insights into the same topic.




ty

The Influence of Augmented Reality Face Filter Addiction on Online Social Anxiety: A Stimulus-Organism-Response Perspective

Aim/Purpose: This study aims to analyze the factors that influence user addiction to AR face filters in social network applications and their impact on the online social anxiety of users in Indonesia. Background: To date, social media users have started to use augmented reality (AR) face filters. However, AR face filters have the potential to create positive and negative effects for social media users. The study combines the Big Five Model (BFM), Sense of Virtual Community (SVOC), and Stimuli, Organism, and Response (SOR) frameworks. We adopted the SOR theory by involving the personality factors and SOVC factors as stimuli, addiction as an organism, and social anxiety as a response. BFM is the most significant theory related to personality. Methodology: We used a quantitative approach for this study by using an online survey. We conducted research on 903 Indonesian respondents who have used an AR face filter feature at least once. The respondents were grouped into three categories: overall, new users, and old users. In this study, group classification was carried out based on the development timeline of the AR face filter in the social network application. This grouping was carried out to facilitate data analysis as well as to determine and compare the different effects of the factors in each group. The data were analyzed using the covariance-based structural equation model through the AMOS 26 program. Contribution: This research fills the gap in previous research which did not discuss much about the impact of addiction in using AR face filters on online social anxiety of users of social network applications. Findings: The results of this study indicated neuroticism, membership, and immersion influence AR face filter addiction in all test groups. In addition, ARA has a significant effect on online social anxiety. Recommendations for Practitioners: The findings are expected to be valuable to social network service providers and AR creators in improving their services and to ensure policies related to the list of AR face filters that are appropriate for use by their users as a form of preventing addictive behavior of that feature. Recommendation for Researchers: This study suggested other researchers consider other negative impacts of AR face filters on aspects such as depression, life satisfaction, and academic performance. Impact on Society: AR face filter users may experience changes in their self-awareness in using face filters and avoid the latter’s negative impacts. Future Research: Future research might explore other impacts from AR face filter addiction behavior, such as depression, life satisfaction, and so on. Apart from that, future research might investigate the positive impact of AR face filters to gain a better understanding of the impact of AR face filters.




ty

Emphasizing Data Quality for the Identification of Chili Varieties in the Context of Smart Agriculture

Aim/Purpose: This research aims to evaluate models from meta-learning techniques, such as Riemannian Model Agnostic Meta-Learning (RMAML), Model-Agnostic Meta-Learning (MAML), and Reptile meta-learning, to obtain high-quality metadata. The goal is to utilize this metadata to increase accuracy and efficiency in identifying chili varieties in smart agriculture. Background: The identification of chili varieties in smart agriculture is a complex process that requires a multi-faceted approach. One challenge in chili variety identification is the lack of a large and diverse dataset. This can be addressed using meta-learning techniques, which allow the model to leverage knowledge learned from other related tasks or artificially expand the dataset by applying transformations to existing data. Another challenge is the variation in growing conditions, which can affect the appearance of chili varieties. Meta-learning techniques can help address this challenge by allowing the model to adapt to variations in growing conditions with task-specific embeddings and optimizations. With the help of meta-learning techniques, such as data augmentation, data characterization, selection of datasets, and performance estimation, quality metadata for accurate identification of chili varieties can be achieved even in the presence of limited data and variations in growing conditions. Furthermore, the use of meta-learning techniques in chili variety identification can also assist in addressing challenges related to the computational complexity of the task. Methodology: The research approach employed is quantitative, specifically comparing three models from meta-learning techniques to determine which model is most suitable for our dataset. Data was collected from the variety assembly garden in the form of images of chili leaves using a mobile device. The research successfully gathered 1,974 images of chili leaves, with 697 images of large red chilies, 649 images of curly red chilies, and 628 images of cayenne peppers. These chili leaf images were then processed using augmentation techniques. The results of image data augmentation were categorized based on leaf characteristics (such as oval, lancet, elliptical, serrated leaf edges, and flat leaf edges). Subsequently, training and validation utilized three models from meta-learning techniques. The final stage involved model evaluation using 2-way and 3-way classification, as well as 5-shot and 10-shot learning scenarios to select the dataset with the best performance. Contribution: Improving classification accuracy, with a focus on ensuring high-quality data, allows for more precise identification and classification of chili varieties. Enhancing model training through an emphasis on data quality ensures that the models receive reliable and representative input, leading to improved generalization and performance in identifying chili varieties. Findings: With small collections of datasets, the authors have used data augmentation and meta-learning techniques to overcome the challenges of limited data and variations in growing conditions. Recommendations for Practitioners: By leveraging the knowledge and adaptability gained from meta-learning, accurate identification of chili varieties can be achieved even with limited data and variations in growing conditions. The use of meta-learning techniques in chili variety identification can greatly improve the accuracy and reliability of the identification process. Recommendation for Researchers: Using meta-learning techniques, such as transfer learning and parameter optimization, researchers can overcome challenges related to limited data and variations in growing conditions in chili variety identification. Impact on Society: The findings from this research can help identify superior chili seeds, thereby motivating farmers to cultivate high-quality chilies and achieve bountiful harvests. Future Research: We intend to verify our approach on a more extensive array of datasets and explore the implementation of more resilient regularization techniques, going beyond image augmentation, within the meta-learning techniques. Furthermore, our goal is to expand our research to encompass the automatic learning of parameters during training and tackle issues associated with noisy labels. Building on the insights gained from our observed outcomes, a future objective is to enhance the refinement of model-agnostic meta-learning techniques that can effectively adapt to intricate task distributions with substantial domain gaps between tasks. To realize this aim, our proposal involves devising model-agnostic meta-learning techniques specifically designed for multi-modal scenarios.




ty

Continuous Use of Mobile Banking Applications: The Role of Process Virtualizability, Anthropomorphism and Virtual Process Failure Risk

Aim/Purpose: The research aims to investigate the factors that influence the continuous use of mobile banking applications to complete banking monetary transactions. Background: Despite a significant increase in the use of mobile banking applications, particularly during the COVID-19 pandemic, new evidence indicates that the use rate of mobile banking applications for operating banking monetary transactions has declined. Methodology: The study proposed an integrated model based mainly on the process virtualization theory (PVT) with other novel factors such as mobile banking application anthropomorphism and virtual process failure risk. The study model was empirically validated using structural equation modeling analysis on quantitative data from 484 mobile banking application users from Jordan. Contribution: The study focuses on continuing use or post-adoption behavior rather than pre-adoption behavior. This is important since the maximum and long-term viability, as well as the financial investment in mobile banking applications, depend on regular usage rather than first-time use or initial experience. Findings: The results indicate that process virtualizable and anthropomorphism have a strong positive impact on bank customers’ decisions to continue using mobile banking applications to complete banking monetary transactions. Meanwhile, the negative impact of virtualization process failure risk on continuous use has been discovered. The found factors explain 67.5% of the variance in continuous use. Recommendations for Practitioners: The study identified novel, significant factors that affect bank customers’ decisions to use mobile banking applications frequently, and these factors should be examined, matched, satisfied, or addressed when redesigning or upgrading mobile applications. Banks should provide users with clear directions, processes, or tutorials on how to complete monetary transactions effectively. They should also embrace Artificial Intelligence (AI) technology to improve their applications and products with anthropomorphic features like speech synthesizers, Chatbots, and AI-powered virtual bank assistants. This is expected to help bank customers conduct various banking services conveniently and securely, just as if interacting with real people. The study further recommends that banks create and publish clear norms and procedures, as well as promote tolerance and protect consumers’ rights when the process fails or mistakes occur. Recommendation for Researchers: The study provides measurement items that were specifically built for the context of mobile banking applications based on PVT notions. Researchers are invited to reuse, test, and modify existing measurement items, as well as submit new ones if necessary. The study model does not consider psychological aspects like trust and satisfaction, which would provide additional insight into factors affecting continuing use. Researchers could potentially take a different approach by focusing on user resistance and non-adoption. Impact on Society: Financial inclusion is problematic, particularly in underdeveloped nations. According to financial inclusion research, Jordanians rarely utilize mobile banking apps. Continuous usage of mobile banking applications will be extremely beneficial in closing the financial inclusion gap, particularly among women. Furthermore, it could help the country’s efforts to transition to a digital society. Future Research: The majority of study participants are from urban areas. Future studies should focus on consumers who live in rural areas. It was also suggested that the elderly be targeted because they may have different views/perspectives on the continued use of mobile banking applications.




ty

Feature analytics of asthma severity levels for bioinformatics improvement using Gini importance

In the context of asthma severity prediction, this study delves into the feature importance of various symptoms and demographic attributes. Leveraging a comprehensive dataset encompassing symptom occurrences across varying severity levels, this investigation employs visualisation techniques, such as stacked bar plots, to illustrate the distribution of symptomatology within different severity categories. Additionally, correlation coefficient analysis is applied to quantify the relationships between individual attributes and severity levels. Moreover, the study harnesses the power of random forest and the Gini importance methodology, essential tools in feature importance analytics, to discern the most influential predictors in asthma severity prediction. The experimental results bring to light compelling associations between certain symptoms, notably 'runny-nose' and 'nasal-congestion', and specific severity levels, elucidating their potential significance as pivotal predictive indicators. Conversely, demographic factors, encompassing age groups and gender, exhibit comparatively weaker correlations with symptomatology. These findings underscore the pivotal role of individual symptoms in characterising asthma severity, reinforcing the potential for feature importance analysis to enhance predictive models in the realm of asthma management and bioinformatics.




ty

Leading the diversity and inclusion narrative through continuing professional education

This conceptual research aims to connect aspects of learning activities of continuing education for professionals (CPE). The objective is to provide conclusions about modes of professional learning within diversity, equity, inclusion, and belonging (DEIB) training. This interpretation is placed in context relating to the process of professional learning objectives. A CPE DEIB training plan is presented as an example of how to provide continuing professional education to adult learners within a DEIB curriculum (El-Amin, 2020). The purpose of incorporating the foundations of CPE into DEIB training permits organisations to strengthening organisational development and productivity. By connecting the foundations of curriculum design, alignment, assessment and mapping, and research-informed innovation, CPE aims to enhance the effectiveness of organisational DEIB initiatives. A CPE DEIB training plan emphasises the importance of accountability, employee involvement, and effective training to drive DEIB initiatives.




ty

Practical Guidelines for Learning Object Granularity from One Higher Education Setting




ty

Interoperability and Learning Objects: An Overview of E-Learning Standardization




ty

Learning Objects: Adaptive Retrieval through Learning Styles




ty

Viability of the "Technology Acceptance Model" in Multimedia Learning Environments: A Comparative Study




ty

Practical E-Learning for the Faculty of Mathematics and Physics at the University of Ljubljana




ty

Learning Pod: A New Paradigm for Reusability of Learning Objects




ty

Repository 2.0: Social Dynamics to Support Community Building in Learning Object Repositories




ty

Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability




ty

Quality Metrics for PDA-based M-Learning Information Systems




ty

Course Coordinators’ Beliefs, Attitudes and Motivation and their Relation to Self-Reported Changes in Technology Integration at the Open University of Israel




ty

Complexity of Social Interactions in Collaborative Learning: The Case of Online Database Environment




ty

Nurturing a Community of Practice through a Collaborative Design of Lesson Plans on a Wiki System




ty

Keeping an Eye on the Screen: Application Accessibility for Learning Objects for Blind and Limited Vision Students




ty

Facilitation of Formative Assessments using Clickers in a University Physics Course




ty

Media Type Influences Preschooler’s Literacy Development: E-book versus Printed Book Reading




ty

Faculty Usage of Social Media and Mobile Devices: Analysis of Advantages and Concerns




ty

Connectivist Learning Objects and Learning Styles




ty

Evaluating How the Computer-Supported Collaborative Learning Community Fosters Critical Reflective Practices




ty

Academic Literacy and Cultural Familiarity: Developing and Assessing Academic Literacy Resources for Chinese Students




ty

A Data Mining Approach to Improve Re-Accessibility and Delivery of Learning Knowledge Objects




ty

What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability?




ty

Developing a Conceptual Framework for Evaluation of E-Content of Virtual Courses: E-Learning Center of an Iranian University Case Study