sin (GbL #3) Innovative Teaching Using Simulation and Virtual Environments By Published On :: Full Article
sin Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland By Published On :: Full Article
sin Determinants of Intent to Continue Using Online Learning: A Tale of Two Universities By Published On :: Full Article
sin The Impact of Business Intelligence on Healthcare Delivery in the USA By Published On :: Full Article
sin Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries By Published On :: 2017-09-06 Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries. Full Article
sin Reasons for Poor Acceptance of Web-Based Learning using an LMS and VLE in Ghana By Published On :: 2017-05-20 Aim/Purpose: This study investigates the factors that affect the post implementation success of a web-based learning management system at the University of Professional Studies, Accra (UPSA). Background: UPSA implemented an LMS to blend Web-based learning environment with the traditional methods of education to enable working students to acquire education. Methodology: An explanatory sequential mixed method was adopted, under the pragmatic paradigm, to investigate the level of acceptance of web-based learning by students. The effects of perceived usefulness, perceived ease of use, and other social factors were investigated. In all, 4500 final and third-year undergraduate students of UPSA made up the population. A sample size of 870 was used for this study. Contribution: This paper contributes to the body of knowledge by identifying the factors that hinder post-implementation of LMS at the tertiary level in Ghana and adds to the general literature available. Findings: The level of acceptance of LMS seems very low due to poor IT infrastructure, inadequate training, and the relevance of the system to quality lecture delivery. However, students’ intention to use LMS and the usefulness of LMS were perceived to be high, especially among students in higher levels. Recommendations for Practitioners: The authors recommend that IT infrastructure, especially reliable and fast internet connectivity, and adequate training should be provided. Recommendation for Researchers: Further research should be done to confirm if the provision of a more reliable internet system will boost students’ internet proficiency, which in turn will improve their utilisation of the LMS. Impact on Society: Help create awareness of schooling while pursuing a career and also improve interactions between students and lecturers. It will also improve enrolment and possibly reduce the cost of education in the long-run. Future Research: Researchers can look at the possibility of implementing total virtual learning systems at the tertiary level in Ghana. Full Article
sin The Role of Social Network in Family Business Diversification: Evidence from South Eastern Nigeria By Published On :: 2019-06-10 Aim/Purpose: This study seeks to investigate if participation in business association’s programs through the traditional and new media platforms influences family businesses in South Eastern Nigeria to diversify into similar or different businesses. Background: Before the advances in information and communication technology, businesses were carried on via the traditional media. The application of these advances has changed the way business communications and transactions are conducted globally in both family and non-family businesses. Businesses are adapting to today’s turbulent environment by opening similar or different businesses in the same or different locations that are hinged on the traditional and new media platforms. Nigerians are largely involved in social network through the traditional (face-to-face contact) and new media (e.g., Facebook, WhatsApp, Twitter, YouTube and Instagram). Moreover, in spite of the commonplaceness of family businesses in Nigeria, these businesses still experience weak diversification, bankruptcy and loss of socio-emotional wealth. Consequent upon the foregoing, this paper specifically investigates if involvement in social network via the traditional media (i.e., participation in business association’s meetings, workshops, seminars) and the new media (i.e., participation in the business association’s interactive sessions on trending business issues through the association’s online social platform like WhatsApp, Twitter), influence family businesses in South Eastern Nigeria to diversify into similar or different businesses. Methodology: The study adopted a qualitative methodology. The qualitative data were generated via interview involving 30 purposively selected businesses from South Eastern Nigeria. This comprises 15 family businesses each that have respectively adopted related and unrelated diversification strategies. Two respondents (i.e., the business owner and a top level manager) each were drawn from the selected businesses. In all, 60 respondents were interviewed. Since the unit of analysis is the family business, the interview transcriptions from all the respondents were subjected to thematic content analysis on the basis of the family businesses. Contribution: Active involvement and participation in all the meetings, discussions, workshops and seminars of the social network via the traditional and new media platforms facilitates the adoption of related or unrelated diversification in family businesses. Moreover, the adoption of similar social network platforms like WhatsApp and Twitter in all the relationships among and between employees and managers, and the transactions of the businesses is one of the key factors for achieving successful related or unrelated diversification in family businesses. Findings: In spite of the risky nature of the business environment, the adoption of related diversification strategies is significantly influenced by resources such as business consultancy services garnered through the traditional and new media platforms of the social network. Also, family businesses that are actively involved in a social network where the actors interact through the traditional and new media are influenced by the resources acquired to consider adopting unrelated diversification. These resources include: better understanding of the nature of business challenges, environments and experiences; and different lines of businesses. Thus, the traditional and new media platforms are complementary in their roles. Recommendations for Practitioners: Family business owner-managers could use the findings to develop related or unrelated strategies for diversifying into existing or new markets. This can be through the localization of manufacturing plant, improvement of product packaging, sitting of sales outlet closer to the consumers, introduction of lower prices for products/services, introduction of new and better ways of service delivery, or development of more compelling promotion strategies. Recommendation for Researchers: As a veritable guide, this study could guide future researchers in the formulation of their objectives, selection of instrument for data collection and respondents, and adoption of method of data analysis. Impact on Society: Successful diversification suggests the establishment of new or more businesses. Consequently, these new or more family businesses are expected to translate to more employment opportunities and by extension reduction in unemployment and poverty rates in the society. Future Research: Further studies should be carried out to enhance the development of family businesses, contribute to the existing literature and ensure the generalization of the findings. Full Article
sin Prosumers’ Engagement in Business Process Innovation – The Case of Poland and the UK By Published On :: 2019-04-26 Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing. Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts. Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK. Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process. Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services. Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations. Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement. Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research. Full Article
sin A Cognitive Knowledge-based Model for an Academic Adaptive e-Advising System By Published On :: 2020-10-08 Aim/Purpose: This study describes a conceptual model, based on the principles of concept algebra that can provide intelligent academic advice using adaptive, knowledge-based feedback. The proposed model advises students based on their traits and academic history. The system aims to deliver adaptive advice to students using historical data from previous and current students. This data-driven approach utilizes a cognitive knowledge-based (CKB) model to update the weights (values that indicate the strength of relationships between concepts) that exist between student’s performances and recommended courses. Background: A research study conducted at the Public Authority for Applied Education and Training (PAAET), a higher education institution in Kuwait, indicates that students’ have positive perceptions of the e-Advising system. Most students believe that PAAET’s e-Advising system is effective because it allows them to check their academic status, provides a clear vision of their academic timeline, and is a convenient, user-friendly, and attractive online service. Student advising can be a tedious element of academic life but is necessary to fill the gap between student performance and degree requirements. Higher education institutions have prioritized assisting undecided students with career decisions for decades. An important feature of e-Advising systems is personalized feedback, where tailored advice is provided based on students' characteristics and other external parameters. Previous e-Advising systems provide students with advice without taking into consideration their different attributes and goals. Methodology: This research describes a model for an e-Advising system that enables students to select courses recommended based on their personalities and academic performance. Three algorithms are used to provide students with adaptive course selection advice: the knowledge elicitation algorithm that represents students' personalities and academic information, the knowledge bonding algorithm that combines related concepts or ideas within the knowledge base, and the adaptive e-Advising model that recommends relevant courses. The knowledge elicitation algorithm acquires student and academic characteristics from data provided, while the knowledge bonding algorithm fuses the newly acquired features with existing information in the database. The adaptive e-Advising algorithm provides recommended courses to students based on existing cognitive knowledge to overcome the issues associated with traditional knowledge representation methods. Contribution: The design and implementation of an adaptive e-Advising system are challenging because it relies on both academic and student traits. A model that incorporates the conceptual interaction between the various academic and student-specific components is needed to manage these challenges. While other e-Advising systems provide students with general advice, these earlier models are too rudimentary to take student characteristics (e.g., knowledge level, learning style, performance, demographics) into consideration. For the online systems that have replaced face-to-face academic advising to be effective, they need to take into consideration the dynamic nature of contemporary students and academic settings. Findings: The proposed algorithms can accommodate a highly diverse student body by providing information tailored to each student. The academic and student elements are represented as an Object-Attribute-Relationship (OAR) model. Recommendations for Practitioners: The model proposed here provides insight into the potential relationships between students’ characteristics and their academic standing. Furthermore, this novel e-Advising system provides large quantities of data and a platform through which to query students, which should enable developing more effective, knowledge-based approaches to academic advising. Recommendation for Researchers: The proposed model provides researches with a framework to incorporate various academic and student characteristics to determine the optimal advisory factors that affect a student’s performance. Impact on Society: The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advice to students. The proposed approach can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to learning. Future Research: In future studies, the proposed algorithms will be implemented, and the adaptive e-Advising model will be tested on real-world data and then further improved to cater to specific academic settings. The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advisory to students. The approach proposed can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to course recommendation. Full Article
sin Critical Success Factors for Implementing Business Intelligence Projects (A BI Implementation Methodology Perspective) By Published On :: 2020-08-27 Aim/Purpose: The purpose of this paper is to identify Critical Success Factors (CSFs) for Business Intelligence (BI) implementation projects by studying the existing BI project implementation methodologies and to compare these methodologies based on the identified CSFs. Background: The implementation of BI project has become one of the most important technological and organizational innovations in modern organizations. The BI project implementation methodology provides a framework for demonstrating knowledge, ideas and structural techniques. It is defined as a set of instructions and rules for implementing BI projects. Identifying CSFs of BI implementation project can help the project team to concentrate on solving prior issues and needed resources. Methodology: Firstly, the literature review was conducted to find the existing BI project implementation methodologies. Secondly, the content of the 13 BI project implementation methodologies was analyzed by using thematic analysis method. Thirdly, for examining the validation of the 20 identified CSFs, two questionnaires were distributed among BI experts. The gathered data of the first questionnaire was analyzed by content validity ratio (CVR) and 11 of 20 CSFs were accepted as a result. The gathered data of the second questionnaire was analyzed by fuzzy Delphi method and the results were the same as CVR. Finally, 13 raised BI project implementation methodologies were compared based on the 11 validated CSFs. Contribution: This paper contributes to the current theory and practice by identifying a complete list of CSFs for BI projects implementation; comparison of existing BI project implementation methodologies; determining the completeness degree of existing BI project implementation methodologies and introducing more complete ones; and finding the new CSF “Expert assessment of business readiness for successful implementation of BI project” that was not expressed in previous studies. Findings: The CSFs that should be considered in a BI project implementation include: “Obvious BI strategy and vision”, “Business requirements definition”, “Business readiness assessment”, “BI performance assessment”, “Establishing BI alignment with business goals”, “Management support”, “IT support for BI”, “Creating data resources and source data quality”, “Installation and integration BI programs”, “BI system testing”, and “BI system support and maintenance”. Also, all the 13 BI project implementation methodologies can be divided into four groups based on their completeness degree. Recommendations for Practitioners: The results can be used to plan BI project implementation and help improve the way of BI project implementation in the organizations. It can be used to reduce the failure rate of BI implementation projects. Furthermore, the 11 identified CSFs can give a better understanding of the BI project implementation methodologies. Recommendation for Researchers: The results of this research helped researchers and practitioners in the field of business intelligence to better understand the methodology and approaches available for the implementation and deployment of BI systems and thus use them. Some methodologies are more complete than other studied methodologies. Therefore, organizations that intend to implement BI in their organization can select these methodologies according to their goals. Thus, Findings of the study can lead to reduce the failure rate of implementation projects. Future Research: Future researchers may add other BI project implementation methodologies and repeat this research. Also, they can divide CSFs into three categories including required before BI project implementation, required during BI project implementation and required after BI project implementation. Moreover, researchers can rank the BI project implementation CSFs. As well, Critical Failure Factors (CFFs) need to be explored by studying the failed implementations of BI projects. The identified CSFs probably affect each other. So, studying the relationship between them can be a topic for future research. Full Article
sin Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem By Published On :: 2021-07-27 Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. Full Article
sin Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study By Published On :: 2021-01-18 Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further. Full Article
sin A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model By Published On :: 2022-12-03 Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods. Full Article
sin A Systematic Literature Review of Business Intelligence Framework for Tourism Organizations: Functions and Issues By Published On :: 2022-10-09 Aim/Purpose: The main goal of this systematic literature review was to look for studies that provide information relevant to business intelligence’s (BI) framework development and implementation in the tourism sector. This paper tries to classify the tourism sectors where BI is implemented, group various BI functionalities, and identify common problems encountered by previous research. Background: There has been an increased need for BI implementation to support decision-making in the tourism sector. Tourism stakeholders such as management of destination, accommodation, transportation, and public administration need a guideline to understand functional requirements before implementation. This paper addresses the problem by comprehensively reviewing the functionalities and issues that need to be considered based on previous business intelligence framework development and implementation in tourism sectors. Methodology: We have conducted a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Guidelines for Meta-Analysis (PRISMA) method. The search is conducted using online academic database platforms, resulting in 543 initial articles published from 2002 to 2022. Contribution: The paper could be of interest to relevant stakeholders in the tourism industry because it provides an overview of the capabilities and limitations of business intelligence for tourism. To our knowledge, this is the first study to identify and classify the BI functionalities needed for tourism sectors and implementation issues related to organizations, people, and technologies that need to be considered. Findings: BI functionalities identified in this study include basic functions such as data analysis, reports, dashboards, data visualization, performance metrics, and key performance indicator, and advanced functions such as predictive analytics, trend indicators, strategic planning tools, profitability analysis, benchmarking, budgeting, and forecasting. When implementing BI, the issues that need to be considered include organizational, people and process, and technological issues. Recommendations for Practitioners: As data is a major issue in BI implementation, tourism stakeholders, especially in developing countries, may need to build a tourism data center or centralized coordination regulated by the government. They can implement basic functions first before implementing more advanced features later. Recommendation for Researchers: We recommend further studying the BI implementation barriers by employing a perspective of an adoption framework such as the technology, organization, and environment (TOE) framework. Impact on Society: This research has a potential impact on improving the tourism industry’s performance by providing insight to stakeholders about what is needed to help them make more accurate decisions using business intelligence. Future Research: Future research may involve collaboration between practitioners and academics in developing various BI architectures specific to each tourism industry, such as destination management, hospitality, or transportation. Full Article
sin Predicting Key Predictors of Project Desertion in Blockchain: Experts’ Verification Using One-Sample T-Test By Published On :: 2022-10-04 Aim/Purpose: The aim of this study was to identify the critical predictors affecting project desertion in Blockchain projects. Background: Blockchain is one of the innovations that disrupt a broad range of industries and has attracted the interest of software developers. However, despite being an open-source software (OSS) project, the maintenance of the project ultimately relies on small core developers, and it is still uncertain whether the technology will continue to attract a sufficient number of developers. Methodology: The study utilized a systematic literature review (SLR) and an expert review method. The SLR identified 21 primary studies related to project desertion published in Scopus databases from the year 2010 to 2020. Then, Blockchain experts were asked to rank the importance of the identified predictors of project desertion in Blockchain. Contribution: A theoretical framework was constructed based on Social Cognitive Theory (SCT) constructs; personal, behavior, and environmental predictors and related theories. Findings: The findings indicate that the 12 predictors affecting Blockchain project desertion identified through SLR were important and significant. Recommendations for Practitioners: The framework proposed in this paper can be used by the Blockchain development community as a basis to identify developers who might have the tendency to abandon a Blockchain project. Recommendation for Researchers: The results show that some predictors, such as code testing tasks, contributed code decoupling, system integration and expert heterogeneity that are not covered in the existing developer turnover models can be integrated into future research efforts. Impact on Society: This study highlights how an individual’s design choices could determine the success or failure of IS projects. It could direct Blockchain crypto-currency investors and cyber-security managers to pay attention to the developer’s behavior while ensuring secure investments, especially for crypto-currencies projects. Future Research: Future research may employ additional methods, such as a meta-analysis, to provide a comprehensive picture of the main predictors that can predict project desertion in Blockchain. Full Article
sin Dark Side of Mobile Phone Technology: Assessing the Impact of Self-Phubbing and Partner-Phubbing on Life Satisfaction By Published On :: 2024-02-08 Aim/Purpose: The study aims to explore the attributes of self-phubbing and partner-phubbing, as well as their impact on marital relationship satisfaction and the quality of communication. Furthermore, it aims to comprehend how these characteristics could impact an individual’s total level of life satisfaction. Background: The study aims to establish a clear association between specific mobile phone usage behaviors and their subsequent impact on relationship satisfaction and the quality of communication. This study investigates the effects of two types of behaviors on interpersonal relationships: self-phubbing, which refers to an individual being deeply absorbed in their own mobile phone use, and partner-phubbing, which refers to witnessing one’s partner being deeply absorbed in a mobile device. Methodology: This study utilizes a quantitative approach. The poll involved 150 smartphone users in Malaysia who are in relationships, and they participated by completing a questionnaire. The data analysis was performed using the Partial Least Squares-based Structural Equation Modeling method. Contribution: This research addresses the gap and gives insight into the consequences of self and partner phubbing and its impact on the relationship and life satisfaction among partners by providing a research model that was validated with primary data. Findings: The results of this survey show that smartphone conflicts harm relationship satisfaction but not communication quality. It was revealed that communication quality does not directly bring a negative impact on life satisfaction, but it directly affects relationship satisfaction, which, in turn, harms life satisfaction. Recommendations for Practitioners: The findings of this study can be used by practitioners to improve relationship counseling and therapy. Through the integration of the notion of phubbing and its impact on relationship happiness, couples can receive guidance on how to reduce the tension that arises from using smartphones. Recommendation for Researchers: Previous research was conducted exclusively on only an individual’s phubbing behavior, but limited work was done on the partner’s phubbing behavior. Future researchers can enhance this model by identifying more factors. Impact on Society: This study addresses broader societal ramifications in addition to the dynamics of particular relationships. This study promotes a more mindful use of smartphones by exposing the complex relationships between technology use, relationship happiness, and general life contentment. This will ultimately lead to healthier relationships and improved societal well-being. Future Research: In the future, we are going to implement an artificial neural network approach to test this data to predict the most important factors that influence phubbing. Full Article
sin Predicting Software Change-Proneness From Software Evolution Using Machine Learning Methods By Published On :: 2023-10-08 Aim/Purpose: To predict the change-proneness of software from the continuous evolution using machine learning methods. To identify when software changes become statistically significant and how metrics change. Background: Software evolution is the most time-consuming activity after a software release. Understanding evolution patterns aids in understanding post-release software activities. Many methodologies have been proposed to comprehend software evolution and growth. As a result, change prediction is critical for future software maintenance. Methodology: I propose using machine learning methods to predict change-prone classes. Classes that are expected to change in future releases were defined as change-prone. The previous release was only considered by the researchers to define change-proneness. In this study, I use the evolution of software to redefine change-proneness. Many snapshots of software were studied to determine when changes became statistically significant, and snapshots were taken biweekly. The research was validated by looking at the evolution of five large open-source systems. Contribution: In this study, I use the evolution of software to redefine change-proneness. The research was validated by looking at the evolution of five large open-source systems. Findings: Software metrics can measure the significance of evolution in software. In addition, metric values change within different periods and the significance of change should be considered for each metric separately. For five classifiers, change-proneness prediction models were trained on one snapshot and tested on the next. In most snapshots, the prediction performance was excellent. For example, for Eclipse, the F-measure values were between 80 and 94. For other systems, the F-measure values were higher than 75 for most snapshots. Recommendations for Practitioners: Software change happens frequently in the evolution of software; however, the significance of change happens over a considerable length of time and this time should be considered when evaluating the quality of software. Recommendation for Researchers: Researchers should consider the significance of change when studying software evolution. Software changes should be taken from different perspectives besides the size or length of the code. Impact on Society: Software quality management is affected by the continuous evolution of projects. Knowing the appropriate time for software maintenance reduces the costs and impacts of software changes. Future Research: Studying the significance of software evolution for software refactoring helps improve the internal quality of software code. Full Article
sin Antecedents of Business Analytics Adoption and Impacts on Banks’ Performance: The Perspective of the TOE Framework and Resource-Based View By Published On :: 2023-09-18 Aim/Purpose: This study utilized a comprehensive framework to investigate the adoption of Business Analytics (BA) and its effects on performance in commercial banks in Jordan. The framework integrated the Technological-Organizational-Environmental (TOE) model, the Diffusion of Innovation (DOI) theory, and the Resource-Based View (RBV). Background: The recent trend of utilizing data for business operations and decision-making has positively impacted organizations. Business analytics (BA) is a leading technique that generates valuable insights from data. It has gained considerable attention from scholars and practitioners across various industries. However, guidance is lacking for organizations to implement BA effectively specific to their business contexts. This research aims to evaluate factors influencing BA adoption by Jordanian commercial banks and examine how its implementation impacts bank performance. The goal is to provide needed empirical evidence surrounding BA adoption and outcomes in the Jordanian banking sector. Methodology: The study gathered empirical data by conducting an online questionnaire survey with senior and middle managers from 13 commercial banks in Jordan. The participants were purposefully selected, and the questionnaire was designed based on relevant and well-established literature. A total of 307 valid questionnaires were collected and considered for data analysis. Contribution: This study makes a dual contribution to the BA domain. Firstly, it introduces a research model that comprehensively examines the factors that influence the adoption of BA. The proposed model integrates the TOE framework, DOI theory, and RBV theory. Combining these frameworks allows for a comprehensive examination of BA adoption in the banking industry. By analyzing the technological, organizational, and environmental factors through the TOE framework, understanding the diffusion process through the DOI theory, and assessing the role of resources and capabilities through the RBV theory, researchers and practitioners can better understand the complex dynamics involved. This integrated approach enables a more nuanced assessment of the factors that shape BA adoption and its subsequent impact on business performance within the banking industry. Secondly, it uncovers the effects of BA adoption on business performance. These noteworthy findings stem from a rigorous analysis of primary data collected from commercial banks in Jordan. By presenting a holistic model and delving into the implications for business performance, this research offers valuable insights to researchers and practitioners alike in the field of BA. Findings: The findings revealed that various technological (data quality, complexity, compatibility, relative advantage), organizational (top management support, organizational readiness), and environmental (external support) factors are crucial in shaping the decision to adopt BA. Furthermore, the study findings demonstrated a positive relationship between BA adoption and performance outcomes in Jordanian commercial banks. Recommendations for Practitioners: The findings suggest that Jordanian commercial banks should enforce data quality practices, provide clear standards, invest in data quality tools and technologies, and conduct regular data audits. Top management support is crucial for fostering a data-driven decision-making culture. Organizational readiness involves having the necessary resources and skilled personnel, as well as promoting continuous learning and improvement. Highlighting the benefits of BA helps overcome resistance to technological innovation and encourages adoption by demonstrating improved decision-making processes and operational efficiency. Furthermore, external support is crucial for banks to adopt Business Analytics (BA). Banks should partner with experienced vendors to gain expertise and incorporate best practices. Vendors also provide training and technical support to overcome technological barriers. Compatibility is essential for optimal performance, requiring managers to modify workflows and IT infrastructure. Complexity, including data, organizational, and technical complexities, is a major obstacle to BA adoption. Banks should take a holistic approach, focusing on people, processes, and technology, and prioritize data quality and governance. Building a skilled team, fostering a data-driven culture, and investing in technology and infrastructure are essential. Recommendation for Researchers: The integration of the TOE framework, the DOI theory, and the RBV theory can prove to be a powerful approach for comprehensively analyzing the various factors that influence BA adoption within the dynamic banking industry. Furthermore, this combined framework enables us to gain deeper insights into the subsequent impact of BA adoption on overall business performance. Impact on Society: Examining the factors influencing BA adoption in the banking industry and its subsequent impact on business performance can have wide-ranging societal implications. It can promote data-driven decision-making, enhance customer experiences, strengthen fraud detection, foster financial inclusion, contribute to economic growth, and trigger discussions on ethical considerations. Future Research: To further advance future research, there are several avenues to consider. One option is to broaden the scope by including a larger sample size, allowing for a more comprehensive analysis. Another possibility is to investigate the impact of BA adoption on various performance indicators beyond the ones already examined. Additionally, incorporating qualitative research methods would provide a more holistic understanding of the organizational dynamics and challenges associated with the adoption of BA in Jordanian commercial banks. Full Article
sin The Role of Corporate Social Responsibility in Business Performance: The Moderation Influence of Blockchain Technology By Published On :: 2023-07-09 Aim/Purpose: The major challenges for firms to initiate corporate social responsibility (CSR) arise from resource constraints, complexity, and uncertainty. Consuming considerable financial and human resources is the main difficulty for smaller firms or those operating in less profitable industries, and the lack of immediate outputs from CSR initiatives poses a challenge for firms in prioritizing and assessing their effectiveness. Background: To better integrate CSR management into overall business strategy and decision-making processes, Blockchain technology (BCT) could potentially offer a feasible and optimal alternative to CSR reports. Methodology: This study uses the fixed effects regression by way of the Least Squares Dummy Variable (LSDV) approach in STATA to analyze the direct effect of CSR management on business performance and the moderating effect of BCT adoption on this relationship with a panel data set of 5810 observations collected from the 874 listed companies in 2015 in Taiwan Stock Exchange through 2021. Contribution: This study contributes to the literature by shedding light on the organizational factors that influence BCT adoption. Findings: The findings show that firms with high levels of CSR management have better business performance. Additionally, the adoption of BCT strengthens the positive relationship between CSR management and business performance, but it cannot replace the fundamental principles of CSR. Finally, firm size does not significantly affect BCT adoption, indicating that companies of all sizes have an equal opportunity to adopt BCT, which can help to level the playing field in terms of resources available to different firms. Recommendations for Practitioners: This study suggests that firms managing CSR practices have better business performance, and the adoption of BCTs further enhances this positive relationship. However, BCT adoption does not have the same positive effect on business performance as CSR practices. Additionally, this research can help to inform public policy related to BCT adoption and diffusion. Recommendation for Researchers: By exploring the factors that influence BCT adoption, future researchers can provide insights into the key challenges and opportunities faced by organizations of different sizes and help to develop strategies for promoting the effective adoption of BCT. Impact on Society: Given the limitations of current CSR reporting, the understanding gained from BCT applications can provide companies with an alternative mechanism to foster progress in CSR implementation. Future Research: Firstly, while the fixed-effects model might have dampened the power of explanation because it only captures within-unit variation and ignores between-unit variation, the explanatory power is further limited due to only integrating two independent variables in this model. Because of limited data availability, this study only utilizes CSR_Report and firm_size as independent variables. Future studies can consider more key factors and may lead to different results. Additionally, panel data is collected from Taiwan and, therefore, may not be representative of the broader population. Future researchers integrating the Stock Exchange of different countries are recommended. Full Article
sin Customer Churn Prediction in the Banking Sector Using Machine Learning-Based Classification Models By Published On :: 2023-02-28 Aim/Purpose: Previous research has generally concentrated on identifying the variables that most significantly influence customer churn or has used customer segmentation to identify a subset of potential consumers, excluding its effects on forecast accuracy. Consequently, there are two primary research goals in this work. The initial goal was to examine the impact of customer segmentation on the accuracy of customer churn prediction in the banking sector using machine learning models. The second objective is to experiment, contrast, and assess which machine learning approaches are most effective in predicting customer churn. Background: This paper reviews the theoretical basis of customer churn, and customer segmentation, and suggests using supervised machine-learning techniques for customer attrition prediction. Methodology: In this study, we use different machine learning models such as k-means clustering to segment customers, k-nearest neighbors, logistic regression, decision tree, random forest, and support vector machine to apply to the dataset to predict customer churn. Contribution: The results demonstrate that the dataset performs well with the random forest model, with an accuracy of about 97%, and that, following customer segmentation, the mean accuracy of each model performed well, with logistic regression having the lowest accuracy (87.27%) and random forest having the best (97.25%). Findings: Customer segmentation does not have much impact on the precision of predictions. It is dependent on the dataset and the models we choose. Recommendations for Practitioners: The practitioners can apply the proposed solutions to build a predictive system or apply them in other fields such as education, tourism, marketing, and human resources. Recommendation for Researchers: The research paradigm is also applicable in other areas such as artificial intelligence, machine learning, and churn prediction. Impact on Society: Customer churn will cause the value flowing from customers to enterprises to decrease. If customer churn continues to occur, the enterprise will gradually lose its competitive advantage. Future Research: Build a real-time or near real-time application to provide close information to make good decisions. Furthermore, handle the imbalanced data using new techniques. Full Article
sin Enhancing Waste Management Decisions: A Group DSS Approach Using SSM and AHP in Indonesia By Published On :: 2024-09-12 Aim/Purpose: This research aims to design a website-based group decision support system (DSS) user interface to support an integrated and sustainable waste management plan in Jagatera. The main focus of this research is to design a group DSS to help Jagatera prioritize several waste alternatives to be managed so that Jagatera can make the right decisions to serve the community. Background: The Indonesian government and various stakeholders are trying to solve the waste problem. Jagatera, as a waste recycling company, plays a role as a stakeholder in managing waste. In 2024, Jagatera plans to accept all waste types, which impacts the possibility of increasing waste management costs. If Jagatera does not have a waste management plan, this will impact reducing waste management services in the community. To solve this problem, the group DSS assists Jagatera in prioritizing waste based on aspects of waste management cost. Methodology: Jagatera, an Indonesian waste recycling company, is implementing a group DSS using the soft system methodology (SSM) method. The SSM process involves seven stages, including problem identification, problem explanation using rich pictures, system design, conceptual model design, real-life comparison, changes, and improvement steps. The final result is a prototype user interface design addressing the relationship between actors and the group DSS. The analytical hierarchy process (AHP) method prioritized waste based on management costs. This research obtained primary data from interviews with Jagatera management, a literature review regarding the group DSS, and questionnaires to determine the type of waste and evaluate user interface design. Contribution: This research focuses on determining waste handling priorities based on their management. It contributes the DSS, which uses a decision-making approach based on management groups developed using the SSM and AHP methods focused on waste management decisions. It also contributes to the availability of a user interface design from the DSS group that explains the interactions between actors. The implications of the availability of DSS groups in waste recycling companies can help management understand waste prioritization problems in a structured manner, increase decision-making efficiency, and impact better-quality waste management. Combining qualitative approaches from SSM to comprehend issues from different actor perspectives and AHP to assist quantitative methods in prioritizing decisions can yield theoretical implications when using the SSM and AHP methods together. Findings: This research produces a website-based group DSS user interface design that can facilitate decision-making using AHP techniques. The user interface design from the DSS group was developed using the SSM approach to identify complex problems at waste recycling companies in Indonesia. This study also evaluated the group DSS user interface design, which resulted in a score of 91.67%. This value means that the user interface design has met user expectations, which include functional, appearance, and comfort needs. These results also show that group DSS can enhance waste recycling companies’ decision-making process. The results of the AHP technique using all waste process information show that furniture waste, according to the CEO, is given more priority, and textile waste, according to the Managing Director. Group DSS developed using the AHP method allows user actors to provide decisions based on their perspectives and authority. Recommendations for Practitioners: This research shows that the availability of a group DSS is one of the digital transformation efforts that waste recycling companies can carry out to support the determination of a sustainable waste management plan. Managers benefit from DSS groups by providing a digital decision-making process to determine which types of waste should be prioritized based on management costs. Timely and complete information in the group DSS is helpful in the decision-making process and increases organizational knowledge based on the chosen strategy. Recommendation for Researchers: Developing a group DSS for waste recycling companies can encourage strategic decision-making processes. This research integrates SSM and AHP to support a comprehensive group DSS because SSM encourages a deeper and more detailed understanding of waste recycling companies with complex problems. At the same time, AHP provides a structured approach for recycling companies to make decisions. The group DSS that will be developed can be used to identify other more relevant criteria, such as environmental impact, waste management regulations, and technological capabilities. Apart from more varied criteria, the group DSS can be encouraged to provide various alternatives such as waste paper, metal, or glass. In addition to evaluating the group DSS’s user interface design, waste recycling companies need to consider training or support for users to increase system adoption. Impact on Society: The waste problem requires the role of various stakeholders, one of which is a waste recycling company. The availability of a group DSS design can guide waste recycling companies in providing efficient and effective services so that they can respond more quickly to the waste management needs of the community. The community also gets transparent information regarding their waste management. The impact of good group DSS is reducing the amount of waste in society. Future Research: Future research could identify various other types of waste used as alternatives in the decision-making process to illustrate the complexity of the prioritization process. Future research could also identify other criteria, such as environmental impact, social aspects of community involvement, or policy compliance. Future research could involve decision-makers from other parties, such as the government, who play an essential role in the waste industry. Full Article
sin Recommendation System for an Online Shopping Pay-Later System Using a Multistage Approach: A Case Study from Indonesia By Published On :: 2024-08-29 Aim/Purpose: In this study, we developed a recommendation system model designed to support decision-makers in identifying consumers eligible for pay-later options via consensus-based decision-making. This approach was chosen due to the high and complex risks involved, such as delayed payments, challenges in reaching consumers, and issues of bad credit. Background: The “pay-later” option, which allows consumers to postpone payment for e-commerce purchases, offers convenience and flexibility but also introduces several challenges: (i) by enabling payment deferral, merchants face financial risks, including potential delays or defaults in payment, adversely affecting their cash flow and profitability; and (ii) this payment delay can also heighten the risk of fraud, including identity theft and unauthorized transactions. Methodology: This study initiated a risk analysis utilizing the ROAD process. Considering contemporary economic developments and advancements in neural networks, integrating these networks into risk assessment has become crucial. Consequently, model development involved the amalgamation of three deep learning methods – CNN (Convolutional Neural Networks), RNN (Recurrent Neural Networks), and LSTM (Long Short-Term Memory) – to address various risk alternatives and facilitate multi-stage decision-making recommendations. Contribution: Our primary contribution is threefold. First, our study identified potential consumers by prioritizing those with the smallest associated problem consequence values. Second, we achieved an optimal recall value using a candidate generator. Last, we categorized consumers to assess their eligibility for pay-later rights. Findings: The findings from this study indicate that our multi-stage recommendation model is effective in minimizing the risk associated with consumer debt repayment. This method of consumer selection empowers policymakers to make informed decisions regarding which consumers should be granted pay-later privileges. Recommendations for Practitioners: This recommendation system is proposed to several key parties involved in the development, implementation, and use of pay-later systems. These parties include E-commerce Executive Management for financial analysis and risk evaluation, the Risk Management Team to assess and manage risks related to users utilizing Pay-Later services, and Sales Managers to integrate Pay-Later services into sales strategies. Recommendation for Researchers: Advanced fraud detection mechanisms were implemented to prevent unauthorized transactions effectively. The goal was to cultivate user confidence in the safety of their financial data by ensuring secure payment processing. Impact on Society: Ensuring consumers understand the terms and conditions of pay-later arrangements, including interest rates, repayment schedules, and potential fees, is crucial. Providing clear and transparent information, along with educating consumers about their financial responsibilities, helps prevent misunderstandings and disputes. Future Research: Our future development plans involve the ongoing assessment of the system’s performance to enhance prediction accuracy. This includes updating models and criteria based on feedback and changes in economic or market conditions. Upholding compliance with security and data privacy regulations necessitates the implementation of protective measures to safeguard consumer information. The implementation of such a system requires careful consideration to ensure fairness and adherence to legal standards. Additionally, it is important to acknowledge that algorithms and models may evolve over time through the incorporation of additional data and continuous evaluations. Full Article
sin Unveiling the Secrets of Big Data Projects: Harnessing Machine Learning Algorithms and Maturity Domains to Predict Success By Published On :: 2024-08-19 Aim/Purpose: While existing literature has extensively explored factors influencing the success of big data projects and proposed big data maturity models, no study has harnessed machine learning to predict project success and identify the critical features contributing significantly to that success. The purpose of this paper is to offer fresh insights into the realm of big data projects by leveraging machine-learning algorithms. Background: Previously, we introduced the Global Big Data Maturity Model (GBDMM), which encompassed various domains inspired by the success factors of big data projects. In this paper, we transformed these maturity domains into a survey and collected feedback from 90 big data experts across the Middle East, Gulf, Africa, and Turkey regions regarding their own projects. This approach aims to gather firsthand insights from practitioners and experts in the field. Methodology: To analyze the feedback obtained from the survey, we applied several algorithms suitable for small datasets and categorical features. Our approach included cross-validation and feature selection techniques to mitigate overfitting and enhance model performance. Notably, the best-performing algorithms in our study were the Decision Tree (achieving an F1 score of 67%) and the Cat Boost classifier (also achieving an F1 score of 67%). Contribution: This research makes a significant contribution to the field of big data projects. By utilizing machine-learning techniques, we predict the success or failure of such projects and identify the key features that significantly contribute to their success. This provides companies with a valuable model for predicting their own big data project outcomes. Findings: Our analysis revealed that the domains of strategy and data have the most influential impact on the success of big data projects. Therefore, companies should prioritize these domains when undertaking such projects. Furthermore, we now have an initial model capable of predicting project success or failure, which can be invaluable for companies. Recommendations for Practitioners: Based on our findings, we recommend that practitioners concentrate on developing robust strategies and prioritize data management to enhance the outcomes of their big data projects. Additionally, practitioners can leverage machine-learning techniques to predict the success rate of these projects. Recommendation for Researchers: For further research in this field, we suggest exploring additional algorithms and techniques and refining existing models to enhance the accuracy and reliability of predicting the success of big data projects. Researchers may also investigate further into the interplay between strategy, data, and the success of such projects. Impact on Society: By improving the success rate of big data projects, our findings enable organizations to create more efficient and impactful data-driven solutions across various sectors. This, in turn, facilitates informed decision-making, effective resource allocation, improved operational efficiency, and overall performance enhancement. Future Research: In the future, gathering additional feedback from a broader range of big data experts will be valuable and help refine the prediction algorithm. Conducting longitudinal studies to analyze the long-term success and outcomes of Big Data projects would be beneficial. Furthermore, exploring the applicability of our model across different regions and industries will provide further insights into the field. Full Article
sin Using Social Media Applications for Accessing Health-related Information: Evidence from Jordan By Published On :: 2024-03-07 Aim/Purpose: This study examined the use of Social Media Applications (SMAs) for accessing health-related information within a heterogeneous population in Jordan. The objective of this study was therefore threefold: (i) to investigate the usage of SMAs, including WhatsApp, Twitter, YouTube, Snapchat, Instagram, and Facebook, for accessing health-related information; (ii) to examine potential variations in the use of SMAs based on demographic and behavioral characteristics; and (iii) to identify the factors that can predict the use of SMAs. Background: There has been limited focus on investigating the behavior of laypeople in Jordan when it comes to seeking health information from SMAs. Methodology: A cross-sectional study was conducted among the general population in Jordan using an online questionnaire administered to 207 users. A purposive sampling technique was employed, wherein all the participants actively sought online health information. Descriptive statistics, t-tests, and regression analyses were utilized to analyze the collected data. Contribution: This study adds to the existing body of research on health information seeking from SMAs in developing countries, with a specific focus on Jordan. Moreover, laypeople, often disregarded by researchers and health information providers, are the most vulnerable individuals who warrant greater attention. Findings: The findings indicated that individuals often utilized YouTube as a platform to acquire health-related information, whereas their usage of Facebook for this purpose was less frequent. Participants rarely utilized Instagram and WhatsApp to obtain health information, while Twitter and Snapchat were very seldom used for this purpose. The variable of sex demonstrated a notable positive correlation with the utilization of YouTube and Twitter for the purpose of finding health-related information. Conversely, the variable of nationality exhibited a substantial positive correlation with the utilization of Facebook, Instagram, and Twitter. Consulting medical professionals regarding information obtained from the Internet was a strong indicator of using Instagram to search for health-related information. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of SMAs. Recommendation for Researchers: Researchers should conduct separate investigations for each application specifically pertaining to the acquisition of health-related information. Additionally, it is advisable to investigate additional variables that may serve as predictors for the utilization of SMAs. Impact on Society: The objective of this study is to enhance the inclination of the general public in Jordan to utilize SMAs for health-related information while also maximizing the societal benefits of these applications. Future Research: Additional research is required to examine social media’s usability (regarding ease of use) and utility (comparing advantages to risks) in facilitating effective positive change and impact in healthcare. Full Article
sin Impact of User Satisfaction With E-Government Services on Continuance Use Intention and Citizen Trust Using TAM-ISSM Framework By Published On :: 2024-02-06 Aim/Purpose: This study investigates the drivers of user satisfaction in e-government services and its influence on continued use intention and citizen trust in government. It employs the integration of the Technology Acceptance Model (TAM) and the Information System Success Model (ISSM). Background: Electronic government, transforming citizen-state interactions, has gained momentum worldwide, including in India, where the aim is to leverage technology to improve citizen services, streamline administration, and engage the public. While prior research has explored factors influencing citizen satisfaction with e-government services globally, this area of study has been relatively unexplored in India, particularly in the post-COVID era. Challenges to widespread e-government adoption in India include a large and diverse population, limited digital infrastructure in rural areas, low digital literacy, and weak data protection regulations. Additionally, global declines in citizen trust, attributed to economic concerns, corruption, and information disclosures, further complicate the scenario. This study seeks to investigate the influence of various factors on user satisfaction and continuance usage of e-government services in India. It also aims to understand how these services contribute to building citizens’ trust in government. Methodology: The data were collected by utilizing survey items on drivers of e-government services, user satisfaction, citizen trust, and continuance use intention derived from existing literature on information systems and e-government. Responses from 501 Indian participants, collected using an online questionnaire, were analyzed using PLS-SEM. Contribution: This study makes a dual contribution to the e-government domain. First, it introduces a comprehensive research model that examines factors influencing users’ satisfaction and continuance intention with e-government services. The proposed model integrates the TAM and ISSM. Combining these models allows for a comprehensive examination of e-government satisfaction and continued intention. By analyzing the impact of user satisfaction on continuance intention and citizen trust through an integrated model, researchers and practitioners gain insights into the complex dynamics involved. Second, the study uncovers the effects of residential status on user satisfaction, trust, and continuance intention regarding e-government services. Findings reveal disparities in the influence of system and service quality on user satisfaction across different user segments. Researchers and policymakers should consider these insights when designing e-government services to ensure user satisfaction, continuance intention, and the building of citizen trust. Findings: The findings indicate that the quality of information, service, system, and perceived usefulness play important roles in user satisfaction with e-government services. All hypothesized paths were significant, except for perceived ease of use. Furthermore, the study highlights that user satisfaction significantly impacts citizen trust and continuance use intention. Recommendations for Practitioners: The findings suggest that government authorities should focus on delivering accurate, comprehensive, and timely information in a secure, glitch-free, and user-friendly digital environment. Implementing an interactive and accessible interface, ensuring compatibility across devices, and implementing swift query resolution mechanisms collectively contribute to improving users’ satisfaction. Conducting awareness and training initiatives, providing 24×7 access to online tutorials, helpdesks, technical support, clear FAQs, and integrating AI-driven customer service support can further ensure a seamless user experience. Government institutions should leverage social influence, community engagement, and social media campaigns to enhance user trust. Promotional campaigns, incentive programs, endorsements, and user testimonials should be used to improve users’ satisfaction and continuance intention. Recommendation for Researchers: An integrated model combining TAM and ISSM offers a robust approach for thoroughly analyzing the diverse factors influencing user satisfaction and continuance intention in the evolving digitalization landscape of e-government services. This expansion, aligning with ISSM’s perspective, enhances the literature by demonstrating how user satisfaction impacts continuance usage intention and citizen trust in e-government services in India and other emerging economies. Impact on Society: Examining the factors influencing user satisfaction and continuance intention in e-government services and their subsequent impact on citizen trust carries significant societal implications. The findings can contribute to the establishment of transparent and accountable governance practices, fostering a stronger connection between governments and their citizens. Future Research: There are several promising avenues to explore to enhance future research. Expanding the scope by incorporating a larger sample size could enable a more thorough analysis. Alternatively, delving into the performance of specific e-government services would offer greater precision, considering that this study treats e-government services generically. Additionally, incorporating in-depth interviews and longitudinal studies would yield a more comprehensive understanding of the dynamic evolution of digitalization. Full Article
sin Feature analytics of asthma severity levels for bioinformatics improvement using Gini importance By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 In the context of asthma severity prediction, this study delves into the feature importance of various symptoms and demographic attributes. Leveraging a comprehensive dataset encompassing symptom occurrences across varying severity levels, this investigation employs visualisation techniques, such as stacked bar plots, to illustrate the distribution of symptomatology within different severity categories. Additionally, correlation coefficient analysis is applied to quantify the relationships between individual attributes and severity levels. Moreover, the study harnesses the power of random forest and the Gini importance methodology, essential tools in feature importance analytics, to discern the most influential predictors in asthma severity prediction. The experimental results bring to light compelling associations between certain symptoms, notably 'runny-nose' and 'nasal-congestion', and specific severity levels, elucidating their potential significance as pivotal predictive indicators. Conversely, demographic factors, encompassing age groups and gender, exhibit comparatively weaker correlations with symptomatology. These findings underscore the pivotal role of individual symptoms in characterising asthma severity, reinforcing the potential for feature importance analysis to enhance predictive models in the realm of asthma management and bioinformatics. Full Article
sin Alzheimer's disease classification using hybrid Alex-ResNet-50 model By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 Alzheimer's disease (AD), a leading cause of dementia and mortality, presents a growing concern due to its irreversible progression and the rising costs of care. Early detection is crucial for managing AD, which begins with memory deterioration caused by the damage to neurons involved in cognitive functions. Although incurable, treatments can manage its symptoms. This study introduces a hybrid AlexNet+ResNet-50 model for AD diagnosis, utilising a pre-trained convolutional neural network (CNN) through transfer learning to analyse MRI scans. This method classifies MRI images into Alzheimer's disease (AD), moderate cognitive impairment (MCI), and normal control (NC), enhancing model efficiency without starting from scratch. Incorporating transfer learning allows for refining the CNN to categorise these conditions accurately. Our previous work also explored atlas-based segmentation combined with a U-Net model for segmentation, further supporting our findings. The hybrid model demonstrates superior performance, achieving 94.21% accuracy in identifying AD cases, indicating its potential as a highly effective tool for early AD diagnosis and contributing to efforts in managing the disease's impact. Full Article
sin Exploring business students' Perry cognitive development position and implications at teaching universities in the USA By www.inderscience.com Published On :: 2024-03-06T23:20:50-05:00 In the context of US universities where student evaluations of teaching play an important role in the retention and promotion of faculty, it is important to understand what a student expects in the classroom. This study took the perspective of Perry's cognitive development scheme with the following research question: what is the Perry level of cognitive development of business students? An established survey was used at two different universities. It was found that the median was position 3, and that there was large variation in three dimensions. First is the variation across program levels. Second, there was variation across universities. This becomes an issue when instructors move to a different university and questions the possibility to transfer 'best practices'. Third, variation was found within a specific program level. This means that instructors are faced with students who, from a cognitive perspective, have different demands which are unlikely to be simultaneously met. Full Article
sin Resource monitoring framework for big raw data processing By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 Scientific experiments, simulations, and modern applications generate large amounts of data. Analysing resources required to process such big datasets is essential to identify application running costs for cloud or in-house deployments. Researchers have proposed keeping data in raw formats to avoid upfront utilisation of resources. However, it poses reparsing issues for frequently accessed data. The paper discusses detailed comparative analysis of resources required by in-situ engines and traditional database management systems to process a real-world scientific dataset. A resource monitoring framework has been developed and incorporated into the raw data query processing framework to achieve this goal. The work identified different query types best suited to a given data processing tool in terms of data to result time and resource requirements. The analysis of resource utilisation patterns has led to the development of query complexity aware (QCA) and resource utilisation aware (RUA) data partitioning techniques to process big raw data efficiently. Resource utilisation data have been analysed to estimate the data processing capacity of a given machine. Full Article
sin On large automata processing: towards a high level distributed graph language By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 Large graphs or automata have their data that cannot fit in a single machine, or may take unreasonable time to be processed. We implement with MapReduce and Giraph two algorithms for intersecting and minimising large and distributed automata. We provide some comparative analysis, and the experiment results are depicted in figures. Our work experimentally validates our propositions as long as it shows that our choice, in comparison with MapReduce one, is not only more suitable for graph-oriented algorithms, but also speeds the executions up. This work is one of the first steps of a long-term goal that consists in a high level distributed graph processing language. Full Article
sin Data as a potential path for the automotive aftersales business to remain active through and after the decarbonisation By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 This study aims to identify and understand the perspectives of automotive aftersales stakeholders regarding current challenges posed by decarbonisation strategies. It examines potential responses that the automotive aftersales business could undertake to address these challenges. Semi-structured interviews were undertaken with automotive industry experts from Europe and Latin America. This paper focuses primarily on impacts of decarbonisation upon automotive aftersales and the potential role of data in that business. Results show that investment in technology will be a condition for businesses that want to remain active in the industry. Furthermore, experts agree that incumbent manufacturers are not filling the technology gap that the energy transition is creating in the automotive sector, a consequence of which will be the entrance of new players from other sectors. The current aftersales businesses will potentially lose bargaining control. Moreover, policy makers are seen as unreliable leaders of the transition agenda. Full Article
sin Addressing the eLearning Contradiction: A Collaborative Approach for Developing a Conceptual Framework Learning Object By Published On :: Full Article
sin Learning Objects: Using Language Structures to Understand the Transition from Affordance Systems to Intelligent Systems By Published On :: Full Article
sin Modalities of Using Learning Objects for Intelligent Agents in Learning By Published On :: Full Article
sin Open the Windows of Communication: Promoting Interpersonal and Group Interactions Using Blogs in Higher Education By Published On :: Full Article
sin Using a Collaborative Database to Enhance Students’ Knowledge Construction By Published On :: Full Article
sin Assessing the Efficacy and Effectiveness of an E-Portfolio Used for Summative Assessment By Published On :: Full Article
sin Using the Interactive White Board in Teaching and Learning – An Evaluation of the SMART CLASSROOM Pilot Project By Published On :: Full Article
sin Drills, Games or Tests? Evaluating Students' Motivation in Different Online Learning Activities, Using Log File Analysis By Published On :: Full Article
sin Implementing On-Line Learning and Performance Support Using an EPSS By Published On :: Full Article
sin Facilitation of Formative Assessments using Clickers in a University Physics Course By Published On :: Full Article
sin A Study of Online Exams Procrastination Using Data Analytics Techniques By Published On :: Full Article
sin Assessing the Effectiveness of Web-Based Tutorials Using Pre- and Post-Test Measurements By Published On :: Full Article
sin Using Photos and Visual-Processing Assistive Technologies to Develop Self-Expression and Interpersonal Communication of Adolescents with Asperger Syndrome (AS) By Published On :: Full Article
sin A Promising Practicum Pilot – Exploring Associate Teachers’ Access and Interactions with a Web-based Learning Tool By Published On :: Full Article
sin A Framework for Assessing the Pedagogical Effectiveness of Wiki-Based Collaborative Writing: Results and Implications By Published On :: Full Article