ame

Extended Object Languages for the Extolware Persistence Framework




ame

A Framework for Student Assessment using Applied Simulation




ame

A Framework for Teaching Mobile and Wireless Technology




ame

Are Universities to Blame for the IT Careers Crisis?




ame

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




ame

Developing a Business Simulation Game: Integrating Multiple Development Tools




ame

The Educational Potential of Modified Video Games




ame

Information Technology and the Work/Cultural Orientations of Americans, Mexicans, and Germans




ame

Offshore Outsourcing: New Spin Or Same Old Business




ame

A Framework for Information Security Management Based on Guiding Standards: A United States Perspective




ame

Using Digital Video Game in Service Learning Projects




ame

Aligning Efficacy Beliefs and Competence: A Framework for Developing Technical Knowledge




ame

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




ame

The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study




ame

Novel Phonetic Name Matching Algorithm with a Statistical Ontology for Analysing Names Given in Accordance with Thai Astrology




ame

A Data Driven Conceptual Analysis of Globalization — Cultural Affects and Hofstedian Organizational Frames: The Slovak Republic Example




ame

Name-display Feature for Self-disclosure in an Instant Messenger Program: A Qualitative Study in Taiwan




ame

The Adoption of Single Sign-On and Multifactor Authentication in Organisations: A Critical Evaluation Using TOE Framework




ame

Building Computer Games as Effective Learning Tools for Digital Natives – and Similars




ame

Playing it Safe: Approaching Science Safety Awareness through Computer Game-Based Training




ame

A Framework for Using Cost-Benefit Analysis in Making the Case for Software Upgrade




ame

Software Engineering Frameworks: Perceptions of Second-Semester Students




ame

Multi-Agent Framework for Social Customer Relationship Management Systems




ame

Navigating the Framework Jungle for Teaching Web Application Development




ame

A Framework for Using Questions as Meta-tags to Enhance Knowledge Support Services as Part of a Living Lab Environment




ame

A Collaborative Framework for a Cross-Institutional Assessment to Shape Future IT Professionals




ame

Technological Entrepreneurship Framework for University Commercialization of Information Technology

One effective way of accelerating the commercialization of university innovations (inventions) is to execute a “Technological Entrepreneurship” framework that helps the execution of agreements between universities and industry for commercialization. Academics have been encouraged to commercialize their research and findings yet the level of success of commercialization of inventions (innovations) in industry is questionable. As there is no agreed commercialization framework to guide the execution of processes to support inventions moving from laboratories to the right market. The lack of capabilities of appropriate processes have undermined the turning of innovation and products into wealth. The research questions are designed to identify the constraints and hindrances of commercialization and the characteristics of successful processes built from framework based on selected case studies of incubation capabilities within universities commercialization program.




ame

Entertaining Whilst Defacing Websites: Psychological Games for Hackers

Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced websites and defacers that linked to a risk of being defaced through a set of descriptive analysis. Background: The current figures from a spectrum of sources, both academic and non-academic reports, proved a progressive increase of website defacement attacks to numerous organisations. Methodology: This study obtains a set of data from Zone-H site, which is accessible to the public, including 99,437 defaced websites. The descriptive analysis is applied in order to understand the motives of defacers and the probability of website re-defacements through the statistical investigation. Findings: The motives for defacing websites are driven mainly due to entertaining reasons. This in turn has an implication on the type of techniques defacers attack websites.




ame

The Impact of a University Experience Program on Rural and Regional Secondary School Students: Keeping the Flame Burning

Aim/Purpose: The uptake of university by regional students has been problematic for various reasons. This paper discusses a program, initiated by a South Australian regional university campus, aimed at attracting regional students into higher education. Background: A qualitative descriptive approach to study was used to determine the value of the program on participating students and school staff. Year 10 students from Roxby Downs, Port Augusta and Port Lincoln high schools were invited to participate in a two-day regionally-focussed school-university engagement program that linked students with the university campus and local employers. Methodology: A survey was administered to determine the impact of the program. Perceptions about the program by school staff were gathered using a modified One-Minute Harvard questionnaire. While 38 Year 10 students and 5 school staff members participated, 37 students and 3 staff evaluated the program. Findings: The findings revealed that the majority of the students would like to attend university, but financial and social issues were important barriers. The students learned about the regional university, what it can offer in terms of programs and support, and the employment prospect following university. The school staff benefited by developing a closer relationship with students and becoming better informed about the regional university. Recommendation for Practitioners: One way by which university uptake may be increased is to provide similar immersion programs featuring engagement with employers, our recommendation to other regional universities. In increasing the levels of education, individuals, communities and the society in general are benefited.




ame

A Data Science Enhanced Framework for Applied and Computational Math

Aim/Purpose: The primary objective of this research is to build an enhanced framework for Applied and Computational Math. This framework allows a variety of applied math concepts to be organized into a meaningful whole. Background: The framework can help students grasp new mathematical applications by comparing them to a common reference model. Methodology: In this research, we measure the most frequent words used in a sample of Math and Computer Science books. We combine these words with those obtained in an earlier study, from which we constructed our original Computational Math scale. Contribution: The enhanced framework improves the Computational Math scale by integrating selected concepts from the field of Data Science. Findings: The resulting enhanced framework better explains how abstract mathematical models and algorithms are tied to real world applications and computer implementations. Future Research: We want to empirically test our enhanced Applied and Computational Math framework in a classroom setting. Our goal is to measure how effective the use of this framework is in improving students’ understanding of newly introduced Math concepts.




ame

From Ignorance Map to Informing PKM4E Framework: Personal Knowledge Management for Empowerment

Aim/Purpose: The proposed Personal Knowledge Management (PKM) for Empowerment (PKM4E) Framework expands on the notions of the Ignorance Map and Matrix to support the educational and informing concept of a PKM system-in-progress. Background: The accelerating information abundance is depleting the very attention our cognitive capabilities are able to master, contributing to widening individual and collective opportunity divides. Support is urgently needed to benefit Knowledge Workers irrespective of space (developed/developing countries), time (study or career phase), discipline (natural or social science), or role (student, professional, leader). Methodology: The Design Science Research (DSR) project conceptualizing the PKM System (PKMS) aims to support a scenario of a ‘Decentralizing KM Revolution’ giving more power and autonomy to individuals and self-organized groups. Contribution: The informing-science-related approach synthesizes and visualizes concepts related to ignorance and entropy, learning and innovation, chance discovery and abduction to inform diverse audiences and potential beneficiaries. Findings: see Recommendation for Researchers Recommendations for Practitioners: The PKM4E learning cycles and workflows apply ‘cumulative synthesis’, a concept which convincingly couples the activities of researchers and entrepreneurs and assists users to advance their capability endowments via applied learning. Recommendation for Researchers: In substituting document-centric with meme-based knowledge bases, the PKMS approach merges distinctive voluntarily shared knowledge objects/assets of diverse disciplines into a single unified digital knowledge repository and provides the means for advancing current metrics and reputation systems. Impact on Society: The PKMS features provide the means to tackle the widening opportunity divides by affording knowledge workers with continuous life-long support from trainee, student, novice, or mentee towards professional, expert, mentor, or leader. Future Research: After completing the test phase of the PKMS prototype, its transformation into a viable PKM system and cloud-based server based on a rapid development platform and a noSQL-database is estimated to take 12 months.




ame

Increasing Intrinsic Motivation of Programming Students: Towards Fix and Play Educational Games

Aim/Purpose: The objective of this research is to investigate the effectiveness of educational games on learning computer programming. In particular, we are examining whether allowing students to manipulate the underlying code of the educational games will increase their intrinsic motivation. Background: Young students are fond of playing digital games. Moreover, they are also interested in creating game applications. We try to make use of both of these facts. Methodology: A prototype was created to teach the fundamentals of conditional structures. A number of errors were intentionally included in the game at different stages. Whenever an error is encountered, students have to stop the game and fix the bug before proceeding. A pilot study was conducted to evaluate this approach. Contribution: This research investigates a novel approach to teach programming using educational games. This study is at the initial stage. Findings: Allowing the programming students to manipulate the underlying code of the educational game they play will increase their intrinsic motivation. Recommendations for Practitioners: Creating educational games to teach programming, and systematically allowing the players to manipulate the gaming logic, will be beneficial to the students. Recommendation for Researchers: This research can be extended to investigate how various artificial intelligence techniques can be used to model the gamers, for example, skill level. Impact on Society: The future generations of students should be able to use digital technologies proficiently. In addition, they should also be able to understand and modify the underlying code in the digital things (like Internet of Things).This research attempts to alleviate the disenchantment associated with learning coding. Future Research: A full scale evaluation – including objective evaluation using game scores – will be conducted. One-way MANOVA will be used to analyze the efficacy of the proposed intervention on the students’ performance, and their intrinsic motivation and flow experience.




ame

Autoethnography of the Cultural Competence Exhibited at an African American Weekly Newspaper Organization

Aim/Purpose: Little is known of the cultural competence or leadership styles of a minority owned newspaper. This autoethnography serves to benchmark one early 1990s example. Background: I focused on a series of flashbacks to observe an African American weekly newspaper editor-in-chief for whom I reported to 25 years ago. In my reflections I sought to answer these questions: How do minorities in entrepreneurial organizations view their own identity, their cultural competence? What degree of this perception is conveyed fairly and equitably in the community they serve? Methodology: Autoethnography using both flashbacks and article artifacts applied to the leadership of an early 1990s African American weekly newspaper. Contribution: Since a literature gap of minority newspaper cultural competence examples is apparent, this observation can serve as a benchmark to springboard off older studies like that of Barbarin (1978) and that by examining the leadership styles and editorial authenticity as noted by The Chicago School of Media Theory (2018), these results can be used for comparison to other such minority owned publications. Findings: By bringing people together, mixing them up, and conducting business any other way than routine helped the Afro-American Gazette, Grand Rapids, proudly display a confidence sense of cultural competence. The result was a potentiating leadership style, and this style positively changed the perception of culture, a social theory change example. Recommendations for Practitioners: For the minority leaders of such publications, this example demonstrates effective use of potentiating leadership to positively change the perception of the quality of such minority owned newspapers. Recommendations for Researchers: Such an autoethnography could be used by others to help document other examples of cultural competence in other minority owned newspapers. Impact on Society: The overall impact shows that leadership at such minority owned publications can influence the community into a positive social change example. Future Research: Research in the areas of culture competence, leadership, within minority owned newspapers as well as other minority alternative publications and websites can be observed with a focus on what works right as well as examples that might show little social change model influence. The suggestion is to conduct the research while employed if possible, instead of relying on flashbacks.




ame

Educational Card Games: One Way of Assisting the Communication Skills Development of Nursing Students Whose First Language is Not English

Aim/Purpose. This study seeks to determine the impact of a card game intervention in improving the English verbal communication of nursing students from culturally and linguistically diverse backgrounds. Background. Many international students studying in Australia experience setbacks in their university studies due to English language difficulties. This paper outlines how an educational card game designed can be played by nursing students from culturally and linguistically diverse (CALD) backgrounds as an intervention for their English verbal communication development. Methodology. The study used a descriptive qualitative approach to analyse the learning experiences of forty-five (N=45) nursing students from CALD backgrounds undertaking their second semester at a metropolitan university in Victoria, Australia after being introduced to an educational card game developed by the first author. The card game was designed to explore the use of English pragmatic markers, which are words, phrases, or verbal cues that signal or emphasise the intentions of the speaker. Following the intervention, participants were queried in a survey about their experiences with English language speaking and how the game improved their verbal communication skills. Contribution. This paper provides knowledge about how a game can be designed to enhance the English verbal communication skills of nursing students from CALD backgrounds which could help them in their clinical placements and their adjustment into Australian society. Findings. Three intertwining themes that emerged from the data analysis were education content, skills development, and fun and creativity. These themes signify the importance of providing opportunities for learners to creatively practise the educational content in simulative contextualised situations within a safe, comfortable, and inclusive learning environment. Recommendations for Practitioners. Educators still need to consider the importance of inclusivity of students from culturally and linguistically diverse (CALD) backgrounds as part of successful integration into the culture of their host countries. Recommendations for Researchers. The findings emphasise the need for educators and researchers to understand the challenges facing these students in relation to marginalisation and discrimination and how they can design an intervention that is engaging and inclusive. Impact on Society. The findings also put forward the awareness of pragmatics as part of both English language learning and integration into the society of a host country as students learn how to express intention appropriately in various interactions. Furthermore, the themes presented in this paper suggest that not only should an educational game or an intervention contain relevant educational content and practical activities for skills development, but they must also be enjoyable by encouraging creativity and social interaction. Future Research. The results of this study also open possible future studies that involves the adaptation of a digital version of the card game or possible implementation of the game in other health professional programs in universities and other educational institutes.




ame

An Ethical Ecology of a Corporate Leader: Modeling the Ethical Frame of Corporate Leadership




ame

A Framework for Designing Nursing Knowledge Management Systems




ame

A Generic Agent Framework to Support the Various Software Project Management Processes




ame

Designing an ‘Electronic Village’ of Local Interest on Tourism: The eKoNES Framework




ame

An Integrated ICT Management Framework for Commercial Banking Organisations




ame

Framework for Quality Metrics in Mobile-Wireless Information Systems




ame

(GbL #1) Life Skills Developed by Those Who Have Played in Video Game Tournaments




ame

Introduction to the Special Section on Game-based Learning: Design and Applications (GbL)




ame

The Application of a Knowledge Management Framework to Automotive Original Component Manufacturers

Aim/Purpose: This paper aims to present an example of the application of a Knowledge Man-agement (KM) framework to automotive original component manufacturers (OEMs). The objective is to explore KM according to the four pillars of a selected KM framework. Background: This research demonstrates how a framework, namely the George Washington University’s Four Pillar Framework, can be used to determine the KM status of the automotive OEM industry, where knowledge is complex and can influence the complexity of the KM system (KMS) used. Methodology: An empirical study was undertaken using a questionnaire to gather quantitative data. There were 38 respondents from the National Association of Automotive Component and Allied Manufacturers (NAACAM) and suppliers from three major automotive OEMs. The respondents were required to be familiar with the company’s KMS. Contribution: Currently there is a limited body of research available on the KM implementation frameworks for the automotive industry. This study presents a novel approach to the use of a KM framework to reveal the status of KM in automotive OEMs. At the time of writing, the relationship between the four pillars and the complexity of KMS had not yet been determined. Findings: The results indicate that there is a need to improve KM in the automotive OEM industry. According to the relationships investigated, the four pillars, namely leadership, organization, technology and learning, are considered important for KM, regardless of the level of KMS complexity, Recommendations for Practitioners: Automotive OEMs need to ensure that the KM aspects are established and should be periodically evaluated by using a KM framework such as the George Washington University’s Four Pillar Framework to identify KM weaknesses. Recommendation for Researchers: The establishment and upkeep of a successful KM environment is challenging due to the complexity involved with various influencing aspects. To ensure that all aspects are considered in KM environments, comprehensive KM frameworks, such as the George Washington University’s Four Pillar Framework, need to be applied. Impact on Society: The status of KM management and accessibility of knowledge in organizations needs to be periodically examined, in order to improve supplier and OEM knowledge sharing. Future Research: Although the framework used provides a process for KM status determination, this study could be extended by investigating a methodology that includes KMS best practice and tools. This study could be repeated at a national and international level to provide an indication of KM practice within the entire automotive industry.




ame

A Cognitive Knowledge-based Framework for Social and Metacognitive Support in Mobile Learning

Aim/Purpose: This work aims to present a knowledge modeling technique that supports the representation of the student learning process and that is capable of providing a means for self-assessment and evaluating newly acquired knowledge. The objective is to propose a means to address the pedagogical challenges in m-learning by aiding students’ metacognition through a model of a student with the target domain and pedagogy. Background: This research proposes a framework for social and meta-cognitive support to tackle the challenges raised. Two algorithms are introduced: the meta-cognition algorithm for representing the student’s learning process, which is capable of providing a means for self-assessment, and the social group mapping algorithm for classifying students according to social groups. Methodology : Based on the characteristics of knowledge in an m-learning system, the cognitive knowledge base is proposed for knowledge elicitation and representation. The proposed technique allows a proper categorization of students to support collaborative learning in a social platform by utilizing the strength of m-learning in a social context. The social group mapping and metacognition algorithms are presented. Contribution: The proposed model is envisaged to serve as a guide for developers in implementing suitable m-learning applications. Furthermore, educationists and instructors can devise new pedagogical practices based on the possibilities provided by the proposed m-learning framework. Findings: The effectiveness of any knowledge management system is grounded in the technique used in representing the knowledge. The CKB proposed manipulates knowledge as a dynamic concept network, similar to human knowledge processing, thus, providing a rich semantic capability, which provides various relationships between concepts. Recommendations for Practitioners: Educationist and instructors need to develop new pedagogical practices in line with m-learning. Recommendation for Researchers: The design and implementation of an effective m-learning application are challenging due to the reliance on both pedagogical and technological elements. To tackle this challenge, frameworks which describe the conceptual interaction between the various components of pedagogy and technology need to be proposed. Impact on Society: The creation of an educational platform that provides instant access to relevant knowledge. Future Research: In the future, the proposed framework will be evaluated against some set of criteria for its effectiveness in acquiring and presenting knowledge in a real-life scenario. By analyzing real student interaction in m-learning, the algorithms will be tested to show their applicability in eliciting student metacognition and support for social interactivity.




ame

An Overlapless Incident Management Maturity Model for Multi-Framework Assessment (ITIL, COBIT, CMMI-SVC)

Aim/Purpose: This research aims to develop an information technology (IT) maturity model for incident management (IM) process that merges the most known IT frameworks’ practices. Our proposal intends to help organizations overcome the current limitations of multiframework implementation by informing organizations about frameworks’ overlap before their implementation. Background: By previously identifying frameworks’ overlaps it will assist organizations during the multi-framework implementation in order to save resources (human and/or financial). Methodology: The research methodology used is design science research (DSR). Plus, the authors applied semi-structured interviews in seven different organizations to demonstrate and evaluate the proposal. Contribution: This research adds a new and innovative artefact to the body of knowledge. Findings: The proposed maturity model is seen by the practitioners as complete and useful. Plus, this research also reinforces the frameworks’ overlap issue and concludes that some organizations are unaware of their actual IM maturity level; some organizations are unaware that they have implemented practices of other frameworks besides the one that was officially adopted. Recommendations for Practitioners: Practitioners may use this maturity model to assess their IM maturity level before multi-framework implementation. Moreover, practitioners are also incentivized to communicate further requirements to academics regarding multi-framework assessment maturity models. Recommendation for Researchers: Researchers may explore and develop multi-frameworks maturity models for the remaining processes of the main IT frameworks. Impact on Society: This research findings and outcomes are a step forward in the development of a unique overlapless maturity model covering the most known IT frameworks in the market thus helping organizations dealing with the increasing frameworks’ complexity and overlap. Future Research: Overlapless maturity models for the remaining IT framework processes should be explored.




ame

The Adoption of CRM Initiative among Palestinian Enterprises: A Proposed Framework

Aim/Purpose: This study aimed to examine the relationships among compatibility, relative advantage, complexity, IT Infrastructure, security, top Management Support, financial Support, information Policies, employee engagement, customer pressure, competitive pressure, information integrity, information sharing, attitude toward adopting technology factors, and CRM adoption Background: Customer relationship management (CRM) refers to the use of the process, information, technology, and people for the management of the interactions between the organization and its customers. Therefore, there is a need for SMEs to implement CRM practices in their businesses for competitive advantage. However, in developing nations, the adoption rate of such practices remains low. This low rate may be attributed to the lack of important factors that guide CRM adoption, and as such, the present study attempts to investigate the factors affecting CRM adoption in Palestinian SMEs. This paper used the Diffusion of Innovation Theory (DOI), Resource-Based View (RBV), and Technology, Organization, and Environment Framework (TOE) framework to identify the determinant factors from the technological, organizational, environmental, and information culture perspectives. Methodology: This study uses a quantitative approach to investigate the relationships between the variables. A questionnaire was designed to collect data from 420 SMEs in Palestine. 331respondents completed and returned the survey. The Partial Least Square-Structural Equation Model (PLS-SEM) approach was used to assess both the measurement and structural models. Contribution: This study contributes to both theory and practitioners by providing insights into factors that affect CRM adoption in Palestinian SMEs, which did not explore before. Future research suggestions are also provided. Findings: The results of the study prove that the adoption of CRM depends on compatibility (CMP), security (SEC), top management support (TMS), information policies (INP), financial resources (FR), employee engagement (EEN), competitive pressure (COP), customers pressure (CUP), attitude toward adopting technology (ATA), information integrity (INI), and information sharing (INS). Surprisingly, complexity (CMX), IT infrastructure (ITI), and relative advantage (RLA) do not play any role in CRM adoption in Palestine. Recommendations for Practitioners: This study provides practitioners with the important factors for CRM adoption upon its successful implementation in the context of Palestinian SMEs. Recommendation for Researchers: Our findings may be used to conduct further studies about compatibility, security, top management support, information policies, financial resources, employee engagement, competitive pressure, customers pressure, attitude toward adopting technology, information integrity, information sharing factors, and CRM adoption by using different countries, procedure, and context. Impact on Society: The proposed framework provides insights for SMEs which have significant effects for research and practice to help facilitate the adoption of CRM Future Research: The findings may also be compared to other studies conducted in different contexts and provide deeper insights into the influence of the examined contexts on the employees’ intention toward CRM adoption in banking and universities. It would be fruitful to test whether the results hold true in developed and developing countries.




ame

Establishing a Security Control Framework for Blockchain Technology

Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures.




ame

A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model

Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods.




ame

A Systematic Literature Review of Business Intelligence Framework for Tourism Organizations: Functions and Issues

Aim/Purpose: The main goal of this systematic literature review was to look for studies that provide information relevant to business intelligence’s (BI) framework development and implementation in the tourism sector. This paper tries to classify the tourism sectors where BI is implemented, group various BI functionalities, and identify common problems encountered by previous research. Background: There has been an increased need for BI implementation to support decision-making in the tourism sector. Tourism stakeholders such as management of destination, accommodation, transportation, and public administration need a guideline to understand functional requirements before implementation. This paper addresses the problem by comprehensively reviewing the functionalities and issues that need to be considered based on previous business intelligence framework development and implementation in tourism sectors. Methodology: We have conducted a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Guidelines for Meta-Analysis (PRISMA) method. The search is conducted using online academic database platforms, resulting in 543 initial articles published from 2002 to 2022. Contribution: The paper could be of interest to relevant stakeholders in the tourism industry because it provides an overview of the capabilities and limitations of business intelligence for tourism. To our knowledge, this is the first study to identify and classify the BI functionalities needed for tourism sectors and implementation issues related to organizations, people, and technologies that need to be considered. Findings: BI functionalities identified in this study include basic functions such as data analysis, reports, dashboards, data visualization, performance metrics, and key performance indicator, and advanced functions such as predictive analytics, trend indicators, strategic planning tools, profitability analysis, benchmarking, budgeting, and forecasting. When implementing BI, the issues that need to be considered include organizational, people and process, and technological issues. Recommendations for Practitioners: As data is a major issue in BI implementation, tourism stakeholders, especially in developing countries, may need to build a tourism data center or centralized coordination regulated by the government. They can implement basic functions first before implementing more advanced features later. Recommendation for Researchers: We recommend further studying the BI implementation barriers by employing a perspective of an adoption framework such as the technology, organization, and environment (TOE) framework. Impact on Society: This research has a potential impact on improving the tourism industry’s performance by providing insight to stakeholders about what is needed to help them make more accurate decisions using business intelligence. Future Research: Future research may involve collaboration between practitioners and academics in developing various BI architectures specific to each tourism industry, such as destination management, hospitality, or transportation.




ame

Towards a Framework on the Use of Infomediaries in Maternal mHealth in Rural Malawi

Aim/Purpose: The aim of the study is to explore factors that affect how healthcare clients in rural areas use infomediaries in maternal mHealth interventions. The study focuses on maternal healthcare clients who do not own mobile phones but use the mHealth intervention. Background: Maternal mHealth interventions in poor-resource settings are bedevilled by inequalities in mobile phone ownership. Clients who do not own mobile phones risk being excluded from benefiting from the interventions. Some maternal mHealth providers facilitate the access of mobile phones for those who do not own them using “infomediaries”. Infomediaries, in this case, refer to individuals who have custody of mobile phones that other potential beneficiaries may use. However, the use of infomediaries to offer access to the “have nots” may be influenced by a number of factors. Methodology: The study uses a case of a maternal mHealth intervention project in Malawi, as well as a qualitative research method and interpretive paradigm. Data was collected using secondary data from the implementing agency, semi-structured interviews, and focus group discussions. Empirical data was collected from maternal healthcare clients who do not own mobile phones and infomediaries. Data were analysed inductively using thematic analysis. Contribution: The study proposed a theoretical framework for studying infomediaries in ICT4D. The study may inform mHealth designers, implementers, and policymakers on how infomediaries could be implemented in a rural setting. Consequently, understanding the factors that affect the use of infomediaries may inform mHealth intervention implementers on how they could overcome the challenges by implementing mHealth interventions that reduce the challenges on the mHealth infomediaries side, and the maternal healthcare clients’ side. Findings: Characteristics of the maternal healthcare client, characteristics of the mHealth infomediary, perceived value of mHealth intervention, and socio-environmental factors affect maternal healthcare clients’ use of mHealth infomediaries. Recommendations for Practitioners: Implementers of interventions ought to manage the use of infomediaries to avoid volunteer fatigue and infomediaries who may not be compatible with the potential users of the intervention. Implementers could leverage traditional systems of identifying and using infomediaries instead of reinventing the wheel. Recommendation for Researchers: This research adopted a single case study to develop the theoretical framework for mHealth infomediary use. We recommend future studies are conducted in order to test and develop this framework further, not only in ICT4D, but also in other areas of application. Impact on Society: People still lack access. The lack of ownership of technology may still exclude them from participating in an information society. The use of infomediaries may help to provide access to technologies to those who do not have them thereby bridging the digital divide gap. Future Research: We propose herein that traditional systems may offer a good starting point for designing a system that would work for communities. We, therefore, recommend that future research may explore these possibilities.