gen

Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy




gen

MILO – A Proposal of Multiple Intelligences Learning Objects




gen

Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software




gen

Intelligent System for Information Security Management: Architecture and Design




gen

Developing a Model of Next Generation Knowledge Management




gen

Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises:  A Research Agenda




gen

A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems




gen

A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)




gen

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




gen

Agent-Based Advert Placement System for Broadcasting Stations




gen

Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers




gen

How Generic is I(nformation) T(echnology)?




gen

Investment in Intelligent Transport Aid Systems and Final Performance




gen

Reflections on the Gestation of Polymorphic Innovation: The Exploitation of Emergence in Social Network Development via Text Messaging




gen

Would Cloud Computing Revolutionize Teaching Business Intelligence Courses?




gen

Using Youtube© in the Classroom for the Net Generation of Students




gen

Multi-Agent Framework for Social Customer Relationship Management Systems




gen

A Guide to Educating Different Generations in South Africa




gen

Implications of Voluntary Communication Based on Gender, Education Level and Cultural Issues in an Online Environment




gen

An Overview of Information Tools and Technologies for Competitive Intelligence Building: Theoretical Approach




gen

Factors Driving Business Intelligence Culture

The field of business intelligence (BI), despite rapid technology advances, continues to feature inadequate levels of adoption. The attention of researchers is shifting towards hu-man factors of BI adoption. The wide set of human factors influencing BI adoption con-tains elements of what we call BI culture – an overarching concept covering key managerial issues that come up in BI implementation. Research sources provide different sets of features pertaining to BI culture or related concepts – decision-making culture, analytical culture and others. The goal of this paper is to perform the review of research and practical sources to examine driving forces of BI – data-driven approaches, BI agility, maturity and acceptance – to point out culture-related issues that support BI adoption and to suggest an emerging set of factors influencing BI culture.




gen

Can Learners Become Teachers? Evaluating the Merits of Student Generated Content and Peer Assessment

Aim/Purpose: The aim of this project was to explore student perceptions of the value of both the creation of video content and exposure to other students’ work though peer assessment and inclusion of exemplars as unit material. Background: The research was in a first year information technology flipped-learning unit, where the assessment involved students developing video presentations that were peer assessed and exemplars incorporated into the unit as teaching material. Methodology: Data was gathered using a mixed methods approach using an online questionnaire followed by semi-structured interviews with a selection of questionnaire respondents. The interviews were designed to further explore issues identified from the analysis of the questionnaire data. Contribution: Informs on student perceptions of peer review and the integration of student generated content into University teaching. Findings: Most students enjoyed the video assessment (58%) with many preferring it to a written or programming task (55-58%). In the subsequent peer assessment, many liked seeing the work of others (67%) and found the approach engaging (63%) yet some other perceptions were mixed or neutral. Recommendations for Practitioners: University IT students generally enjoyed and perceived peer assessment and found student generated content to be valuable. Recommendation for Researchers: Further investigation of peer review and student generated content in contexts where the student cohort represents a variety of cultures and age categories Impact on Society: Contributes to a body of knowledge regarding peer assessment and student generated educational materials. Future Research: Future work is needed to better understand this domain, in particular the role of learners’ individual differences in order to successfully integrate these approaches into modern learning environments.




gen

Impact of Mathematics on the Theoretical Computer Science Course Units in the General Degree Program in Computer Science at Sri Lankan State Universities

Aim/Purpose: The purpose of this study is to identify how Advanced level Mathematics and Mathematics course units offered at university level do impact on the academic performance of theoretical Computer Science course units. Background: In Sri Lankan state universities, students have been enrolled only from the Physical Science stream to do a degree program in Computer Science. In addition to that, universities have been offering some course units in Mathematics to provide the required mathematical maturity to Computer Science undergraduates. Despite of this it is observed that the failure rates in fundamental theoretical Computer Science course units are much higher than other course units offered in the general degree program every year. Methodology : Academic records comprised of all 459 undergraduates from three consecutive batches admitted to the degree program in Computer Science from a university were considered for this study. Contribution: This study helps academics in identifying suitable curricula for Mathematics course units to improve students’ performance in theoretical Computer Science courses. Findings: Advanced level Mathematics does not have any significant effect on the academic performance of theoretical Computer Science course units. Even though all Mathematics course units offered were significantly correlated with academic performance of every theoretical Computer Science course unit, only the Discrete Mathematics course unit highly impacted on the academic performance of all three theoretical Computer Science course units. Further this study indicates that the academic performance of female undergraduates is better than males in all theoretical Computer Science and Mathematics course units. Future Research: Identifying other critical success factors contributing to the students’ academic performance of the theoretical Computer Science through empirical studies




gen

Impact of Gender on Perceived Work Climate in Business Information Systems

Aim/Purpose: The low proportion of women currently working in the field of business information systems presents an opportunity to attract more women to this field. For example, in Germany, the proportion of women studying business information systems is currently 21%, compared to 48% in business administration (Statistisches Bundesamt, 2020). Which characteristics make the professional field of business information systems appear attractive to women and men – and which characteristics do not? Background: Studies on careers in business information systems are important to mitigate the long-lasting shortage of IT specialists, yet research is limited in this area. Methodology: To capture empirical data, graduates of the Business Information Systems program at the University of Applied Sciences in Hannover were surveyed. Contribution: The results show that women and men perceive the work climate and working conditions very differently and are also satisfied to a different extent. Characteristics of the work climate place significantly more restrictions on satisfaction for women than for men. Women primarily criticize characteristics that can be described as involving “a lack of fairness”. Findings: The differences in perceived work climate may negatively impact the proportion of women in business information systems. A number of measures have already been established to support women in coping better with the prevailing climate. However, some measures bear the risk that women are thus accused of assimilating to the prevailing climate. This can seem pre-sumptuous since the dominant male culture is taken for granted and “set”. Measures for team-building and personnel development appear to be more suitable if these address the actual values and norms of teamwork, question them where necessary, and change them for everyone. Recommendations for Practitioners: Women’s career goals are clearly different from men’s goals, and women do not achieve goals with high priority very well. Work climate is perceived more critically by women than by men: less fair, less supportive. Advantages of diversity and plurality are put at risk if women should put aside their different “other” perceptions of cooperation and negotiation in order to act according to the rules of the male-dominated system. Impact on Society: Studies on careers in business information systems are important to mitigate the longer-lasting shortage of IT specialists. The low proportion of women currently working in IT presents an opportunity to attract more women to business information systems.




gen

Gen Z Self-Portrait: Vitality, Activism, Belonging, Happiness, Self-Image, and Media Usage Habits

Aim/Purpose. This study examined the self-perception of adolescents and young people aged 17-21 – how they perceived their personal characteristics, self-image, vitality, belonging to a local and global (glocal) society, happiness index and activity, media usage habits in general and smartphones in particular – in other words, it sought to produce a sketch of their character. Background. Different age groups are influenced by various factors that shape them, including living environment, technological developments, experiences, common issues, events of glocal significance, and more. People belonging to Gen Z were born at the end of the previous century and the beginning of the 21st century (up to 2010). This generation was born into the digital technological age and is the first one born into the environment defined by smartphones, and social media. Its members are referred to as “digital natives” because they were born after the widespread adoption of digital technology in the Western world. They entered an environment characterized by the widespread daily use of smartphones, the Internet, and technology in general. Methodology. This was a quantitative study based on a sample of 418 Israeli adolescents and young people aged 17-21. The following questionnaires were administered anonymously and disseminated online to an audience of youths aged 17-21 across Israel: A demographic questionnaire; Self-esteem; Vitality; Belonging vs. alienation; Social-emotional aspects; Usage habits in digital environments; Usage habits of learning on a smartphone; Open questions. Contribution. The current study tried to define clusters to characterize adolescents and youth aged 17-21. Findings Results show that study participants had high self-esteem and vitality, felt be-longing, happy, and satisfied with their life, and perceived themselves as active and enterprising at an average level or above. The study identified two clusters. Participants in Cluster 1 were characterized by higher parameter averages than those in Cluster 2 on the self-image, vitality, belonging, happiness, and activism scales. Participants in Cluster 1 felt that using a smartphone made life easier, helped them solve everyday problems, made everyday conduct easier, and allowed them to express themselves, keep up to date with what is happening with their friends, disseminate information conveniently, be involved in social life, and establish relationships with those around them. They thought that it was easy to collaborate with others and to plan activities and events. Recommendations for Practitioners. When examining cluster correlations with data in relation to other variables, it is apparent that participants in Cluster 1 had more options to reach out for help, report more weekly hours spent talking and meeting with friends and feel that using a smartphone makes everyday life easier and facilitates their day-to-day conduct than did participants in Cluster 2. The smartphone allows them to express themselves, keep updated regarding what is happening with their friends and disseminate information easily, helps them be involved in social life and establish connections with those around them. They find it easy to communicate and cooperate with others and to plan activities and events. By contrast, participants in Cluster 2 felt that the smartphone complicates things for them and creates problems in their daily lives. They feel that the use of social networks burdens them and that the smartphone prevents them from being more involved in their social life, and from establishing relationships with those around them. They felt that communication by smartphone creates more problems in understanding messages. Recommendations for Researchers. One of the challenges of this generation is forming an independent identity and self-regulation in a digital, global, across-the-border era that offers a variety of possibilities and communities. They must examine the connection between the digital and personal spaces, to be able to enjoy virtual communities and a sense of togetherness, and at the same time maintain privacy, autonomy, and individuality. Many studies point to the blurring of boundaries between the private-personal and the public, at numerous problems in social networks, including social problems, shaming, and exclusion from various groups and activities. The fear of shaming and the desire to keep up with everything that is happening create a state of mental stress, and adolescents often feel that they urgently need to check their smartphones. Sharing with others can help them deal with negative content and experiences and avoid the dangers lurking in their web surfing. Yet sharing, especially with friends, often causes intimate content to become public and leads to shaming and invasion of privacy. Impact on Society. Gen Z was born into an environment where smartphones, the Internet, and technology in general, are widely used in everyday routine, and they make extensive use of technological means in all areas of life. One of the characteristics of this generation is “globalization.” The present study showed that about 84% of participants felt to a moderate degree or higher that they were citizens of the world. Future Research. The findings of this study revealed a significant difference in self-image between males and females. An attempt was made to explain the findings in light of previous studies, but the need arose for studies on the self-image of young people of Gen Z that would shed light on the subject.




gen

Information and Communications Technology and Resilience of First-Generation Students Compared to Students with Educated Parents

Aim/Purpose. In this study, we examined, from the perspective of the participants, aspects of information and communications technology (ICT) and resilience, comparing first-generation students in higher education with students whose parents had higher education. Methodology. We examined self-image, motivation, happiness, and the use of ICT. This was a quantitative study. Respondents answered a questionnaire that contained open and closed questions. The sample included 307 students from academic institutions in Israel between the ages of 18 and 64. Findings. The findings were grouped into four clusters: (a) second-generation students under the age of 25 years, members of Generation Z; (b) second-generation students over the age of 25; (c) first-generation students over the age of 25 years (the largest group in the sample), mostly members of the Generation Y; and (d) first-generation students under the age of 25. We found consistent differences on all scales between the group of first-generation students over the age of 25 years and those in the other groups. The research findings indicate that the group with the highest resilience was students who were the first generation acquiring higher education and were over 25, mostly members of the Y generation. Impact on Society. This research allows an instructive look at Generation Y and Generation Z and the academic abilities of this generation. Future Research. Future studies should examine the correlation between a sense of resilience (which was examined in this study) and academic achievement (which was not).




gen

The Absorption Experience of Gen Y Beginning Teachers in Elementary Schools, From the Point of View of the Beginning Teachers and Their Mentors

Aim/Purpose . The present study aimed to understand in depth the experience of identity formation of beginning teachers (BTs), members of Gen Y, in their first year at elementary school, teaching students of Gen Alpha, from the perspective of BTs and their teacher mentors (TMs). Background. The purpose of the study was to compare the aspects described by BTs and their mentor teachers of the initial experience of teaching and of shaping the professional identity of BTs, members of Gen Y, in elementary schools, from the perspective of BTs and teacher mentors (TMs). Methodology. This was a qualitative study. Two groups participated in the study: (a) 75 BTs, members of Gen Y, and (b) 40 mentors of beginning teachers. Contribution. The findings of this study indicate that the creation of an emotionally and professionally supportive community led to a fruitful discussion on issues related to the process of absorption and integration of BTs in the school. This process advanced their professional development, expanding knowledge, abilities, strategies, and innovative pedagogical practices for classroom management, and meaningful teaching and learning in the classroom. The supportive community provided an emotional, professional, social-organizational, and evaluative-reflective response to the needs of BTs, facilitating meaningful interactions between the BTs and their students. It created for students a space for emotional training, organizing and managing behavior, regulating emotions and behavior, reducing feelings of anger, and arousing a feeling of optimism. Findings. The findings show that there was a conflict between the BTs’ and TMs’ perceptions of school reality. The mentors expected the BTs to adapt to the existing system, whereas the BTs perceived the process as one of formation of their identity as teachers. It turned out that parameters that were important to Gen Y teachers, such as knowing the school organization and being an influential factor that brings about change, were less important to their mentors. The findings of the present study reinforce those of previous studies that investigated the employment characteristics of Gen Y. Recommendations for Practitioners. A supportive community at school is likely to increase the level of mental well-being of Gen Y teachers. To this end, support communities of teachers by form and by discipline of study should be created. In the community, emphasis should be placed on reflection and mental resilience in all situations and challenging events that happen to the BTs to help them cope with the accumulated stress. Recommendations for Researchers. Students need a sensitive environment that is appropriate for Gen Alpha children. This environment must allow for emotional training and regulation, behavior organization and management to arouse a feeling of optimism and reduce anger. To develop students’ emotional, social, and cognitive abilities, teachers must teach with love, sensitivity, affectivity, and empathy. Impact on Society. To retain BTs and prevent them from quitting their career, schools must ensure that members of Gen Y understand the school organization and are satisfied with the way the organization is managed. They must have a sense of being significant partners in the life of the school. Under optimal working conditions, Gen Y teachers may greatly contribute to the values of education and equal opportunity, maximizing the personal potential of each student and the classroom as a whole, and making the school relevant. Future Research. Future studies should examine the characteristics of students belonging to Gen Alpha. One of the difficulties mentioned by BTs was a misunderstanding of the characteristics of Gen Alpha, which created problems in the interactions within the teaching staff and between the teachers and the students, and pre-vented gaining authority with other teachers and with students.




gen

Gender Differences among IT Professionals in Dealing with Change and Skill Set Maintenance




gen

Business Intelligence Systems in the Holistic Infrastructure Development Supporting Decision Making in Organisations




gen

A Generic Agent Framework to Support the Various Software Project Management Processes




gen

Approach to Building and Implementing Business Intelligence Systems




gen

Multi-Agent System for Knowledge-Based Access to Distributed Databases




gen

An Initiative to Address the Gender Imbalance in Tertiary IT Studies




gen

Transaction Flow in Card Payment Systems Using Mobile Agents




gen

Generativity: The New Frontier for Information and Communication Technology Literacy




gen

Text-Based Collaborative Work and Innovation: Effects of Communication Media Affordances on Divergent and Convergent Thinking in Group-Based Problem-Solving




gen

Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland




gen

The Impact of Business Intelligence on Healthcare Delivery in the USA




gen

The Generalized Requirement Approach for Requirement Validation with Automatically Generated Program Code




gen

A Multi-task Principal Agent Model for Knowledge Contribution of Enterprise Staff

According to the different behavior characteristics of knowledge contribution of enterprise employees, a multi-task principal-agent relationship of knowledge contribution between enterprise and employees is established based on principal-agent theory, analyzing staff’s knowledge contribution behavior of knowledge creation and knowledge participation. Based on this, a multi-task principal agent model for knowledge contribution of enterprise staff is developed to formulate the asymmetry of information in knowledge contribution Then, a set of incentive measures are derived from the theoretic model, aiming to prompt the knowledge contribution in enterprise. The result shows that staff’s knowledge creation behavior and positive participation behavior can influence and further promote each other Enterprise should set up respective target levels of both knowledge creation contribution and knowledge participation contribution and make them irreplaceable to each other. This work contributes primarily to the development of the literature on knowledge management and principal-agent theory. In addition, the applicability of the findings will be improved by further empirical analysis.




gen

Innovation Capability: A Systematic Review and Research Agenda

Purpose: Innovation capability is a growing and significant area of academic research. However, there is little attempt to provide a cumulative overview of this phenomenon. The purpose of this systematic review is to synthesize peer reviewed articles published in the area to develop a conceptual framework and to aid future research. Design/Methodology/Approach: The paper adopted a systematic review of literature on innovation capability. The final screening generated 51 articles from 30 journals from 2000-2015. Findings: The examination and synthesis of the theoretical and the empirical articles show that (1) the authors applied narrow range of conceptual and theoretical foundations; (2) innovation capability is being investigated mostly at the firm level for about 90% of the articles, and marginally about 5% at network (supply) chain level; (3) the authors define innovation capability in different ways and use diverse set of dimensions to measure innovation capability; (4) there is potential for future research across firms in innovation management disciplines. Practical implications: The review contributes to theory development in organizational capability literature in general. Managers wishing to innovate need to examine critically and integrate some of the innovation capability dimensions proposed in this paper. Originality: The review is unique in the sense that it provides conceptualisation of innovation capability framework.




gen

Analogical Thinking for Generation of Innovative Ideas: An Exploratory Study of Influential Factors

Analogical thinking is one of the most effective tools to generate innovative ideas. It enables us to develop new ideas by transferring information from well-known domains and utilizing them in a novel domain. However, using analogical thinking does not always yield appropriate ideas, and there is a lack of consensus among researchers regarding the evaluation methods for assessing new ideas. Here, we define the appropriateness of generated ideas as having high structural and low superficial similarities with their source ideas. This study investigates the relationship between thinking process and the appropriateness of ideas generated through analogical thinking. We conducted four workshops with 22 students in order to collect the data. All generated ideas were assessed based on the definition of appropriateness in this study. The results show that participants who deliberate more before reaching the creative leap stage and those who are engaged in more trial and error for deciding the final domain of a new idea have a greater possibility of generating appropriate ideas. The findings suggest new strategies of designing workshops to enhance the appropriateness of new ideas.




gen

Knowledge Management and Problem Solving in Real Time: The Role of Swarm Intelligence

Knowledge management research applied to the development of real-time research capability, or capability to solve societal problems in hours and days instead of years and decades, is perhaps increasingly important, given persistent global problems such as the Zika virus and rapidly developing antibiotic resistance. Drawing on swarm intelligence theory, this paper presents an approach to real-time research problem-solving in the form of a framework for understanding the complexity of real-time research and the challenges associated with maximizing collaboration. The objective of this research is to make explicit certain theoretical, methodological, and practical implications deriving from new literature on emerging technologies and new forms of problem solving and to offer a model of real-time problem solving based on a synthesis of the literature. Drawing from ant colony, bee colony, and particle swarm optimization, as well as other population-based metaheuristics, swarm intelligence principles are derived in support of improved effectiveness and efficiency for multidisciplinary human swarm problem-solving. This synthesis seeks to offer useful insights into the research process, by offering a perspective of what maximized collaboration, as a system, implies for real-time problem solving.




gen

Critical Success Factors for Implementing Business Intelligence Projects (A BI Implementation Methodology Perspective)

Aim/Purpose: The purpose of this paper is to identify Critical Success Factors (CSFs) for Business Intelligence (BI) implementation projects by studying the existing BI project implementation methodologies and to compare these methodologies based on the identified CSFs. Background: The implementation of BI project has become one of the most important technological and organizational innovations in modern organizations. The BI project implementation methodology provides a framework for demonstrating knowledge, ideas and structural techniques. It is defined as a set of instructions and rules for implementing BI projects. Identifying CSFs of BI implementation project can help the project team to concentrate on solving prior issues and needed resources. Methodology: Firstly, the literature review was conducted to find the existing BI project implementation methodologies. Secondly, the content of the 13 BI project implementation methodologies was analyzed by using thematic analysis method. Thirdly, for examining the validation of the 20 identified CSFs, two questionnaires were distributed among BI experts. The gathered data of the first questionnaire was analyzed by content validity ratio (CVR) and 11 of 20 CSFs were accepted as a result. The gathered data of the second questionnaire was analyzed by fuzzy Delphi method and the results were the same as CVR. Finally, 13 raised BI project implementation methodologies were compared based on the 11 validated CSFs. Contribution: This paper contributes to the current theory and practice by identifying a complete list of CSFs for BI projects implementation; comparison of existing BI project implementation methodologies; determining the completeness degree of existing BI project implementation methodologies and introducing more complete ones; and finding the new CSF “Expert assessment of business readiness for successful implementation of BI project” that was not expressed in previous studies. Findings: The CSFs that should be considered in a BI project implementation include: “Obvious BI strategy and vision”, “Business requirements definition”, “Business readiness assessment”, “BI performance assessment”, “Establishing BI alignment with business goals”, “Management support”, “IT support for BI”, “Creating data resources and source data quality”, “Installation and integration BI programs”, “BI system testing”, and “BI system support and maintenance”. Also, all the 13 BI project implementation methodologies can be divided into four groups based on their completeness degree. Recommendations for Practitioners: The results can be used to plan BI project implementation and help improve the way of BI project implementation in the organizations. It can be used to reduce the failure rate of BI implementation projects. Furthermore, the 11 identified CSFs can give a better understanding of the BI project implementation methodologies. Recommendation for Researchers: The results of this research helped researchers and practitioners in the field of business intelligence to better understand the methodology and approaches available for the implementation and deployment of BI systems and thus use them. Some methodologies are more complete than other studied methodologies. Therefore, organizations that intend to implement BI in their organization can select these methodologies according to their goals. Thus, Findings of the study can lead to reduce the failure rate of implementation projects. Future Research: Future researchers may add other BI project implementation methodologies and repeat this research. Also, they can divide CSFs into three categories including required before BI project implementation, required during BI project implementation and required after BI project implementation. Moreover, researchers can rank the BI project implementation CSFs. As well, Critical Failure Factors (CFFs) need to be explored by studying the failed implementations of BI projects. The identified CSFs probably affect each other. So, studying the relationship between them can be a topic for future research.




gen

Enterprise Knowledge Generation Driven by Internet Integration Capability: A Mediated Moderation Model

Aim/Purpose: Drawing on theories of organizational learning, this study analyzes the mechanism of Internet integration capability affecting knowledge generation by 399 Chinese enterprises. This paper will further explore whether there is a moderating role of learning orientation in the mechanism of Internet integration capability affecting enterprise knowledge generation. Background: The Internet has gradually integrated into the enterprise innovation system and penetrated into all aspects of technological innovation, which has promoted the integration and optimization of resources inside and outside the organization. However, there is limited understanding of how the combination of the Internet and integration capability can drive enterprise knowledge generation. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet integration capability, organizational learning, knowledge generation, and uses PROCESS macro program to test the mediated moderation effect of learning orientation. Contribution: First, this study provides empirical evidence for managers to better build Internet integration capability and ambidextrous learning to promote enterprise knowledge generation. Second, this study highlights the important moderating role of learning orientation in the mediating role of ambidextrous learning. Findings: First, the study confirms the mediating role of exploratory learning and exploitative learning in knowledge generation driven by Internet integration capability. Second, the results show that when organizations have a strong learning orientation, the indirect path of Internet integration capability influencing knowledge generation through exploratory learning will be enhanced. Recommendations for Practitioners: Enterprises should pay full attention to the improvement of internet integration capability and ambidextrous learning to promote knowledge generation. In addition, enterprises should establish a good learning atmosphere within the organization to strengthen the bridge role of exploratory learning between Internet integration capability and knowledge generation. Recommendation for Researchers: Researchers could collect data from countries with different levels of economic development to verify the universal applicability of the proposed theoretical model. Impact on Society: This study provides references for enterprises using Internet integration capability to promote their knowledge generation capability under the internet background. Future Research: Future research can compare the impact of Internet integration capability on knowledge generation in different industries.




gen

Transition to a Competitive Consultant Selection Method: A Case Study of a Public Agency in Israel

Aim/Purpose: This paper reports a case study of organizational transition from a non-competitive selection method to a novel bidding method for the selection of consultants in the Architectural and Engineering (A/E) industry. Background: Public procurement agencies are increasingly relying on external consultants for the design of construction projects. Consultant selection can be based on either competitive bidding, or quality-based criteria, or some combination between these two approaches. Methodology: Different sources of information were reviewed: internal documents, and quantitative data from the enterprise software platform (ERP). In addition, informal and unstructured interviews were conducted with relevant officials. Contribution: As there are mixed opinions in the scientific literature regarding the use of competitive bidding for the selection of consultants in the A/E industry, this paper contributes a detailed review of a transition to a competitive selection method and provides a financial and qualitative comparison between the two methods. In addition, the method implemented is novel, as it delegates most of the responsibility of hiring and managing consultants to one main contractor. Findings: While the new selection method was intended to reduce bureaucratic overload, it has unexpectedly also succeeded to reduce costs as well. Recommendations for Practitioners: It may be more efficient and profitable to adopt the selection method described in this study. Recommendation for Researchers: Similar methods can be applied to other industries successfully. Impact on Society: Our method was applied in a public organization and resulted in a better outcome, both financial and managerial. Adopting this approach can benefit public budgets. Future Research: The selection, data storage, and analysis methods are interrelated components. Future analysis of these components can help better shape the consultant selection process.




gen

A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model

Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods.




gen

A Systematic Literature Review of Business Intelligence Framework for Tourism Organizations: Functions and Issues

Aim/Purpose: The main goal of this systematic literature review was to look for studies that provide information relevant to business intelligence’s (BI) framework development and implementation in the tourism sector. This paper tries to classify the tourism sectors where BI is implemented, group various BI functionalities, and identify common problems encountered by previous research. Background: There has been an increased need for BI implementation to support decision-making in the tourism sector. Tourism stakeholders such as management of destination, accommodation, transportation, and public administration need a guideline to understand functional requirements before implementation. This paper addresses the problem by comprehensively reviewing the functionalities and issues that need to be considered based on previous business intelligence framework development and implementation in tourism sectors. Methodology: We have conducted a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Guidelines for Meta-Analysis (PRISMA) method. The search is conducted using online academic database platforms, resulting in 543 initial articles published from 2002 to 2022. Contribution: The paper could be of interest to relevant stakeholders in the tourism industry because it provides an overview of the capabilities and limitations of business intelligence for tourism. To our knowledge, this is the first study to identify and classify the BI functionalities needed for tourism sectors and implementation issues related to organizations, people, and technologies that need to be considered. Findings: BI functionalities identified in this study include basic functions such as data analysis, reports, dashboards, data visualization, performance metrics, and key performance indicator, and advanced functions such as predictive analytics, trend indicators, strategic planning tools, profitability analysis, benchmarking, budgeting, and forecasting. When implementing BI, the issues that need to be considered include organizational, people and process, and technological issues. Recommendations for Practitioners: As data is a major issue in BI implementation, tourism stakeholders, especially in developing countries, may need to build a tourism data center or centralized coordination regulated by the government. They can implement basic functions first before implementing more advanced features later. Recommendation for Researchers: We recommend further studying the BI implementation barriers by employing a perspective of an adoption framework such as the technology, organization, and environment (TOE) framework. Impact on Society: This research has a potential impact on improving the tourism industry’s performance by providing insight to stakeholders about what is needed to help them make more accurate decisions using business intelligence. Future Research: Future research may involve collaboration between practitioners and academics in developing various BI architectures specific to each tourism industry, such as destination management, hospitality, or transportation.




gen

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




gen

Epidemic Intelligence Models in Air Traffic Networks for Understanding the Dynamics in Disease Spread - A Case Study

Aim/Purpose: The understanding of disease spread dynamics in the context of air travel is crucial for effective disease detection and epidemic intelligence. The Susceptible-Exposed-Infectious-Recovered-Hospitalized-Critical-Deaths (SEIR-HCD) model proposed in this research work is identified as a valuable tool for capturing the complex dynamics of disease transmission, healthcare demands, and mortality rates during epidemics. Background: The spread of viral diseases is a major problem for public health services all over the world. Understanding how diseases spread is important in order to take the right steps to stop them. In epidemiology, the SIS, SIR, and SEIR models have been used to mimic and study how diseases spread in groups of people. Methodology: This research focuses on the integration of air traffic network data into the SEIR-HCD model to enhance the understanding of disease spread in air travel settings. By incorporating air traffic data, the model considers the role of travel patterns and connectivity in disease dissemination, enabling the identification of high-risk routes, airports, and regions. Contribution: This research contributes to the field of epidemiology by enhancing our understanding of disease spread dynamics through the application of the SIS, SIR, and SEIR-HCD models. The findings provide insights into the factors influencing disease transmission, allowing for the development of effective strategies for disease control and prevention. Findings: The interplay between local outbreaks and global disease dissemination through air travel is empirically explored. The model can be further used for the evaluation of the effectiveness of surveillance and early detection measures at airports and transportation hubs. The proposed research contributes to proactive and evidence-based strategies for disease prevention and control, offering insights into the impact of air travel on disease transmission and supporting public health interventions in air traffic networks. Recommendations for Practitioners: Government intervention can be studied during difficult times which plays as a moderating variable that can enhance or hinder the efficacy of epidemic intelligence efforts within air traffic networks. Expert collaboration from various fields, including epidemiology, aviation, data science, and public health with an interdisciplinary approach can provide a more comprehensive understanding of the disease spread dynamics in air traffic networks. Recommendation for Researchers: Researchers can collaborate with international health organizations and authorities to share their research findings and contribute to a global understanding of disease spread in air traffic networks. Impact on Society: This research has significant implications for society. By providing a deeper understanding of disease spread dynamics, it enables policymakers, public health officials, and practitioners to make informed decisions to mitigate disease outbreaks. The recommendations derived from this research can aid in the development of effective strategies to control and prevent the spread of infectious diseases, ultimately leading to improved public health outcomes and reduced societal disruptions. Future Research: Practitioners of the research can contribute more effectively to disease outbreaks within the context of air traffic networks, ultimately helping to protect public health and global travel. By considering air traffic patterns, the SEIR-HCD model contributes to more accurate modeling and prediction of disease outbreaks, aiding in the development of proactive and evidence-based strategies to manage and mitigate the impact of infectious diseases in the context of air travel.