war

Typology on Leadership toward Creativity in Virtual Work

Aim/Purpose: This study aims to develop a descriptive typology to better identify leadership toward creativity in virtual work in different types of companies. Background: The study empirically explores how leadership toward creativity occurs in virtual work and uses the theoretical lenses of creativity-conducive leadership and heterarchy to generate a typology. Methodology : A multiple qualitative case study design, interpretivist approach, and abductive analysis are applied. Data is collected by interviewing 21 leaders and employees face-to-face in four companies in the ICT sector and one business advisor company. Contribution: The empirical evidence of this study enriches the understanding of leadership toward creativity in virtual work and contributes to the limited empirical knowledge on leadership that stimulates a virtual workforce to achieve creativity. Findings: The four different types of companies in the typology utilize various transitions toward leadership creativity in virtual work. The trend in leadership in the existing virtually networked business environment is toward the “collective mind” company, which is characterized by shared values, meaningful work, collective intelligence, conscious reflection, transparency, coaching, empowering leadership by example, effective multichannel interaction, and assertiveness. The findings empirically support applying a heterarchy perspective to lead a virtual workforce toward creativity and promote leaders who are genuinely interested in people, their development, collaboration, and technology. Recommendations for Practitioners: The typology helps professionals realize the need to develop leadership, communication, interaction, learning, and growth to foster creative interaction and improve productivity and competitiveness. Recommendation for Researchers: This study enables researchers to more rigorously and creatively conceptualize the conditions and relationships in leadership that facilitate creativity in virtual work. Impact on Society : The findings highlight humanistic values for developing leadership. The study strengthens the view that collective creativity in virtual work cannot emerge without virtual and physical interaction in appropriate spaces and caring for each other. Future Research: Future studies may focus on other fields, industries, networks, roles of materialities, and employees in fostering creativity and on theory development. Longitudinal studies are advisable.




war

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




war

Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception

Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged.




war

A Decision Support System and Warehouse Operations Design for Pricing Products and Minimizing Product Returns in a Food Plant

Aim/Purpose: The first goal is to develop a decision support system for pricing and production amounts for a firm facing high levels of product returns. The second goal is to improve the management of the product returns process. Background: This study was conducted at a food importer and manufacturer in Israel facing a very high rate of product returns, much of which is eventually discarded. The firm’s products are commonly considered to be a low-cost generic alternative and are therefore popular among low-income families. Methodology: A decision support module was added to the plant’s business information system. The module is based on a supply chain pricing model and uses the sales data to infer future demand’s distribution. Ergonomic models were used to improve the design of the returns warehouse and the handling of the returns. Contribution: The decision support system allows to improve the plant’s pricing and quantity planning. Consequently, it reduced the size of product returns. The new design of the returns process is expected to improve worker’s productivity, reduces losses and results in safer outcomes. This study also demonstrates a successful integration and of a theoretical economical model into an information system. Findings: The results show the promise of incorporating pricing supply chain models into informing systems to achieve a practical business task. We were able to construct actual demand distributions from the data and offer actual pricing recommendations that reduce the number of returns while increasing potential profits. We were able to identify key deficiencies in the returns operations and added a module to the decisions support system that improves the returns management and links it with the sales and pricing modules. Finally, we produced a better warehouse design that supports efficient and ergonomic product returns handling. Recommendations for Practitioners: This work can be replicated for different suppliers, manufacturers and retailers that suffer from product returns. They will benefit from the reduction in returns, as well as the decrease in the losses associated with these returns. Recommendation for Researchers: It is worthwhile to research whether decision support systems can be applied to other aspects of the organizations’ operations. Impact on Society: Product returns is a lose-lose situation for producers, retailers and customers. Moreover, mismanagement of these returns is harmful for the environment and may result in the case of foods, in health hazards. Reducing returns and improving the handling improves sustainability and is beneficial for society. Future Research: The decision support system’s underlying pricing model assumes a specific business setting. This can be extended using other pricing models and applying them in a similar fashion to the current application.




war

Towards a Framework on the Use of Infomediaries in Maternal mHealth in Rural Malawi

Aim/Purpose: The aim of the study is to explore factors that affect how healthcare clients in rural areas use infomediaries in maternal mHealth interventions. The study focuses on maternal healthcare clients who do not own mobile phones but use the mHealth intervention. Background: Maternal mHealth interventions in poor-resource settings are bedevilled by inequalities in mobile phone ownership. Clients who do not own mobile phones risk being excluded from benefiting from the interventions. Some maternal mHealth providers facilitate the access of mobile phones for those who do not own them using “infomediaries”. Infomediaries, in this case, refer to individuals who have custody of mobile phones that other potential beneficiaries may use. However, the use of infomediaries to offer access to the “have nots” may be influenced by a number of factors. Methodology: The study uses a case of a maternal mHealth intervention project in Malawi, as well as a qualitative research method and interpretive paradigm. Data was collected using secondary data from the implementing agency, semi-structured interviews, and focus group discussions. Empirical data was collected from maternal healthcare clients who do not own mobile phones and infomediaries. Data were analysed inductively using thematic analysis. Contribution: The study proposed a theoretical framework for studying infomediaries in ICT4D. The study may inform mHealth designers, implementers, and policymakers on how infomediaries could be implemented in a rural setting. Consequently, understanding the factors that affect the use of infomediaries may inform mHealth intervention implementers on how they could overcome the challenges by implementing mHealth interventions that reduce the challenges on the mHealth infomediaries side, and the maternal healthcare clients’ side. Findings: Characteristics of the maternal healthcare client, characteristics of the mHealth infomediary, perceived value of mHealth intervention, and socio-environmental factors affect maternal healthcare clients’ use of mHealth infomediaries. Recommendations for Practitioners: Implementers of interventions ought to manage the use of infomediaries to avoid volunteer fatigue and infomediaries who may not be compatible with the potential users of the intervention. Implementers could leverage traditional systems of identifying and using infomediaries instead of reinventing the wheel. Recommendation for Researchers: This research adopted a single case study to develop the theoretical framework for mHealth infomediary use. We recommend future studies are conducted in order to test and develop this framework further, not only in ICT4D, but also in other areas of application. Impact on Society: People still lack access. The lack of ownership of technology may still exclude them from participating in an information society. The use of infomediaries may help to provide access to technologies to those who do not have them thereby bridging the digital divide gap. Future Research: We propose herein that traditional systems may offer a good starting point for designing a system that would work for communities. We, therefore, recommend that future research may explore these possibilities.




war

Predicting Software Change-Proneness From Software Evolution Using Machine Learning Methods

Aim/Purpose: To predict the change-proneness of software from the continuous evolution using machine learning methods. To identify when software changes become statistically significant and how metrics change. Background: Software evolution is the most time-consuming activity after a software release. Understanding evolution patterns aids in understanding post-release software activities. Many methodologies have been proposed to comprehend software evolution and growth. As a result, change prediction is critical for future software maintenance. Methodology: I propose using machine learning methods to predict change-prone classes. Classes that are expected to change in future releases were defined as change-prone. The previous release was only considered by the researchers to define change-proneness. In this study, I use the evolution of software to redefine change-proneness. Many snapshots of software were studied to determine when changes became statistically significant, and snapshots were taken biweekly. The research was validated by looking at the evolution of five large open-source systems. Contribution: In this study, I use the evolution of software to redefine change-proneness. The research was validated by looking at the evolution of five large open-source systems. Findings: Software metrics can measure the significance of evolution in software. In addition, metric values change within different periods and the significance of change should be considered for each metric separately. For five classifiers, change-proneness prediction models were trained on one snapshot and tested on the next. In most snapshots, the prediction performance was excellent. For example, for Eclipse, the F-measure values were between 80 and 94. For other systems, the F-measure values were higher than 75 for most snapshots. Recommendations for Practitioners: Software change happens frequently in the evolution of software; however, the significance of change happens over a considerable length of time and this time should be considered when evaluating the quality of software. Recommendation for Researchers: Researchers should consider the significance of change when studying software evolution. Software changes should be taken from different perspectives besides the size or length of the code. Impact on Society: Software quality management is affected by the continuous evolution of projects. Knowing the appropriate time for software maintenance reduces the costs and impacts of software changes. Future Research: Studying the significance of software evolution for software refactoring helps improve the internal quality of software code.




war

Agile Practices and Their Impact on Agile Maturity Level of Software Companies in Nepal

Aim/Purpose: Using the Agile Adoption Framework (AAF), this study aims to examine the agile potential of software development companies in Nepal based on their agile maturity level. In addition, this study also examines the impact of various basic agile practices in determining the maturity level of the agile processes being implemented in the software industry of Nepal. Background: Even if most organizations in the software sector utilize agile development strategies, it is essential to evaluate their performance. Nepal’s software industry did not adopt agile techniques till 2014. The Nepalese industry must always adapt to new developments and discover ways to make software development more efficient and beneficial. The population of the study consists of 1,500 and 2,000 employees of software companies in Nepal implementing agile techniques. Methodology: The sample size considered was 150 employees working in software companies in Nepal. However, only 106 respondents responded after three follow-ups. The sample was collected with purposive sampling. A questionnaire was developed to gain information on Customer Adaptive, Customer Collaboration, Continuous Delivery, Human Centric, and Technical Excellence related to agile practices along with the Agile Maturity Level. Contribution: This research contributes to the understanding of agile practices adopted in software companies in developing countries like Nepal. It also reveals the determinants of the agility of software companies in developing countries. Findings: The results suggest that some of the basic principles of agile have a very significant role in Agile Maturity Level in the Nepali context. In the context of Nepal, human-centered practices have a very high level of correlation, which plays a vital role as a major predictor of the agile maturity level. In addition, Technical Excellence is the variable that has the highest level of association with the Agile Maturity Level, making it the most significant predictor of this quality. Recommendations for Practitioners: As Nepali software companies are mostly offshore or serve outsourcing companies, there is a very thin probability of Nepali developers being able to interact with actual clients and this might be one of the reasons for the Nepali industry not relying on Customer Adaptation and Collaboration as major factors of the Agile methodologies. Continuous Delivery, on the other hand, has a significant degree of correlation with Agile Maturity Level. Human-centric practices have a very high level of correlation as well as being a major predictor in determining the Agile Maturity Level in the context of Nepal. Technical Excellence is the most significant predictor and the variable which has the highest level of correlation with Agile Maturity Level. Practitioners should mainly focus on technical excellence as well as human-centric practices to achieve a higher level of Agile Maturity. Recommendation for Researchers: There has not been any such research in the Nepali context that anyone could rely on, to deep dive into their organizational concerns regarding agile strategies and plans. Researchers will need to focus on a more statistical approach with data-driven solutions to the issues related to people and processes. Researchers will need to cover freelancers as well as academics to get a different perspective on what can be the better practices to achieve a higher level of agile maturity. Impact on Society: This study on Agile work is accessible not only to the software industry but also to the general public. The Agile technique has had a huge impact on society’s project management. It has revolutionized how teams approach project planning, development, and execution. The paper’s findings will further information regarding the Agile methodology, which emphasizes collaboration and communication, fosters teamwork and higher quality work, and promotes the exchange of knowledge, ideas, and the pursuit of common goals. Future Research: Owing to the limitations of this study, it is necessary to analyze agile practices in the Nepalese software sector using additional factors that influence agile maturity. The conclusion that years of agile experience do not serve as a balancing factor for both agile practices and the Agile Maturity Level requires additional research. Whether a software outsourcing firm or not, the organization type had no bearing on the degree of maturity of agile methods; this leaves space for further research.




war

On large automata processing: towards a high level distributed graph language

Large graphs or automata have their data that cannot fit in a single machine, or may take unreasonable time to be processed. We implement with MapReduce and Giraph two algorithms for intersecting and minimising large and distributed automata. We provide some comparative analysis, and the experiment results are depicted in figures. Our work experimentally validates our propositions as long as it shows that our choice, in comparison with MapReduce one, is not only more suitable for graph-oriented algorithms, but also speeds the executions up. This work is one of the first steps of a long-term goal that consists in a high level distributed graph processing language.




war

Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability




war

Instructors' Attitudes toward Active Learning




war

Teachers in a World of Change: Teachers' Knowledge and Attitudes towards the Implementation of Innovative Technologies in Schools




war

Exploring the Influence of Context on Attitudes toward Web-Based Learning Tools (WBLTs) and Learning Performance




war

An Approach toward a Software Factory for the Development of Educational Materials under the Paradigm of WBE




war

Teachers' Openness to Change and Attitudes towards ICT: Comparison of Laptop per Teacher and Laptop per Student Programs




war

An Assessment of College Students’ Attitudes towards Using an Online E-textbook




war

Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8) and security (derived from CERT Secure Coding Standards). We use a multi-view, data-driven approach, by (a) using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b) building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751). Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels). The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.




war

Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness

Empowered by and tethered to ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe online activities of teens and young adults. The following paper presents the findings of a study examining the social networking activities of undergraduate students and also highlights a program to increase awareness of the dangers and safe practices when using and communicating, via social media. According to the survey results, young adults practice risky social networking site (SNS) behaviors with most having experienced at least one negative consequence. Further, females were more likely than males to engage in oversharing as well as to have experienced negative consequences. Finally, results of a post-treatment survey found that a targeted program that includes flyers, posters, YouTube videos, handouts, and in-class information sessions conducted at a Mid-Atlantic Historically Black College or University (HBCU) increased student awareness of the dangers of social media as well as positively influenced students to practice more prudent online behaviors.




war

The Characteristics of Successful MOOCs in the Fields of Software, Science, and Management, According to Students’ Perception

The characteristics of successful MOOCs were explored in this study. Thousands of student reviews regarding five xMOOCs (Massive Open Online Course) in the fields of software, science, and management were extracted from the Coursetalk website and analyzed by quantitative and qualitative methods using the Garrison, Anderson, and Archer (2000) Community of Inquiry (CoI) model. The 14 characteristics found to contribute to the success of MOOCs (e.g., teacher, atmosphere, exercise) were partitioned into the teaching, social, and cognitive presence elements. In addition, cluster analysis revealed five types of learners, based on the characteristics they mentioned for course success: atmosphere, exercise, teacher, exam, and unspecified. This divides learners into groups that may prefer social, cognitive, or teaching presence. The findings of this study negate the perception that xMOOCs mostly contain teaching presence elements. This research contributes to the understanding of characteristics that contribute to successful MOOCs and sheds light on the students, too. Listening to the voices of the students and the types of characteristics that they chose to mention, enables further exploration of their preferences and expectations regarding MOOCs and, accordingly, to future adaptation between students’ preferences and MOOC characteristics.




war

On the Nature of Models: Let us Now Praise Famous Men and Women, from Warren McCulloch to Candace Pert




war

A Groupware-based Peer Review Process: An Exploratory Case Study




war

Toward A Methodology For Managing Information Systems Implementation: A Social Constructivist Perspective




war

Toward a Theoretical Framework for Information Science




war

Salvaging Information Engineering Techniques in the Data Warehouse Environment




war

The Prediction of Perceived Level of Computer Knowledge: The Role of Participant Characteristics and Aversion toward Computers




war

Toward a Model of Growth Stages for Knowledge Management Technology in Law Firms




war

Operationalizing Context in Context-Aware Artifacts: Benefits and Pitfalls




war

Toward a Systemic Notion of Information: Practical Consequences




war

Using the World Wide Web to Connect Research and Professional Practice: Towards Evidence-Based Practice




war

Information Warfare and Deception




war

Towards the Automatic Generation of Virtual Presenter Agents




war

A Model for Mandatory Use of Software Technologies: An Integrative Approach by Applying Multiple Levels of Abstraction of Informing Science




war

Towards an Information Sharing Pedagogy: A Case of Using Facebook in a Large First Year Class




war

Designing to Inform: Toward Conceptualizing Practitioner Audiences for Socio-technical Artifacts in Design Science Research in the Information Systems Discipline

This paper identifies areas in the design science research (DSR) subfield of the information systems (IS) discipline where a more detailed consideration of practitioner audiences of socio-technical design artifacts could improve current IS DSR research practice and proposes an initial conceptualization of these audiences. The consequences of not considering artifact audiences are identified through a critical appraisal of the current informing science lenses in the IS DSR literature. There are specific shortcomings in four areas: 1) treating practice stakeholders as a too homogeneous group, 2) not explicitly distinguishing between social and technical parts of socio-technical artifacts, 3) neglecting implications of the artifact abstraction level, and 4) a lack of explicit consideration of a dynamic or evolutionary fitness perspective of socio-technical artifacts. The findings not only pave the way for future research to further improve the conceptualization of artifact audiences, in order to improve the informing power – and thus, impact on practice and research relevance – of IS DSR projects; they can also help to bridge the theory-practice gap in other disciplines (e.g. computer science, engineering, or policy-oriented sociology) that seek to produce social and/or technical artifacts of practical relevance.




war

KnoWare: A System for Citizen-based Environmental Monitoring

Non-expert scientists are frequently involved in research requiring data acquisition over large geographic areas. Despite mutual benefits for such “citizen science”, barriers also exist, including 1) difficulty maintaining user engagement with timely feedback, and 2) the challenge of providing non-experts with the means to generate reliable data. We have developed a system that addresses these barriers. Our technologies, KnoWare and InSpector, allow users to: collect reliable scientific measurements, map geo-tagged data, and intuitively visualize the results in real-time. KnoWare comprises a web portal and an iOS app with two core functions. First, users can generate scientific ‘queries’ that entail a call for information posed to a crowd with customized options for participant responses and viewing data. Second, users can respond to queries with their GPS-enabled mobile device, which results in their geo- and time-stamped responses populating a web-accessible map in real time. KnoWare can also interface with additional applications to diversify the types of data that can be reported. We demonstrate this capability with a second iOS app called InSpector that performs quantitative water quality measurements. When used in combina-tion, these technologies create a workflow to facilitate the collection, sharing and interpretation of scientific data by non-expert scientists.




war

Warranty of Misinforming as an Option in Product Utilization Process

The following definition of “option” is given in Wikipedia - “In finance, an option is a contract, which gives the buyer (the owner or holder) the right, but not the obligation, to buy or sell an underlying asset or instrument at a specified strike price on or before a specified date, depending on the form of the option” (“Option,” n.d.). Option as a risk management (mitigation) tool is broadly used in finance and trade. At the same time, it introduces asymmetry in the sense that, probabilistically, it limits the level of losses (e.g., the price of the option) and allows for unlimited gains. In the market of sophisticated devices (as smart phones, tablets, etc.), where technologies are rapidly advancing, customers usually do not have the experience to use all features of the device at the time of the purchase. Due to the lack of appropriate expertise, the risk of misinforming, leading to not purchasing the “right” device is high, but given enough time to learn the capabilities of the device and map these to the needs and tasks that device will be used for, could provide the client with substantial long term benefits. Warranty of misinforming is a mechanism that provides the client with the opportunity to explore the device and master its features under limited risk of financial losses. Thus, the warranty of misinforming could be considered as an option - the custom-ers buy it (at a fixed cost) and may gain (theoretically) unlimited benefit by realizing (within the terms of the warranty) that the device can be used to solve a variety of problems not envisaged at the time of purchase. In this study we present the idea of treating the warranty of misinforming as an option in finances and provide examples to illustrate our viewpoint.




war

The Effect of IT Integration on Supply Chain Agility Towards Market Performance (A Proposed Study)

Aim/Purpose : An important objective of any firm is escalation of its performance and the achievement of competitive advantages. Supply chain agility plays a prominent role to enhance the level of firm’s performance. Moreover, information technology (IT) plays a foundational role in supply chain management practices. Hence, this study proposes the relationship between IT integration as the competency of IT and firm’s market performance both directly and through mediating role of supply chain agility. Background: Many studies have been done to date on the impact of supply chain agility on overall firm’s performance. However, the effect of an agile supply chain on firm’s market performance per se needs to be studied. Furthermore, there is a gap in the literature about the effect of IT competency such as IT integration on firm’s market performance both directly and through mediating role of supply chain agility. Recommendation for Researchers: The first direction this study gives to researchers is to consider the different factors which have significant effect on the agility of supply chain, particularly the IT related ones. The second direction is about the study on the effect of IT competencies and supply chain agility on each category of firm’s performance separately instead of considering it as a one construct. Impact on Society : Although this is a conceptual study, it can highlight the importance of IT competency not only in our daily life, but also in our businesses and industries. Future Research: This study only proposes some relationships based on theory and literature. Future researchers can test these proposed relationships in different contexts and compare the results. Furthermore, this study proposes the relationships for large manufacturing sector in developing countries. The model could be tested for SMEs as well. In addition, the proposed theoretical model in this study might be tested in both developing as well as developed countries to compare the results which will be contributed to the body of knowledge.




war

Transdisciplinary Knowledge Producing Teams: Toward a Complex Systems Perspective

Aim/Purpose: Transdisciplinarity is considered as a framework for understanding knowledge producing teams (KPTs). Features of transdisciplinary knowledge producing teams (TDKPTs) are provided using a complex adaptive systems (CAS) lens. TDKPT features are defined and linked to complexity theory to show how team participants might develop skills that more truly express complex adaptive conditions. Background: TDKPTs are groups of stakeholder participants tasked with producing knowledge across disciplinary, sectoral, and ecological boundaries. TDKPTs reflect components of complex adaptive systems (CAS) and exemplify how CAS behave and function. Methodology: The paper accesses literature from the Science-of-Team-Science (SciTS), complexity theory, and systems theory to construct a typology of the features of TDKPTs. Contribution: This paper provides a list of features developed from a diverse body of literature useful for considering complexity within TDKPTs. Findings: The paper proposes a series of features of transdisciplinary knowledge producing teams. In addition, the authors identify important skill building aspects needed for TDKPTs to be successful. Recommendations for Practitioners: The paper provides a framework by which team functioning can be considered and enhanced within TDKPTs. Recommendation for Researchers: The paper suggests categorical features of transdisciplinary teams for research on the collaborative processes and outcomes of TD teams. Future Research: Knowledge producing team members need to engage in theoretical, episte-mological, and methodological reflections to elucidate the dynamic nature of TD knowledge producing teams. Understanding how conflict, dissonance, and reciprocal interdependencies contribute to knowledge generation are key areas of future research and inquiry.




war

Measuring Mental Workload of Software Developers Based on Nasal Skin Temperature

Keitaro NAKASAI,Shin KOMEDA,Masateru TSUNODA,Masayuki KASHIMA, Vol.E107-D, No.11, pp.1444-1448
To automatically measure the mental workload of developers, existing studies have used biometric measures such as brain waves and the heart rate. However, developers are often required to equip certain devices when measuring them, and can therefore be physically burdened. In this study, we evaluated the feasibility of non-contact biometric measures based on the nasal skin temperature (NST). In the experiment, the proposed biometric measures were more accurate than non-biometric measures.
Publication Date: 2024/11/01




war

Ethical and legal aspects of computing: a professional perspective from software engineering

With this book, O’Regan efficiently addresses a wide range of ethical and legal issues in computing. It is well crafted, organized, and reader friendly, featuring many recent, relevant examples like tweets, fake news, disinformation




war

Free and open source software and other market failures from Communications of the ACM

Understanding the free and open-source software (FOSS) movement has, since its beginning, implied crossing many disciplinary boundaries. This article describes FOSS’s history, explaining its undeniable success throughout the 1990s, and why the




war

JD Sports prices will rise due to Budget, warns boss

Chancellor Rachel Reeves has said firms will have to absorb higher taxes through their profits.





war

Trump Victory Is One Skirmish In A Multi-Generational War

If you thought the leftist backlash during Trump’s 1st term was bad, these coddled, indoctrinated adult children will take up a renewed Resistance” against Freedom & American values.




war

National Day Awards 2024

The National Day Awards are presented to individuals who have dedicated their service to the betterment of Singapore. We warmly congratulate our PSS members who were awarded these prestigious awards, on being recognised for their efforts in nation-building.

 




war

Trump rewards Elon Musk with leading role in government efficiency department

U.S. President-elect Donald Trump on Tuesday named Elon Musk and former Republican presidential candidate Vivek Ramaswamy to lead a newly created Department of Government Efficiency, rewarding two of Trump’s well known supporters from the private sector.

Musk and Ramaswamy “will pave the way for my Administration to dismantle Government Bureaucracy, slash excess regulations, cut wasteful expenditures, and restructure Federal Agencies,“ Trump said in a statement.

Trump said the new department “will provide advice and guidance from outside of government,“ signaling the entity would operate outside the confines of government.

However, it would work with the White House and Office of Management & Budget to “drive large scale structural reform, and create an entrepreneurial approach” to government never seen before.

Trump said their work would conclude by July 4, 2026, making it a “gift” to the country on the 250th anniversary of the signing of the Declaration of Independence.

Musk, ranked by Forbes as the richest person in the world, already stood to benefit from Trump’s victory, with the billionaire entrepreneur expected to wield extraordinary influence to help his companies and secure favorable government treatment.

Musk gave millions of dollars to support Trump’s presidential campaign and made public appearances with him. Trump had said he would offer Musk a role in his administration promoting government efficiency.

He has many links to Washington, opens new tab and his lineup of companies includes electric car company Tesla (TSLA.O), opens new tab, social media platform X and rocket company SpaceX.

“This will send shockwaves through the system, and anyone involved in government waste, which is a lot of people!” Musk said, according to Trump’s statement, which called the new government initiative “potentially ‘The Manhattan Project’ of our time,“ referring to the U.S. plan to build the atomic bomb that helped end World War Two.

Ramaswamy is the founder of a pharmaceutical company who ran for the Republican presidential nomination against Trump and then threw his support behind the former president after dropping out.

“We will not go gently, @elonmusk,“ Ramaswamy said on X.

Musk reposted the announcement from Trump on his X account and added comments such as that, “The merch will be (fire),“ using three fire emojis, and, “People have no idea how much this will move the needle!”

He also posted: “Threat to democracy? Nope, threat to BUREAUCRACY!!!”

The acronym of the new department - DOGE - coincides with the name of the cryptocurrency dogecoin that Musk promotes.

ALSO READ:

Trump says he will nominate Fox News host Pete Hegseth for defense secretary

Trump hush money judge delays ruling on immunity following election win




war

Ex-Philippine President Duterte says ICC should ‘hurry up’ on drug war investigation

MANILA: Former Philippine President Rodrigo Duterte said the International Criminal Court (ICC) should ‘hurry up’ with its probe of his war on drugs, remaining firm in his defence of the brutal campaign as he said the investigation should start immediately.

“I’m asking the ICC to hurry up, and if possible, they can come here and start the investigation tomorrow,“ Duterte said in a congressional inquiry on his war on drugs.

“If I am found guilty, I will go to prison.”

According to police data, more than 6,200 people died in anti-drug operations under Duterte’s presidency, during which police typically said they had killed suspects in self-defence.

Human rights groups believe the real toll to be far greater, with thousands more users and small-time peddlers killed in mysterious circumstances by unknown assailants.

“I assume full responsibility for whatever happened in the actions taken by law enforcement agencies of this country to... stop the serious problem of drugs affecting our people,“ Duterte said.

The ICC last year cleared the way for an investigation to into the thousands of deaths and other suspected rights abuses.

The Philippines withdrew from the ICC in March 2019, when Duterte was president. Appeals judges at the ICC subsequently ruled prosecutors still had jurisdiction over the alleged crimes because they occurred when the Philippines was an ICC member.




war

No end in sight to Sudan war as both sides seek ‘decisive’ win

CAIRO: Sudan has seen a surge in extreme violence in recent weeks as the warring military and paramilitary push for a decisive victory, with no political solution in sight.

Fighting between the Sudanese army and the Rapid Support Forces (RSF) has intensified since late October, with reports of attacks on civilians including sexual violence against women and girls raising alarm.

The war that erupted in April 2023 has created what the UN calls the world’s worst displacement crises, with more than 11 million people forced from their homes.

It has put the country on the brink of famine, and sparked warnings of intensifying violence in a war that has already killed tens of thousands.

“Over the last two weeks, the situation in the country has been marked by some of the most extreme violence since the start of the conflict,“ according to Rosemary DiCarlo, UN Under-Secretary-General for Political and Peacebuilding Affairs.

“Let me stress that both warring parties bear responsibility for this violence,“ she said, adding that both sides “seem convinced they can prevail on the battlefield.”

Since October 20, at least 124 civilians have been killed in central Al-Jazira state and another 135,000 have fled to other states, according to the UN.

With global attention focused on other wars, chiefly in Ukraine and the Middle East, civilians in Sudan are paying a steep price for the escalation.

“All indicators so far show that both sides are committed to military solutions, with no genuine interest in political resolutions or even easing the suffering of civilians,“ according to Mohamed Osman of Human Rights Watch.

Amani al-Taweel, director of the Africa programme at the Al-Ahram Center for Political and Strategic Studies in Cairo, agreed.

“There is no political solution on the horizon,“ she told AFP, adding that both sides were seeking a “decisive military solution”.

Split

The war in Sudan has pitted army chief Abdel Fattah al-Burhan against his erstwhile ally Mohamed Hamdan Daglo, leader of the RSF.

The country is split into zones of control, with the army holding the north and east, and the government based in Port Sudan on the Red Sea coast.

The RSF controls much of the capital Khartoum, the Darfur region in the west and parts of Kordofan in the south, while the centre is split.

With no mandatory military conscription, the Sudanese army includes Islamist-leaning forces as well as other factions.

The RSF is primarily made up of tribal militias from Darfur’s Arab communities.

According to local reports, the army has about 120,000 troops while the RSF has 100,000.

On the battlefield, Sudan’s air force gives the military an advantage.

Rights groups have accused both sides of committing atrocities.

The UN population agency published on Tuesday horrific accounts of women and girls fleeing the violence, including one who said she was urged to kill herself with a knife rather than be raped.

‘Deadlock’

Successive rounds of talks have been held in Saudi Arabia, but the negotiations have yet to produce a ceasefire.

In August, the Sudanese military opted out of US-brokered negotiations in Switzerland and an African Union-led mediation has also stalled.

“The deadlock in peaceful channels, whether regionally or internationally, is exacerbating the violence,“ said Mahmud Zakaria, a professor of political science at Cairo University’s Faculty of African Postgraduate Studies.

Since October, the RSF escalated its attacks in Al-Jazira state, south of Khartoum, following what the military said was the defection of one of its commanders to the army.

Before the war, Al-Jazira was known as Sudan’s breadbasket, hosting Africa’s largest agricultural project, yielding 65 percent of the country’s cotton, according to Zakaria.

Proxy war?

Some areas have been scarred by conflict before.

Darfur saw a major war two decades ago, during which the then-government’s allies in the Janjaweed militia faced accusations of ethnic cleansing and genocide.

With roots in the Janjaweed, the RSF became a force in its own right in 2013.

Sudan’s conflict has increasingly drawn in regional powers, prompting the United States to urge all countries to stop arming rival generals.

Former Egyptian deputy foreign minister for African affairs Ali el-Hefny said progress will require global willpower.

Instead, foreign powers are “fuelling the violence, delaying Sudan’s return to stability”, he said.

The army has accused the United Arab Emirates of backing the RSF -- a charge it strongly denies.

In December, UN experts monitoring an arms embargo on Darfur described as “credible” allegations Abu Dhabi had funnelled weapons to Daglo’s forces on cargo planes.

The RSF has in turn alleged Egyptian support for the army, which Cairo has also denied.

Army chief Burhan has historically been close to Egyptian President Abdel Fattah al-Sisi, who pledged his “continued support” earlier this month.




war

Anwar’s Egypt visit unlocks RM4.8 billion in export potential - MITI

KUALA LUMPUR: Prime Minister Datuk Seri Anwar Ibrahim’s official visit to Egypt has bolstered Malaysia-Egypt bilateral relations, unlocking RM4.8 billion (US$1.1 billion) in potential export opportunities for Malaysia, according to the Ministry of Investment, Trade and Industry (MITI).

MITI stated that this export potential was largely generated through a roundtable meeting attended by 60 industry and business leaders from 47 Egyptian firms and key business associations, as well as 40 representatives from 20 Malaysian companies.

“During the session, productive discussions between Malaysian and Egyptian companies identified export potential worth RM4.8 billion (US$1.1 billion), particularly in high-value sectors such as automotive, chemicals, oleochemicals and renewable energy,” MITI said in a statement.

Egyptian companies also expressed interest in investment opportunities in Malaysia, particularly in medical devices and pharmaceuticals, MITI added.

The official visit took place from Nov 10-12, 2024.

In a bilateral meeting during the visit, MITI Minister Tengku Datuk Seri Zafrul Abdul Aziz and Egypt’s Minister of Investment and International Trade Hassan El Khatib agreed to reactivate the Malaysia-Egypt Joint Trade and Investment Committee (JTIC).

Malaysia will host the second JTIC Meeting in early 2025, focusing on collaboration in the semiconductor sector, renewable energy, the halal industry and digital transformation.

The two ministers further agreed that Malaysia’s Investment Development Board (MIDA) and Egypt’s General Authority for Investment and Free Zones (GAFI) should sign a memorandum of understanding to enhance bilateral investment relations.

To support Malaysian exporters’ access to North African and Arab markets, MITI noted that Malaysia’s trade office in Cairo, managed by the Malaysia External Trade Development Corporation (MATRADE), was upgraded in January 2024, offering improved market access and export support services.

Meanwhile, national carmaker Proton has expanded into the Egyptian market with a local assembly plant.

Assembly activities began with the first delivery of Proton’s completely knocked down (CKD) vehicles in September 2024, and sales are expected to start in January 2025, with a target of 16,000 units for the period 2024–2026, MITI reported.

Bilateral trade between Malaysia and Egypt from January to September 2024 rose 21.4% year-on-year to RM3.0 billion (US$648 million), compared to RM2.4 billion (US$545.5 million) in the same period last year.

Egypt was Malaysia’s fifth-largest trading partner in Africa in 2023.

Tengku Zafrul said MITI is confident this bilateral relationship will continue to grow, positively impacting the economy and supporting the objectives of the New Malaysian Industrial Master Plan (NIMP) by 2030.

“MITI and its agencies will take prompt follow-up action to ensure that all agreed initiatives are implemented efficiently,” he added.




war

Drug war: They shoot children, don’t they? (1)

One hundred twenty-two children – aged 1 to 17 – were killed in the first half alone of Rodrigo Duterte’s six-year bloody drug war.




war

Signal No. 2 raised in more areas as ‘Ofel’ barrels toward Northern Luzon

The state weather bureau has placed several areas under Signal No. 2 as Typhoon Ofel makes its way to Northern Luzon.