met Intellectual property protection for virtual assets and brands in the Metaverse: issues and challenges By www.inderscience.com Published On :: 2024-10-30T23:20:50-05:00 Intellectual property rights face new obstacles and possibilities as a result of the emergence of the Metaverse, a simulation of the actual world. This paper explores the current status of intellectual property rights in the Metaverse and examines the challenges and opportunities for enforcement. The article describes virtual assets and investigates their copyright and trademark protection. It also examines the protection of user-generated content in the Metaverse and the potential liability for copyright infringement. The article concludes with a consideration of the technological and jurisdictional obstacles to enforcing intellectual property rights in the Metaverse, as well as possible solutions for stakeholders. This paper will appeal to lawyers, policymakers, developers of virtual assets, platform owners, and anyone interested in the convergence of technology and intellectual property rights. Full Article
met Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of large error, low evaluation accuracy and long evaluation time in traditional evaluation methods of ideological and political education, this paper designs a quantitative evaluation method of ideological and political education achievements based on collaborative filtering algorithm. First, the evaluation index system is constructed to divide the teaching achievement evaluation index data in a small scale; then, the quantised dataset is determined and the quantised index weight is calculated; finally, the collaborative filtering algorithm is used to generate a set with high similarity, construct a target index recommendation list, construct a quantitative evaluation function and solve the function value to complete the quantitative evaluation of teaching achievements. The results show that the evaluation error of this method is only 1.75%, the accuracy can reach 98%, and the time consumption is only 2.0 s, which shows that this method can improve the quantitative evaluation effect. Full Article
met A risk identification method for abnormal accounting data based on weighted random forest By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good. Full Article
met Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of poor evaluation accuracy and long evaluation time in traditional customer relationship evaluation methods, this study proposes a new customer relationship evaluation method for e-commerce platform based on decision tree algorithm. Firstly, analyse the connotation and characteristics of customer relationship; secondly, the importance of customer relationship in e-commerce platform is determined by using decision tree algorithm by selecting and dividing attributes according to the information gain results. Finally, the decision tree algorithm is used to design the classifier, the weighted sampling method is used to obtain the training samples of the base classifier, and the multi-period excess income method is used to construct the customer relationship evaluation function to achieve customer relationship evaluation. The experimental results show that the accuracy of the customer relationship evaluation results of this method is 99.8%, and the evaluation time is only 51 minutes. Full Article
met Evaluation method of cross-border e-commerce supply chain innovation mode based on blockchain technology By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the low evaluation accuracy of the effectiveness of cross-border e-commerce supply chain innovation model and the low correlation coefficient of innovation model influencing factors, the evaluation method of cross-border e-commerce supply chain innovation model based on blockchain technology is studied. First, analyse the operation mode of cross-border e-commerce supply chain, and determine the key factors affecting the innovation mode; Then, the comprehensive integration weighting method is used to analyse the factors affecting innovation and calculate the weight value; Finally, the blockchain technology is introduced to build an evaluation model for the supply chain innovation model and realise the evaluation of the cross-border e-commerce supply chain innovation model. The experimental results show that the evaluation accuracy of the proposed method is high, and the highest correlation coefficient of the influencing factors of innovation mode is about 0.99, which is feasible. Full Article
met Risk assessment method of power grid construction project investment based on grey relational analysis By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency. Full Article
met Student's classroom behaviour recognition method based on abstract hidden Markov model By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably. Full Article
met A data mining method based on label mapping for long-term and short-term browsing behaviour of network users By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the speedup and recognition accuracy of the recognition process, this paper designs a data mining method based on label mapping for long-term and short-term browsing behaviour of network users. First, after removing the noise information in the behaviour sequence, calculate the similarity of behaviour characteristics. Then, multi-source behaviour data is mapped to the same dimension, and a behaviour label mapping layer and a behaviour data mining layer are established. Finally, the similarity of the tag matrix is calculated based on the similarity calculation results, and the mining results are output using SVM binary classification process. Experimental results show that the acceleration ratio of this method exceeds 0.9; area under curve receiver operating characteristic curve (AUC-ROC) value increases rapidly in a short time, and the maximum value can reach 0.95, indicating that the mining precision of this method is high. Full Article
met Auditing the Performing Rights Society - investigating a new European Union Collective Management Organization member audit method By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The European Union Rights Management Directive 2014/26/EU, provides regulatory oversight of European Union (EU) Collective Management Organizations (CMOs). However, the Directive has no provision indicating how members of EU CMOs may conduct non-financial audits of their CMO income and reporting. This paper addresses the problem of a lack of an audit method through a case study of the five writer members of the music group Duran Duran, who have been members of the UK's CMO for performing rights - the Performing Rights Society (PRS) for over 35 years. The paper argues a new audit CMO member method that can address the lacunae regarding the absence of CMO member right to audit a CMO and an applicable CMO audit method. Full Article
met Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei). Full Article
met Mobile wallet payments - a systematic literature review with bibliometric and network visualisation analysis over two decades By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 The study aims to review the literature on mobile wallet payment and align research trends using a systematic literature review with bibliometric and network visualisation analysis over two decades. It uses bibliometric analysis of the literature research retrieved from the Web of Science database. The study period was from 2001 to 2021, with 1,134 research papers. It also provides the indicators like citation trends, cited reference patterns, authorship patterns, subject areas published on the mobile wallet, top contributing authors, and highly cited research articles using the database. Furthermore, network visualisation analysis, like the co-occurrence of author keywords and keywords plus terms, has also been examined using VOSviewer software. The bibliometric analysis shows that the Republic of China dominates mobile wallet payment, and India is a significant contributor. Furthermore, the constructions of the network map using a co-citation analysis and bibliographic coupling shows an interesting pattern of mobile wallet payment. Full Article
met Logical Soft Systems Methodology for Education Programme Development By Published On :: Full Article
met Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use By Published On :: Full Article
met Insights into Using Agile Development Methods in Student Final Year Projects By Published On :: Full Article
met Assessing the Impact of Instructional Methods and Information Technology on Student Learning Styles By Published On :: Full Article
met Meta-Analysis of Clinical Cardiovascular Data towards Evidential Reasoning for Cardiovascular Life Cycle Management By Published On :: Full Article
met Experimenting with eXtreme Teaching Method – Assessing Students’ and Teachers’ Experiences By Published On :: Full Article
met An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming By Published On :: Full Article
met On the Relationship between Warranty and the Risk of Information Asymmetry By Published On :: Full Article
met The Theory of Infoledge: A Logical, Mathematical, and Geometrical Interpretation By Published On :: Full Article
met The Development of Students Geometrical Thinking through Transformational Processes and Interaction Techniques in a Dynamic Geometry Environment By Published On :: Full Article
met Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE) By Published On :: Full Article
met Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods By Published On :: Full Article
met A Framework for Using Questions as Meta-tags to Enhance Knowledge Support Services as Part of a Living Lab Environment By Published On :: Full Article
met The Usefulness Metrics of The Most Popular eReader Used by Higher Education Students By Published On :: 2015-07-08 In the digital technology era, mobile devices have an important rule to deploy a copy of data and information through the network. An electronic reader (eReader) allows readers to read written materials in an electronic manner that is available in many models. The objective of this study is to evaluate the usage of eReader by higher education students. We firstly identified the most frequently used eReader by surveying higher education students. The survey results showed that Apple iPad, Amazon Kindle, and Samsung Tablet are the most popular eReader devices used by higher education students. We presented these results, and then we analyzed the surveyed results in detail in order to develop an evaluation metric of the eReader in a mobile platform that clearly allows the selection of the most suitable eReader for higher education students. The main contribution of this paper is the development of a set of criteria that can be used by students in the selection of an eReader that matches their specific needs and requirements. Full Article
met Implications of Updating Digital Literacy – A Case Study in an Optometric Curriculum By Published On :: 2019-04-08 Aim/Purpose: The aim of this project was to explore a method to enable an updated under-standing of digital literacy to be implemented in curricula in an environment of an existing, but outdated, understanding of digital literacy. . Background: The changing healthcare environment increasingly emphasizes the importance of digital literacy skills; therefore academics in the optometry discipline at Deakin University sought to better understand where digital literacy skills were taught in their program, and whether delivery was implicit or explicit. Methodology: This case study describes a systematic review of the optometric curriculum to first identify where and what digital literacy skills are currently being addressed in the curriculum, identify the gaps, and develop a strategy to address the gaps. Contribution: The main outcome of this work is the development of a spiraling curriculum to support the development of digital literacy skills required in later units of the program and for clinical practice post-graduation. Findings: Although the definition of digital literacy may be outdated, the digital literacy capabilities being addressed in the curriculum had grown as digital technology use by staff and students had expanded. This, together with the realization that students were not as digitally capable as expected, indicated that teaching digital literacy skills needed to be made overt throughout the curriculum. Recommendations for Practitioners: The process developed through this case study provides a strong foundation for course teams, curriculum developers and educational designers to efficiently analyze digital literacy expectations in existing, accredited health-related curricula and improve the curricula by more overtly embedding digital literacy teaching into it. Impact on Society: Graduates of the amended program of study are expected to be better prepared to undertake their future careers in a digitally enhanced and disrupted environment. Future Research: The framework will be used to explore digital literacy teaching practices in other disciplines. A systematic evaluation will be undertaken to identify the benefits and short comings of using the framework. The elements that make up the new definition of digital literacy need to be better articulated to allow curriculum developers to be better informed as to how to interpret the framework in their context. Full Article
met Findings From an Examination of a Class Purposed to Teach the Scientific Method Applied to the Business Discipline By Published On :: 2021-06-11 Aim/Purpose: This brief paper will provide preliminary insight into an institutions effort to help students understand the application of the scientific method as it applies to the business discipline through the creation of a dedicated, required course added to the curriculum of a mid-Atlantic minority-serving institution. In or-der to determine whether the under-consideration course satisfies designated student learning outcomes, an assessment regime was initiated that included examination of rubric data as well as the administration of a student perception survey. This paper summarizes the results of the early examination of the efficacy of the course under consideration. Background: A small, minority-serving, university located in the United States conducted an assessment and determined that students entering a department of business following completion of their general education science requirements had difficulties transferring their understanding of the scientific method to the business discipline. Accordingly, the department decided to create a unique course offered to sophomore standing students titled Principles of Scientific Methods in Business. The course was created by a group of faculty with input from a twenty person department. Methodology: Rubrics used to assess a course term project were collected and analyzed in Microsoft Excel to measure student satisfaction of learning goals and a student satisfaction survey was developed and administered to students enrolled in the course under consideration to measure perceived course value. Contribution: While the scientific method applies across the business and information disciplines, students often struggle to envision this application. This paper explores the implications of a course specifically purposed to engender the development and usage of logical and scientific reasoning skills in the business discipline by students in the lower level of an bachelors degree program. The information conveyed in this paper hopefully makes a contribution in an area where there is still an insufficient body of research and where additional exploration is needed. Findings: For two semesters rubrics were collected and analyzed representing the inclusion of 53 students. The target mean for the rubric was a 2.8 and the overall achieved mean was a 2.97, indicating that student performance met minimal expectations. Nevertheless, student deficiencies in three crucial areas were identified. According to the survey findings, as a result of the class students had a better understanding of the scientific method as it applies to the business discipline, are now better able to critically assess a problem, feel they can formulate a procedure to solve a problem, can test a problem-solving process, have a better understanding of how to formulate potential business solutions, understand how potential solutions are evaluated, and understand how business decisions are evaluated. Conclusion: Following careful consideration and discussion of the preliminary findings, the course under consideration was significantly enhanced. The changes were implemented in the fall of 2020 and initial data collected in the spring of 2021 is indicating measured improvement in student success as exhibited by higher rubric scores. Recommendations for Practitioners: These initial findings are promising and while considering student success, especially as we increasingly face a greater and greater portion of under-prepared students entering higher education, initiatives to build the higher order thinking skills of students via transdisciplinary courses may play an important role in the future of higher education. Recommendations for Researchers: Additional studies of transdisciplinary efforts to improve student outcomes need to be explored through collection and evaluation of rubrics used to assess student learning as well as by measuring student perception of the efficacy of these efforts. Impact on Society: Society needs more graduates who leave universities ready to solve problems critically, strategically, and with scientific reasoning. Future Research: This study was disrupted by the COVID-19 pandemic; however, it is resuming in late 2021 and it is the hope that a robust and detailed paper, with more expansive findings will eventually be generated. Full Article
met Towards a Methodology to Elicit Tacit Domain Knowledge from Users By Published On :: Full Article
met A Methodology for Increasing Business Process Maturity in Public Sector By Published On :: Full Article
met Knowledge Production in Networked Practice-based Innovation Processes – Interrogative Model as a Methodological Approach By Published On :: Full Article
met Framework for Quality Metrics in Mobile-Wireless Information Systems By Published On :: Full Article
met A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application By Published On :: Full Article
met Evaluating and Developing Innovation Capabilities with a Structured Method By Published On :: Full Article
met A Knowledge Integration Methodology for Developing Customized Maintenance Documents By Published On :: Full Article
met Towards A Methodology for the Pre-Stage of Implementing a Reengineering Project By Published On :: 2016-09-20 In order to reduce cost, improve functionality and gain competitive advantages, organizations resort to reengineering projects by developing and making changes to organizational processes. The absence of a unified methodology and appropriate analytic approaches prior to the implementation of reengineering projects has made authorities not to adopt correct decision making approaches in this respect. The objective of this paper is to propose a methodology that has to be adopted prior to the implementation of reengineering projects. The statistical population here consists of 25 expert analysts with MA and PhD degrees who are subject to answering a questionnaire. In this proposed methodology the Multi Criterion Decision Making model is applied to allow the analysts to select appropriate models for better and accurate implementation through the least failure coefficient. The Neyriz White Cement Corporation is selected as the subject and the obtained results are compared with the results obtained from similar implemented projects. Full Article
met Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries By Published On :: 2017-09-06 Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries. Full Article
met A Cognitive Knowledge-based Framework for Social and Metacognitive Support in Mobile Learning By Published On :: 2017-03-16 Aim/Purpose: This work aims to present a knowledge modeling technique that supports the representation of the student learning process and that is capable of providing a means for self-assessment and evaluating newly acquired knowledge. The objective is to propose a means to address the pedagogical challenges in m-learning by aiding students’ metacognition through a model of a student with the target domain and pedagogy. Background: This research proposes a framework for social and meta-cognitive support to tackle the challenges raised. Two algorithms are introduced: the meta-cognition algorithm for representing the student’s learning process, which is capable of providing a means for self-assessment, and the social group mapping algorithm for classifying students according to social groups. Methodology : Based on the characteristics of knowledge in an m-learning system, the cognitive knowledge base is proposed for knowledge elicitation and representation. The proposed technique allows a proper categorization of students to support collaborative learning in a social platform by utilizing the strength of m-learning in a social context. The social group mapping and metacognition algorithms are presented. Contribution: The proposed model is envisaged to serve as a guide for developers in implementing suitable m-learning applications. Furthermore, educationists and instructors can devise new pedagogical practices based on the possibilities provided by the proposed m-learning framework. Findings: The effectiveness of any knowledge management system is grounded in the technique used in representing the knowledge. The CKB proposed manipulates knowledge as a dynamic concept network, similar to human knowledge processing, thus, providing a rich semantic capability, which provides various relationships between concepts. Recommendations for Practitioners: Educationist and instructors need to develop new pedagogical practices in line with m-learning. Recommendation for Researchers: The design and implementation of an effective m-learning application are challenging due to the reliance on both pedagogical and technological elements. To tackle this challenge, frameworks which describe the conceptual interaction between the various components of pedagogy and technology need to be proposed. Impact on Society: The creation of an educational platform that provides instant access to relevant knowledge. Future Research: In the future, the proposed framework will be evaluated against some set of criteria for its effectiveness in acquiring and presenting knowledge in a real-life scenario. By analyzing real student interaction in m-learning, the algorithms will be tested to show their applicability in eliciting student metacognition and support for social interactivity. Full Article
met Factors Affecting Re-usage Intentions of Virtual Communities Supporting Cosmetic Products By Published On :: 2017-01-22 Aim/Purpose: This study uses a cosmetic virtual community (VC) as the research context and the UTAUT model as the theoretical structure aim to explore factors affecting the re-usage intentions of VC members. Background: The Internet use rate of VC was up to 50%, thereby implying that VC gained the attention of Internet users. Therefore, operating a VC will be an effective way to communicate with customers. However, to maintain an existing member is more efficient than creating a new one. As such, understanding determinants of VC members’ re-use intentions becomes important for firms. Methodology: Through an online survey, 276 valid responses were gathered. The collected data were examined by performing confirmatory factor analysis, structural equation modelling procedures, as well as the moderator analysis. Contribution: This study shows the importance in the context of online cosmetics-related VC, which was rarely explored before. We provide issues for future research, despite the accumulated academic literature related to UTAUT and VC. Findings: Results show that only performance expectancy and social influence significantly affecting re-usage intentions and only gender has moderating effects on the path from performance expectancy to VC re-use intention and from trust to VC re-use intention. Recommendations for Practitioners : This study found that users emphasized performance expectancy most of all. A cosmetic product-related VC should introduce products abundantly, offer useful information, and help people accomplish tasks quickly and productively. Recommendation for Researchers: Future researchers may use our findings to conduct further positivist research in the area of social influence using different subjects and research contexts. Full Article
met A New Typology Design of Performance Metrics to Measure Errors in Machine Learning Regression Algorithms By Published On :: 2019-01-24 Aim/Purpose: The aim of this study was to analyze various performance metrics and approaches to their classification. The main goal of the study was to develop a new typology that will help to advance knowledge of metrics and facilitate their use in machine learning regression algorithms Background: Performance metrics (error measures) are vital components of the evaluation frameworks in various fields. A performance metric can be defined as a logical and mathematical construct designed to measure how close are the actual results from what has been expected or predicted. A vast variety of performance metrics have been described in academic literature. The most commonly mentioned metrics in research studies are Mean Absolute Error (MAE), Root Mean Squared Error (RMSE), etc. Knowledge about metrics properties needs to be systematized to simplify the design and use of the metrics. Methodology: A qualitative study was conducted to achieve the objectives of identifying related peer-reviewed research studies, literature reviews, critical thinking and inductive reasoning. Contribution: The main contribution of this paper is in ordering knowledge of performance metrics and enhancing understanding of their structure and properties by proposing a new typology, generic primary metrics mathematical formula and a visualization chart Findings: Based on the analysis of the structure of numerous performance metrics, we proposed a framework of metrics which includes four (4) categories: primary metrics, extended metrics, composite metrics, and hybrid sets of metrics. The paper identified three (3) key components (dimensions) that determine the structure and properties of primary metrics: method of determining point distance, method of normalization, method of aggregation of point distances over a data set. For each component, implementation options have been identified. The suggested new typology has been shown to cover a total of over 40 commonly used primary metrics Recommendations for Practitioners: Presented findings can be used to facilitate teaching performance metrics to university students and expedite metrics selection and implementation processes for practitioners Recommendation for Researchers: By using the proposed typology, researchers can streamline development of new metrics with predetermined properties Impact on Society: The outcomes of this study could be used for improving evaluation results in machine learning regression, forecasting and prognostics with direct or indirect positive impacts on innovation and productivity in a societal sense Future Research: Future research is needed to examine the properties of the extended metrics, composite metrics, and hybrid sets of metrics. Empirical study of the metrics is needed using R Studio or Azure Machine Learning Studio, to find associations between the properties of primary metrics and their “numerical” behavior in a wide spectrum of data characteristics and business or research requirements Full Article
met Critical Success Factors for Implementing Business Intelligence Projects (A BI Implementation Methodology Perspective) By Published On :: 2020-08-27 Aim/Purpose: The purpose of this paper is to identify Critical Success Factors (CSFs) for Business Intelligence (BI) implementation projects by studying the existing BI project implementation methodologies and to compare these methodologies based on the identified CSFs. Background: The implementation of BI project has become one of the most important technological and organizational innovations in modern organizations. The BI project implementation methodology provides a framework for demonstrating knowledge, ideas and structural techniques. It is defined as a set of instructions and rules for implementing BI projects. Identifying CSFs of BI implementation project can help the project team to concentrate on solving prior issues and needed resources. Methodology: Firstly, the literature review was conducted to find the existing BI project implementation methodologies. Secondly, the content of the 13 BI project implementation methodologies was analyzed by using thematic analysis method. Thirdly, for examining the validation of the 20 identified CSFs, two questionnaires were distributed among BI experts. The gathered data of the first questionnaire was analyzed by content validity ratio (CVR) and 11 of 20 CSFs were accepted as a result. The gathered data of the second questionnaire was analyzed by fuzzy Delphi method and the results were the same as CVR. Finally, 13 raised BI project implementation methodologies were compared based on the 11 validated CSFs. Contribution: This paper contributes to the current theory and practice by identifying a complete list of CSFs for BI projects implementation; comparison of existing BI project implementation methodologies; determining the completeness degree of existing BI project implementation methodologies and introducing more complete ones; and finding the new CSF “Expert assessment of business readiness for successful implementation of BI project” that was not expressed in previous studies. Findings: The CSFs that should be considered in a BI project implementation include: “Obvious BI strategy and vision”, “Business requirements definition”, “Business readiness assessment”, “BI performance assessment”, “Establishing BI alignment with business goals”, “Management support”, “IT support for BI”, “Creating data resources and source data quality”, “Installation and integration BI programs”, “BI system testing”, and “BI system support and maintenance”. Also, all the 13 BI project implementation methodologies can be divided into four groups based on their completeness degree. Recommendations for Practitioners: The results can be used to plan BI project implementation and help improve the way of BI project implementation in the organizations. It can be used to reduce the failure rate of BI implementation projects. Furthermore, the 11 identified CSFs can give a better understanding of the BI project implementation methodologies. Recommendation for Researchers: The results of this research helped researchers and practitioners in the field of business intelligence to better understand the methodology and approaches available for the implementation and deployment of BI systems and thus use them. Some methodologies are more complete than other studied methodologies. Therefore, organizations that intend to implement BI in their organization can select these methodologies according to their goals. Thus, Findings of the study can lead to reduce the failure rate of implementation projects. Future Research: Future researchers may add other BI project implementation methodologies and repeat this research. Also, they can divide CSFs into three categories including required before BI project implementation, required during BI project implementation and required after BI project implementation. Moreover, researchers can rank the BI project implementation CSFs. As well, Critical Failure Factors (CFFs) need to be explored by studying the failed implementations of BI projects. The identified CSFs probably affect each other. So, studying the relationship between them can be a topic for future research. Full Article
met Transition to a Competitive Consultant Selection Method: A Case Study of a Public Agency in Israel By Published On :: 2021-12-22 Aim/Purpose: This paper reports a case study of organizational transition from a non-competitive selection method to a novel bidding method for the selection of consultants in the Architectural and Engineering (A/E) industry. Background: Public procurement agencies are increasingly relying on external consultants for the design of construction projects. Consultant selection can be based on either competitive bidding, or quality-based criteria, or some combination between these two approaches. Methodology: Different sources of information were reviewed: internal documents, and quantitative data from the enterprise software platform (ERP). In addition, informal and unstructured interviews were conducted with relevant officials. Contribution: As there are mixed opinions in the scientific literature regarding the use of competitive bidding for the selection of consultants in the A/E industry, this paper contributes a detailed review of a transition to a competitive selection method and provides a financial and qualitative comparison between the two methods. In addition, the method implemented is novel, as it delegates most of the responsibility of hiring and managing consultants to one main contractor. Findings: While the new selection method was intended to reduce bureaucratic overload, it has unexpectedly also succeeded to reduce costs as well. Recommendations for Practitioners: It may be more efficient and profitable to adopt the selection method described in this study. Recommendation for Researchers: Similar methods can be applied to other industries successfully. Impact on Society: Our method was applied in a public organization and resulted in a better outcome, both financial and managerial. Adopting this approach can benefit public budgets. Future Research: The selection, data storage, and analysis methods are interrelated components. Future analysis of these components can help better shape the consultant selection process. Full Article
met Predicting Software Change-Proneness From Software Evolution Using Machine Learning Methods By Published On :: 2023-10-08 Aim/Purpose: To predict the change-proneness of software from the continuous evolution using machine learning methods. To identify when software changes become statistically significant and how metrics change. Background: Software evolution is the most time-consuming activity after a software release. Understanding evolution patterns aids in understanding post-release software activities. Many methodologies have been proposed to comprehend software evolution and growth. As a result, change prediction is critical for future software maintenance. Methodology: I propose using machine learning methods to predict change-prone classes. Classes that are expected to change in future releases were defined as change-prone. The previous release was only considered by the researchers to define change-proneness. In this study, I use the evolution of software to redefine change-proneness. Many snapshots of software were studied to determine when changes became statistically significant, and snapshots were taken biweekly. The research was validated by looking at the evolution of five large open-source systems. Contribution: In this study, I use the evolution of software to redefine change-proneness. The research was validated by looking at the evolution of five large open-source systems. Findings: Software metrics can measure the significance of evolution in software. In addition, metric values change within different periods and the significance of change should be considered for each metric separately. For five classifiers, change-proneness prediction models were trained on one snapshot and tested on the next. In most snapshots, the prediction performance was excellent. For example, for Eclipse, the F-measure values were between 80 and 94. For other systems, the F-measure values were higher than 75 for most snapshots. Recommendations for Practitioners: Software change happens frequently in the evolution of software; however, the significance of change happens over a considerable length of time and this time should be considered when evaluating the quality of software. Recommendation for Researchers: Researchers should consider the significance of change when studying software evolution. Software changes should be taken from different perspectives besides the size or length of the code. Impact on Society: Software quality management is affected by the continuous evolution of projects. Knowing the appropriate time for software maintenance reduces the costs and impacts of software changes. Future Research: Studying the significance of software evolution for software refactoring helps improve the internal quality of software code. Full Article